Access to Computer Systems Sample Clauses

Access to Computer Systems. If a Party to this Agreement (or any other Provider and any other Recipient) has access (either on-site or remotely) to the other Party’s or its Affiliates’ Information Technology in relation to the Transition Services, such Party shall limit such access solely to the use of such Information Technology for purposes of the Transition Services and shall not access or attempt to access the other Party’s or its Affiliates’ Information Technology other than those required for the Transition Services. Such Party shall limit such access to those of its and its Affiliates’ employees, agents or contractors with a bona fide need to have such access in connection with the Transition Services, and shall follow all of the relevant Party’s security and data protection rules and procedures for restricting access to its or its Affiliates’ Information Technology made available by the relevant Party. All user identification numbers and passwords disclosed to such Party or its Affiliates and any information obtained by such Party or its Affiliates as a result of such Party’s or its Affiliates’ access to and use of the other Party’s or its Affiliates’ computer systems shall be deemed to be, and treated as, Confidential Information hereunder and under the Separation Agreement. Each Party shall, and shall cause its Affiliates to, cooperate with the other Party in the investigation of any apparent unauthorized access to a Party’s or its Affiliates’ computer system or information stores.
AutoNDA by SimpleDocs
Access to Computer Systems. If either party is given access to any equipment, computer, software, network, clean-room, electronic files or electronic data storage system owned or controlled by the other party, such party shall limit such access and use solely to receive or perform Services under this Agreement and shall strictly follow all security rules and procedures of such other party for use of such other party’s electronic resources. Any user identification numbers and passwords, or similar codes, provided in connection with the foregoing shall be deemed to be Confidential Information of such other party.
Access to Computer Systems. If a Party is given access to any equipment, computer, software, network, electronic files, or electronic data storage system owned or controlled by the other Party, such accessing Party will limit such access and use solely to provide or receive Services under this Agreement and shall not access or attempt to access any equipment, computer, software, network, electronic files, or electronic data storage system, other than those specifically required to provide or receive the Services. Each Party will limit its access to those employees with a requirement to have that access in connection with this Agreement, will advise the other Party in writing of the name of each person who will be granted access if requested to do so, and will strictly follow all security rules and procedures for use of electronic resources. All user identification numbers and passwords disclosed to a Party and any Confidential Information obtained by a Party as a result of their access to and use of any equipment, computers, software, networks, clean-rooms electronic files, and electronic data storage systems owned or controlled by the other Party, is deemed to be, and will be treated as, Confidential Information under applicable provisions of this Agreement. The Parties agree to cooperate in the investigation of any apparent unauthorized access to any equipment, computer, software, network, clean-room, electronic file, or electronic data storage systems owned or controlled by the other Party, or any apparent unauthorized release of Confidential Information.
Access to Computer Systems. During the term of any TAs, the Verigy Transferred Employees and any other employees, agents or subcontractors of Verigy (other than Agilent, Agilent's Subsidiaries or Service Providers) who are authorized by Agilent (collectively, "On-Site Personnel") may have access to the computer systems and related equipment of Agilent as detailed in the TAs that are necessary to fulfill the activities directly related to this Agreement; provided, however, that Agilent may restrict such access to protect commercially sensitive resources and maintain the confidentiality of other Agilent businesses.
Access to Computer Systems. Upon at least one (1) business day prior written notice, VIVUS shall have the right, during the Term, to access the Facility and any computer, software, network, electronic files or electronic data storage systems therein if VIVUS (or its designee) requires such access in order to retrieve any VIVUS Materials, subject to the confidentiality provisions set forth in Article 5 below. VIVUS shall limit (and, as applicable, cause its designees to limit) such access and use the foregoing items solely to retrieve VIVUS Materials and shall not access or attempt to access any computer, software, network, electronic files or electronic data storage system, other than those specifically required to accomplish the foregoing. MEDA agrees to reasonably cooperate (and cause its employees to reasonably cooperate) with VIVUS or its designees with respect to such access.
Access to Computer Systems. If the Receiving Party (or any of its Affiliates) is given access to any computer equipment, computer, software, network, electronic files, or electronic data storage system owned or controlled by Aradigm (“Aradigm Computer Systems”), then the Receiving Party shall limit (and, as applicable, cause its Affiliates to limit) (in each case, other than as contemplated in the Restructuring Agreement) access and use of such Aradigm Computer Systems solely to receive Services under this Agreement and shall not access, attempt to access or use any Aradigm Computer Systems, other than those specifically required to receive the Services; provided that, Aradigm shall be obligated to put in place procedures effective in differentiating between Aradigm Computer Systems to which the Receiving Party and any of its Affiliates are entitled to access and the Aradigm Computer Systems to which Aradigm or any of its Affiliates are not entitled to access. The Receiving Party shall limit such access to those of its employees, contractors, and advisers with a specific requirement to have such access in connection with this Agreement, shall advise Aradigm in writing of the name of each such Person who will be granted such access, and shall strictly follow all Aradigm’s security rules and procedures for use of the Aradigm Computer Systems. All user identification numbers and passwords disclosed to the Receiving Party (or its Affiliates) and any of Aradigm’s confidential information obtained by the Receiving Party (or its Affiliates) as a result of their access to and use of any such Aradigm Computer Systems shall be deemed to be, and shall be treated as, Aradigm’s confidential information under applicable provisions of this Agreement. The Receiving Party agrees to cooperate (and cause its Affiliates to cooperate) with Aradigm in the investigation of any apparent unauthorized access by the Receiving Party or its Affiliates to any Aradigm Computer Systems, or any apparent unauthorized release of Aradigm’s confidential information by the employees, contractors, or advisers of the Receiving Party or any of its Affiliates.
Access to Computer Systems. If Service Provider is given access to any of Recipient’s equipment, computer, software, network, electronic files, or electronic data storage system, Service Provider shall limit such access and use solely to perform Services for Recipient and shall not access or attempt to access any equipment, computer, software, network, electronic files, or electronic data storage system, other than those specifically required to accomplish the Services. Service Provider shall limit such access to those Service Provider Personnel with an express requirement to have such access in connection with this Agreement, shall advise Recipient in writing of the name of each such employee who will be granted such access, and shall strictly follow all Recipient security rules and procedures for use of Recipient’s electronic resources. All user identification numbers and passwords disclosed to Service Provider and any information obtained by Service Provider as a result of their access to and use of Recipient’s equipment, computers, software, networks, electronic files, and electronic data storage systems, shall be deemed to be, and shall be treated as, Confidential Information (as defined in the Sublicense Agreement) under applicable provisions of this Agreement. Service Provider agrees to cooperate with Recipient in the investigation of any apparent unauthorized access by Service Provider to Recipient’s equipment, computer, software, network, electronic file, or electronic data storage systems, or any apparent unauthorized release of Recipient’s Confidential Information (as defined in the Sublicense Agreement) by Service Provider Personnel.
AutoNDA by SimpleDocs
Access to Computer Systems. During the term of any Separation Agreements, the Transferred Employees and any other employees, agents or subcontractors of Purchaser (other than Seller, Seller’s Subsidiaries or Service Providers) who are authorized by Seller (collectively, “On-Site Personnel”) may have access to the computer systems and related equipment of Seller as detailed in the Separation Agreements that are necessary to fulfill the activities directly related to this Agreement; provided, however, that Seller may restrict such access to protect commercially sensitive resources and maintain the confidentiality of other Seller businesses, provided further, that no Transferred Employees may have access to any such systems and related equipment or owned, leased or controlled by Agilent, including any such systems and related equipment at Agilent’s Roseville facility, provided that Transferred Employees located at Agilent’s Roseville facility will be given Internet access, but not Intranet or other network access.
Access to Computer Systems. During the term of any Separation Agreements, the Transferred Employees and any other employees, agents or subcontractors of Purchaser (other than Seller, Seller’s Subsidiaries or Service Providers) who are authorized by Seller (collectively, “On-Site Personnel”) may have access to the computer systems and related equipment of Seller as detailed in the Separation Agreements that are necessary to fulfill the activities directly related to this Agreement; provided, however, that Seller may restrict such access to protect commercially sensitive resources and maintain the confidentiality of other Seller businesses.
Access to Computer Systems. If a Party is given access to any equipment, computer, software, network, electronic files, or electronic data storage system owned or controlled by the other Party, such accessing Party will limit such access and use solely to provide or receive Services under this Agreement and shall not access or attempt to access any equipment, computer, software, network, electronic files, or electronic data storage system, other than those specifically required to provide or receive the Services. All user identification numbers and passwords disclosed to a Party and any Confidential Information obtained by a Party as a result of their access to and use of any equipment, computers, software, networks, clean-rooms electronic files, and electronic data storage systems owned or controlled by the other Party, is deemed to be, and will be treated as, Confidential Information under applicable provisions of this Agreement. The Parties agree to cooperate in the investigation of any apparent unauthorized access to any equipment, computer, software, network, clean-room, electronic file, or electronic data storage systems owned or controlled by the other Party, or any apparent unauthorized release of Confidential Information.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!