Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETS"), Supplier Personnel: 1. will not remove Buyer Assets from Buyer's or Buyer's Customer's premises without Buyer's authorization; 2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use; 3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services; 4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and 5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's data residing on Buyer Assets.
Appears in 2 contracts
Sources: Base Agreement (First Virtual Communications Inc), Software and Services Engagement Agreement (First Virtual Communications Inc)
Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETSBuyer Assets"), Supplier Personnel:
1. will not remove Buyer Assets from Buyer's or Buyer's Customer's premises without Buyer's authorization;
; 2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use;
; 3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services;
; 4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and
and 5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's data residing on Buyer Assets.
Appears in 1 contract
Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETS"“Buyer Assets”), Supplier Personnel:
1. will not remove Buyer Assets from Buyer's or Buyer's Customer's ’s premises without Buyer's ’s authorization;
2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use;
3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services;
4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and
5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's ’s data residing on Buyer Assets.
Appears in 1 contract
Sources: Technical Service Agreement (VanceInfo Technologies Inc.)
Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETSBuyer Assets"), Supplier Personnel:
1. will not remove Buyer Assets from Buyer's or Buyer's Customer's premises without Buyer's authorization;
2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use;
3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services;
4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and
5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's data residing on Buyer Assets.
Appears in 1 contract
Sources: Licensed Works Agreement (Avistar Communications Corp)
Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETSBuyer Assets"), Supplier Personnel:
1. will not remove Buyer Assets from Buyer's or Buyer's ’s Customer's ’s premises without Buyer's authorization;
2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use;
3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services;
4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and
and 5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's data residing on Buyer Assets.
Appears in 1 contract
Sources: Technical Services Agreement (Camelot Information Systems Inc.)
Asset Control. In the event Supplier Personnel has have access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETSBuyer Assets"), Supplier Personnel:
1. will not remove Buyer Assets from Buyer's or Buyer's ’s Customer's ’s premises without Buyer's authorization;
2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use;
3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services;
4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and
5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's data residing on Buyer AssetsBuyer's information assets.
Appears in 1 contract
Sources: Master Agreement for Subcontracted Services (Chordiant Software Inc)
Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETS"“Buyer Assets”), Supplier Personnel:
1. will not remove Buyer Assets from Buyer's ’s or Buyer's ’s Customer's ’s premises without Buyer's ’s authorization;
2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use;
3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services;
4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and
5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's ’s data residing on Buyer Assets.
Appears in 1 contract