Common use of Access to Computer Systems Clause in Contracts

Access to Computer Systems. If a Party to this Agreement (or any other Provider and any other Recipient) has access (either on-site or remotely) to the other Party’s or its Affiliates’ Information Technology in relation to the Transition Services, such Party shall limit such access solely to the use of such Information Technology for purposes of the Transition Services and shall not access or attempt to access the other Party’s or its Affiliates’ Information Technology other than those required for the Transition Services. Such Party shall limit such access to those of its and its Affiliates’ employees, agents or contractors with a bona fide need to have such access in connection with the Transition Services, and shall follow all of the relevant Party’s security and data protection rules and procedures for restricting access to its or its Affiliates’ Information Technology made available by the relevant Party. All user identification numbers and passwords disclosed to such Party or its Affiliates and any information obtained by such Party or its Affiliates as a result of such Party’s or its Affiliates’ access to and use of the other Party’s or its Affiliates’ computer systems shall be deemed to be, and treated as, Confidential Information hereunder and under the Separation Agreement. Each Party shall, and shall cause its Affiliates to, cooperate with the other Party in the investigation of any apparent unauthorized access to a Party’s or its Affiliates’ computer system or information stores.

Appears in 3 contracts

Samples: Transition Services Agreement, Transition Services Agreement (Tribune Publishing Co), Transition Services Agreement (Tribune Publishing Co)

AutoNDA by SimpleDocs

Access to Computer Systems. If a Party either party to this Agreement (or or, with respect to Service Provider, any other Service Provider and any other RecipientParty) has access (either on-site or remotely) to the other Partyparty’s or its Affiliates’ Information Technology computer systems and/or information stores in relation to the Transition Services, such Party party shall limit such access solely to the use of such Information Technology systems for purposes of the Transition Services and shall not access or attempt to access the other Partyparty’s computer systems, files, software or its Affiliates’ Information Technology services other than those required for the Transition Services. Such Party party shall limit such access to those of its and its Affiliates’ employees, agents or contractors with a bona fide need to have such access in connection with the Transition Services, and shall follow all of the relevant Partyother party’s security and data protection rules and procedures for restricting access to its or its Affiliates’ Information Technology made available by the relevant Partycomputer systems. All user identification numbers and passwords disclosed to such Party or its Affiliates party and any information obtained by such Party or its Affiliates party as a result of such Partyparty’s or its Affiliates’ access to and use of the other Partyparty’s or its Affiliates’ computer systems shall be deemed to be, and treated as, Confidential Information hereunder and under the Separation Agreementhereunder. Each Party shall, and party shall cause its Affiliates to, cooperate with the other Party party in the investigation of any apparent unauthorized access to a Partyany party’s or its Affiliates’ computer system or and/or information stores.

Appears in 1 contract

Samples: Acquisition Agreement (Verisign Inc/Ca)

Access to Computer Systems. If a any Party to this Agreement (or any other Provider and any other Recipient) its affiliates has access (either on-site or remotely) to any of the computer systems and/or information stores of the other Party or its affiliates in connection with the Transition Services to be provided under this Agreement and subject to such other Party’s or its Affiliates’ Information Technology in relation to the Transition Servicesreasonable system access policies (provided such policies are not inconsistent with this Agreement), such Party it shall limit such access solely to the use of such Information Technology for purposes of systems and information stores as required to so perform or receive the Transition Services and shall not access or attempt to access the other Party’s any computer systems, information stores, files, software or its Affiliates’ Information Technology services other than those required for to perform or receive the Transition Services, and shall cause its affiliates and Personnel to similarly comply. Such Each Party shall limit such access to those of its and Personnel, or those of its Affiliates’ employees, agents or contractors affiliates with a bona fide need to have such access in connection with and who have agreed to maintain the Transition Services, and shall follow all of the relevant Party’s security and data protection rules and procedures for restricting access to its or its Affiliates’ Information Technology made available by the relevant Party. All user identification numbers and passwords disclosed to such Party or its Affiliates and any information obtained by such Party or its Affiliates as a result of such Party’s or its Affiliates’ access to and use confidentiality of the other Party’s or its Affiliates’ computer systems shall be deemed to be, and treated as, Confidential Information hereunder and under the Separation AgreementInformation. Each Party shall, and shall cause its Affiliates toaffiliates and their respective Personnel, cooperate with to follow all applicable security rules and procedures communicated to it for restricting access to any computer systems and information stores of the other Party in the investigation of any apparent unauthorized access and its affiliates to a Party’s or its Affiliates’ computer system or information storeswhich it is provided access.

Appears in 1 contract

Samples: Share Purchase Agreement (ADT Inc.)

Access to Computer Systems. If a Party to this Agreement (or or, with respect to SVM, any other Provider and with respect to TG, any other Recipient) has access (either on-site or remotely) to the other Party’s or its Affiliates’ Information Technology in relation to the Transition Services, such Party shall limit such access solely to the use of such Information Technology for purposes of the Transition Services and shall not access or attempt to access the other Party’s or its Affiliates’ Information Technology other than those required for the Transition Services. Such Party shall limit such access to those of its and its Affiliates’ employees, agents or contractors with a bona fide need to have such access in connection with the Transition Services, and shall follow all of the relevant Party’s security and data protection rules and procedures for restricting access to its or its Affiliates’ Information Technology made available by the relevant Party. All user identification numbers and passwords disclosed to such Party or its Affiliates and any information obtained by such Party or its Affiliates as a result of such Party’s or its Affiliates’ access to and use of the other Party’s or its Affiliates’ computer systems shall be deemed to be, and treated as, Confidential Information hereunder and under the Separation Agreementhereunder. Each Party shall, and shall cause its Affiliates to, cooperate with the other Party in the investigation of any apparent unauthorized access to a Party’s or its Affiliates’ computer system or information stores.

Appears in 1 contract

Samples: Transition Services Agreement (Servicemaster Co, LLC)

AutoNDA by SimpleDocs

Access to Computer Systems. If a either Party to this Agreement (or or, with respect to Seller, any other Provider and any other RecipientVeriSign Party) has access (either on-site or remotely) to the other Party’s or its Affiliates’ Information Technology computer systems and/or information stores in relation to the Transition Services, such Party shall limit such access solely to the use of such Information Technology systems for purposes of the Transition Services and shall not access or attempt to access the other Party’s computer systems, files, software or its Affiliates’ Information Technology services other than those required for the Transition Services. Such Party shall limit such access to those of its and its Affiliates’ employees, agents or contractors with a bona fide need to have such access in connection with the Transition Services, and shall follow all of the relevant other Party’s security and data protection rules and procedures for restricting access to its or its Affiliates’ Information Technology made available by the relevant Partycomputer systems. All user identification numbers and passwords disclosed to such Party or its Affiliates and any information obtained by such Party or its Affiliates as a result of such Party’s or its Affiliates’ access to and use of the other Party’s or its Affiliates’ computer systems shall be deemed to be, and treated as, Confidential Information hereunder and under the Separation Agreementhereunder. Each Party shall, and shall cause its Affiliates to, cooperate with the other Party in the investigation of any apparent unauthorized access to a any Party’s or its Affiliates’ computer system or and/or information stores.

Appears in 1 contract

Samples: Acquisition Agreement (Verisign Inc/Ca)

Time is Money Join Law Insider Premium to draft better contracts faster.