Common use of Asset Control Clause in Contracts

Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETS"), Supplier Personnel: 1. will not remove Buyer Assets from Buyer's or Buyer's Customer's premises without Buyer's authorization; 2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use; 3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services; 4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and 5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's data residing on Buyer Assets.

Appears in 2 contracts

Sources: Base Agreement (First Virtual Communications Inc), Software and Services Engagement Agreement (First Virtual Communications Inc)

Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETSBuyer Assets"), Supplier Personnel: 1. will not remove Buyer Assets from Buyer's or Buyer's Customer's premises without Buyer's authorization; ; 2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use; ; 3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services; ; 4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and and 5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's data residing on Buyer Assets.

Appears in 1 contract

Sources: Supplier Agreement (Titanium Group LTD)

Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETS"“Buyer Assets”), Supplier Personnel: 1. will not remove Buyer Assets from Buyer's or Buyer's Customer's ’s premises without Buyer's ’s authorization; 2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use; 3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services; 4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and 5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's ’s data residing on Buyer Assets.

Appears in 1 contract

Sources: Technical Service Agreement (VanceInfo Technologies Inc.)

Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETSBuyer Assets"), Supplier Personnel: 1. will not remove Buyer Assets from Buyer's or Buyer's Customer's premises without Buyer's authorization; 2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use; 3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services; 4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and 5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's data residing on Buyer Assets.

Appears in 1 contract

Sources: Licensed Works Agreement (Avistar Communications Corp)

Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETSBuyer Assets"), Supplier Personnel: 1. will not remove Buyer Assets from Buyer's or Buyer's ’s Customer's ’s premises without Buyer's authorization; 2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use; 3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services; 4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and and 5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's data residing on Buyer Assets.

Appears in 1 contract

Sources: Technical Services Agreement (Camelot Information Systems Inc.)

Asset Control. In the event Supplier Personnel has have access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETSBuyer Assets"), Supplier Personnel: 1. will not remove Buyer Assets from Buyer's or Buyer's ’s Customer's ’s premises without Buyer's authorization; 2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use; 3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services; 4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and 5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's data residing on Buyer AssetsBuyer's information assets.

Appears in 1 contract

Sources: Master Agreement for Subcontracted Services (Chordiant Software Inc)

Asset Control. In the event Supplier Personnel has access to information, information assets, supplies or other property, including property owned by third parties but provided to Supplier Personnel by Buyer ("BUYER ASSETS"“Buyer Assets”), Supplier Personnel: 1. will not remove Buyer Assets from Buyer's ’s or Buyer's ’s Customer's ’s premises without Buyer's ’s authorization; 2. will use Buyer Assets only for purposes of this Agreement and reimburse Buyer for any unauthorized use; 3. will only connect with, interact with or use programs, tools or routines that Buyer agrees are needed to provide Services; 4. will not share or disclose user identifiers, passwords, cipher keys or computer dial port telephone numbers; and 5. in the event the Buyer Assets are confidential, will not copy, disclose or leave such assets unsecured or unattended. Buyer may periodically audit Supplier's ’s data residing on Buyer Assets.

Appears in 1 contract

Sources: Solutions Engagement Agreement (Halifax Corp)