Access to Computer Systems Sample Clauses

Access to Computer Systems. If a Party to this Agreement (or any other Provider and any other Recipient) has access (either on-site or remotely) to the other Party’s or its Affiliates’ Information Technology in relation to the Transition Services, such Party shall limit such access solely to the use of such Information Technology for purposes of the Transition Services and shall not access or attempt to access the other Party’s or its Affiliates’ Information Technology other than those required for the Transition Services. Such Party shall limit such access to those of its and its Affiliates’ employees, agents or contractors with a bona fide need to have such access in connection with the Transition Services, and shall follow all of the relevant Party’s security and data protection rules and procedures for restricting access to its or its Affiliates’ Information Technology made available by the relevant Party. All user identification numbers and passwords disclosed to such Party or its Affiliates and any information obtained by such Party or its Affiliates as a result of such Party’s or its Affiliates’ access to and use of the other Party’s or its Affiliates’ computer systems shall be deemed to be, and treated as, Confidential Information hereunder and under the Separation Agreement. Each Party shall, and shall cause its Affiliates to, cooperate with the other Party in the investigation of any apparent unauthorized access to a Party’s or its Affiliates’ computer system or information stores.
Access to Computer Systems. If either party is given access to any equipment, computer, software, network, clean-room, electronic files or electronic data storage system owned or controlled by the other party, such party shall limit such access and use solely to receive or perform Services under this Agreement and shall strictly follow all security rules and procedures of such other party for use of such other party’s electronic resources. Any user identification numbers and passwords, or similar codes, provided in connection with the foregoing shall be deemed to be Confidential Information of such other party.
Access to Computer Systems. If a Party is given access to any equipment, computer, software, network, electronic files, or electronic data storage system owned or controlled by the other Party, such accessing Party will limit such access and use solely to provide or receive Services under this Agreement and shall not access or attempt to access any equipment, computer, software, network, electronic files, or electronic data storage system, other than those specifically required to provide or receive the Services. Each Party will limit its access to those employees with a requirement to have that access in connection with this Agreement, will advise the other Party in writing of the name of each person who will be granted access if requested to do so, and will strictly follow all security rules and procedures for use of electronic resources. All user identification numbers and passwords disclosed to a Party and any Confidential Information obtained by a Party as a result of their access to and use of any equipment, computers, software, networks, clean-rooms electronic files, and electronic data storage systems owned or controlled by the other Party, is deemed to be, and will be treated as, Confidential Information under applicable provisions of this Agreement. The Parties agree to cooperate in the investigation of any apparent unauthorized access to any equipment, computer, software, network, clean-room, electronic file, or electronic data storage systems owned or controlled by the other Party, or any apparent unauthorized release of Confidential Information.
Access to Computer Systems. During the term of any TAs, the Verigy Transferred Employees and any other employees, agents or subcontractors of Verigy (other than Agilent, Agilent's Subsidiaries or Service Providers) who are authorized by Agilent (collectively, "On-Site Personnel") may have access to the computer systems and related equipment of Agilent as detailed in the TAs that are necessary to fulfill the activities directly related to this Agreement; provided, however, that Agilent may restrict such access to protect commercially sensitive resources and maintain the confidentiality of other Agilent businesses.
Access to Computer Systems. If the Receiving Party (or any of its Affiliates) is given access to any computer equipment, computer, software, network, electronic files, or electronic data storage system owned or controlled by Aradigm (“Aradigm Computer Systems”), then the Receiving Party shall limit (and, as applicable, cause its Affiliates to limit) (in each case, other than as contemplated in the Restructuring Agreement) access and use of such Aradigm Computer Systems solely to receive Services under this Agreement and shall not access, attempt to access or use any Aradigm Computer Systems, other than those specifically required to receive the Services; provided that, Aradigm shall be obligated to put in place procedures effective in differentiating between Aradigm Computer Systems to which the Receiving Party and any of its Affiliates are entitled to access and the Aradigm Computer Systems to which Aradigm or any of its Affiliates are not entitled to access. The Receiving Party shall limit such access to those of its employees, contractors, and advisers with a specific requirement to have such access in connection with this Agreement, shall advise Aradigm in writing of the name of each such Person who will be granted such access, and shall strictly follow all Aradigm’s security rules and procedures for use of the Aradigm Computer Systems. All user identification numbers and passwords disclosed to the Receiving Party (or its Affiliates) and any of Aradigm’s confidential information obtained by the Receiving Party (or its Affiliates) as a result of their access to and use of any such Aradigm Computer Systems shall be deemed to be, and shall be treated as, Aradigm’s confidential information under applicable provisions of this Agreement. The Receiving Party agrees to cooperate (and cause its Affiliates to cooperate) with Aradigm in the investigation of any apparent unauthorized access by the Receiving Party or its Affiliates to any Aradigm Computer Systems, or any apparent unauthorized release of Aradigm’s confidential information by the employees, contractors, or advisers of the Receiving Party or any of its Affiliates.
Access to Computer Systems. Upon at least one (1) business day prior written notice, VIVUS shall have the right, during the Term, to access the Facility and any computer, software, network, electronic files or electronic data storage systems therein if VIVUS (or its designee) requires such access in order to retrieve any VIVUS Materials, subject to the confidentiality provisions set forth in Article 5 below. VIVUS shall limit (and, as applicable, cause its designees to limit) such access and use the foregoing items solely to retrieve VIVUS Materials and shall not access or attempt to access any computer, software, network, electronic files or electronic data storage system, other than those specifically required to accomplish the foregoing. MEDA agrees to reasonably cooperate (and cause its employees to reasonably cooperate) with VIVUS or its designees with respect to such access.
Access to Computer Systems. If a Party is given access to any equipment, computer, software, network, electronic files or electronic data storage system owned or controlled by the other Party, the accessing Party will limit its access and use solely to that which is required to receive Services under this Agreement and shall not access or attempt to access any equipment, computer, software, network, clean-room, electronic files or electronic data storage system, other than those specifically required to receive the Services. Subject to the restrictions provided herein, each Party shall provide the other Party’s personnel with reasonable physical access to all sites and rooms where those systems reside, if reasonably needed to perform the Services. Each Party shall limit access to those persons with a requirement to have access under this Agreement, advise the other Party in writing of the name of each person who will be granted access if requested to do so, and strictly follow all security rules and procedures for use of electronic resources. All user identification numbers and passwords disclosed to a Party and any Confidential Information obtained by a Party as a result of their access to and use of any equipment, computers, software, networks, clean-rooms electronic files and electronic data storage systems owned or controlled by the other Party, will be considered and treated as Confidential Information under this Agreement. The Parties shall cooperate in the investigation of any apparent unauthorised access to any equipment, computer, software, network, clean-room, electronic file or electronic data storage systems owned or controlled by the other Party, or any apparent unauthorised release of Confidential Information.
Access to Computer Systems. If Service Provider is given access to any of Recipient’s equipment, computer, software, network, electronic files, or electronic data storage system, Service Provider shall limit such access and use solely to perform Services for Recipient and shall not access or attempt to access any equipment, computer, software, network, electronic files, or electronic data storage system, other than those specifically required to accomplish the Services. Service Provider shall limit such access to those Service Provider Personnel with an express requirement to have such access in connection with this Agreement, shall advise Recipient in writing of the name of each such employee who will be granted such access, and shall strictly follow all Recipient security rules and procedures for use of Recipient’s electronic resources. All user identification numbers and passwords disclosed to Service Provider and any information obtained by Service Provider as a result of their access to and use of Recipient’s equipment, computers, software, networks, electronic files, and electronic data storage systems, shall be deemed to be, and shall be treated as, Confidential Information (as defined in the Sublicense Agreement) under applicable provisions of this Agreement. Service Provider agrees to cooperate with Recipient in the investigation of any apparent unauthorized access by Service Provider to Recipient’s equipment, computer, software, network, electronic file, or electronic data storage systems, or any apparent unauthorized release of Recipient’s Confidential Information (as defined in the Sublicense Agreement) by Service Provider Personnel.
Access to Computer Systems. If so requested by Licensee, Licensor shall allow Licensee to have continued access (in the same manner as such access has existed immediately prior to the execution of this Agreement) to the computer software systems based at Licensor's headquarters up to May 1, 2002. If Licensee requests Licensor for such access for a full year, Licensee shall pay to Licensor a fee of US$58,480 commencing 1 May 2001 for the first Territory Outlet and US$17,544 for each additional Territory Outlet. The fee shall be paid in advance on a monthly basis, prorated for any portion of the year for which Licensee requests and receives such access. Licensee shall also reimburse Licensor for any amounts which it is required to pay to the licensor of the computer software systems in order to allow Licensee to access such computer software systems.
Access to Computer Systems. If either Party is given access to any equipment, computer, software, network, electronic files, or electronic data storage system owned or controlled by the other Party, the Party provided access shall limit such access and use solely to provide or receive, as applicable, IT Services under this Agreement and shall not access or attempt to access any equipment, computer, software, network, electronic files, or electronic data storage system, other than those specifically required to provide or receive, as applicable, the IT Services. Each Party shall limit such access to those individuals with a requirement to have such access in connection with this Agreement, shall advise the other Party in writing of the name of each such person who will be granted such access, and shall strictly follow all security rules and procedures of the other Party for use of that Party's electronic resources. All user identification numbers and passwords disclosed to a Party by the other Party and any nonpublic information of a Party obtained by the other Party as a result of their access to and use of any equipment, computers, software, networks, electronic files, and electronic data storage systems owned or controlled by the disclosing Party, shall be deemed to be, and shall be treated as, subject to the Confidentiality Agreement. Each Party agrees to cooperate with the other Party in the investigation of any apparent unauthorized access by the first Party to any equipment, computer, software, network, clean-room, electronic file, or electronic data storage systems owned or controlled by the other Party, or any apparent unauthorized release of nonpublic information by the first party's employees.