Access to Computer Systems. If a Party is given access to any equipment, computer, software, network, electronic files, or electronic data storage system owned or controlled by the other Party, such accessing Party will limit such access and use solely to provide or receive Services under this Agreement and shall not access or attempt to access any equipment, computer, software, network, electronic files, or electronic data storage system, other than those specifically required to provide or receive the Services. Each Party will limit its access to those employees with a requirement to have that access in connection with this Agreement, will advise the other Party in writing of the name of each person who will be granted access if requested to do so, and will strictly follow all security rules and procedures for use of electronic resources. All user identification numbers and passwords disclosed to a Party and any Confidential Information obtained by a Party as a result of their access to and use of any equipment, computers, software, networks, clean-rooms electronic files, and electronic data storage systems owned or controlled by the other Party, is deemed to be, and will be treated as, Confidential Information under applicable provisions of this Agreement. The Parties agree to cooperate in the investigation of any apparent unauthorized access to any equipment, computer, software, network, clean-room, electronic file, or electronic data storage systems owned or controlled by the other Party, or any apparent unauthorized release of Confidential Information.
Appears in 3 contracts
Samples: Services Agreement (A.S.V., LLC), Services Agreement (A.S.V., LLC), Asset and Stock Purchase Agreement (Bucyrus International Inc)
Access to Computer Systems. If a Party is given access to any equipment, computer, software, network, electronic files, or electronic data storage system owned or controlled by the other Party, such accessing Party will limit such access and use solely to provide or receive Services under this Agreement and shall not access or attempt to access any equipment, computer, software, network, electronic files, or electronic data storage system, other than those specifically required to provide or receive the Services. Each Party will limit its access to those employees with a requirement to have that such access in connection with this Agreement, will advise the other Party in writing of the name of each person who will be granted access if requested to do so, and will strictly follow all security rules and procedures for use of electronic resources. All user identification numbers and passwords disclosed to a Party and any Confidential Information obtained by a Party as a result of their its access to and use of any equipment, computers, software, networks, clean-rooms electronic files, and electronic data storage systems owned or controlled by the other Party, is deemed to be, and will be treated as, Confidential Information under applicable provisions of this Agreement. The Parties agree to cooperate in the investigation of any apparent unauthorized access to any equipment, computer, software, network, clean-room, electronic file, or electronic data storage systems owned or controlled by the other Party, or any apparent unauthorized release of Confidential Information.
Appears in 1 contract
Samples: Transition Services Agreement (Trident Microsystems Inc)