Computer-Based Resources Sample Clauses

Computer-Based Resources. (i) Prior to the Trigger Date, Company shall continue to have reasonable access to the Information Systems of Genworth (whether directly or remotely, and including reasonable physical or logical entry or access) consistent and in accordance with the Data Protection and Cyber Security Policy. On and after the Trigger Date, Company shall not have access to all or any part of the Information Systems of Genworth, except to the extent, and consistent and in accordance with the Data Protection and Cyber Security Policy, necessary for Company to perform Company Services or receive and enjoy the full benefit of, the Genworth Services (subject to Company complying with Genworth’s security policies, procedures and requirements (including physical security, network access, and confidentiality and personal data security guidelines); provided, that Company has had a commercially reasonable period of time in which to comply with such security measures). (ii) Prior to the Trigger Date, Genworth shall continue to have reasonable access to the Information Systems of Company (whether directly or remotely, and including reasonable physical or logical entry or access). On and after the Trigger Date, Genworth shall not have access to all or any part of the Information Systems of Company, except to the extent necessary for Genworth to perform the Genworth Services or receive and enjoy the full benefit of, Company Services (subject to Genworth complying with the Company’s security policies, procedures and requirements (including physical security, network access, and confidentiality and personal data security guidelines); provided, that Genworth has had a commercially reasonable period of time in which to comply with such security measures).
AutoNDA by SimpleDocs
Computer-Based Resources. (a) Prior to the Trigger Date, Mortgage Entities shall continue to have access to the Information Systems of GEMH and its Subsidiaries. On and after the Trigger Date, Mortgage Entities shall not have any right to access all or any part of the Information Systems of GEMH or any of its Subsidiaries, except to the extent necessary for any Mortgage Entity to receive the GEMH Services or implement the Operating Plan (in addition and not in limitation of Section 2.05, subject to Mortgage Services complying with all reasonable security measures implemented by GEMH as deemed necessary by GEMH to protect its Information Systems and the Information Systems of its Subsidiaries, provided, that Mortgage Entities have had a commercially reasonable period of time to comply with such security measures). (b) Prior to the Trigger Date, GEMH and its Subsidiaries shall continue to have access to the Information Systems of the Mortgage Entities. On and after the Trigger Date neither GEMH nor its Subsidiaries shall have any right to access all or any part of the Information Systems of Mortgage Entities, except to the extent necessary for GEMH and its Subsidiaries to perform the GEMH Services (in addition and not in limitation of Section 2.05, subject to GEMH and its Subsidiaries complying with all reasonable security measures implemented by the applicable Mortgage Entity as deemed necessary by Mortgage Entities to protest their respective Information Systems; provided, that GEMH and its Subsidiaries have had a commercially reasonable period of time to comply with such security measures). (c) In addition but not in limitation of Section 12.06, notwithstanding the foregoing, Mortgage Services and GEMH acknowledge and agree that any information received by Mortgage Services, GEMH or any of their respective Subsidiaries through the access by such Party or by any of its Subsidiaries shall not be used by such Party and such Party shall cause its Subsidiaries not to use such information, for purposes other than provisions of GEMH Services hereunder, in case of GEMH and its Subsidiaries, and receipt of the GEMH Services and provision of MS Services, in case of Mortgage Entities.
Computer-Based Resources. Helix and Cal Dive agree that (i) prior to the Trigger Date, the Recipient Group will continue to have access to the Information Systems of the Provider Group, and (ii) on and after the Trigger Date, the Recipient Group will not have access to all or any part of the Information Systems of the Provider Group, except to the extent necessary for the Recipient Group to receive the Services (subject to the Recipient Group complying with all reasonable security measures implemented by the Provider Group as deemed necessary by the Provider Group to protect its Information Systems; provided, that, the Recipient Group has had a commercially reasonable period of time in which to comply with such security measures).
Computer-Based Resources. (a) Management Services and Entertainment agree that after the Distribution Date, the Entertainment Group will not have access to all or any part of the Information Systems of the CCU Group, except to the extent necessary for the Entertainment Group to receive the Services (subject to the Entertainment Group complying with all reasonable security measures implemented by the CCU Group as deemed necessary by the CCU Group to protect its Information Systems; provided, that, the Entertainment Group has had a commercially reasonable period of time in which to comply with such security measures). (b) Management Services and Entertainment agree that after the Distribution Date, the CCU Group will not have access to all or any part of the Information Systems of the Entertainment Group, except to the extent necessary for the CCU Group to perform the Services (subject to the CCU Group complying with all reasonable security measures implemented by the Entertainment Group as deemed necessary by the Entertainment Group to protect its Information Systems; provided, that, the CCU Group has had a commercially reasonable period of time in which to comply with such security measures).
Computer-Based Resources. (a) Management Services and Outdoor agree that (i) prior to the Trigger Date, the Outdoor Group will continue to have access to the Information Systems of the CCU Group, and (ii) on and after the Trigger Date, the Outdoor Group will not have access to all or any part of the Information Systems of the CCU Group, except to the extent necessary for the Outdoor Group to receive the Services (subject to the Outdoor Group complying with all reasonable security measures implemented by the CCU Group as deemed necessary by the CCU Group to protect its Information Systems; provided, that, the Outdoor Group has had a commercially reasonable period of time in which to comply with such security measures). (b) Management Services and Outdoor agree that (i) prior to the Trigger Date, the CCU Group will continue to have access to the Information Systems of the Outdoor Group, and (ii) on and after the Trigger Date, the CCU Group will not have access to all or any part of the Information Systems of the Outdoor Group, except to the extent necessary for the CCU Group to perform the Services (subject to the CCU Group complying with all reasonable security measures implemented by the Outdoor Group as deemed necessary by the Outdoor Group to protect its Information Systems; provided, that, the CCU Group has had a commercially reasonable period of time in which to comply with such security measures).
Computer-Based Resources. Each party (the “Accessing Party”) shall continue to have access to the Information Systems of the other party (the “Providing Party”), to the extent such access to such Information Systems was available to the Accessing Party immediately prior to the Closing and remains necessary for the Accessing Party to operate its business; provided, that (a) the LBHI Entities may take reasonable measures to restrict access by the LAMCO Entities to any systems or data unrelated to the Asset Management Business, (b) the LAMCO Entities may take reasonable measures to restrict access by the LBHI Entities, to any systems or data unrelated to the LBHI Business, and (c) such continued access shall be subject to the Accessing Party complying with all reasonable security measures implemented by the Providing Party as deemed necessary by such Providing Party to protect its Information Systems.
Computer-Based Resources. (a) Management Services and CCOH agree that the Outdoor Group will not have access to all or any part of the Information Systems of the iHeart Group pursuant to this Agreement, except to the extent necessary for the Outdoor Group to receive the Services (subject to the Outdoor Group complying with all reasonable security measures implemented by the iHeart Group as deemed necessary by the iHeart Group to protect its Information Systems). (b) Management Services and CCOH agree that the iHeart Group will not have access to all or any part of the Information Systems of the Outdoor Group pursuant to this Agreement, except to the extent necessary for the iHeart Group to perform the Services (subject to the iHeart Group complying with all reasonable security measures implemented by the Outdoor Group as deemed necessary by the Outdoor Group to protect its Information Systems).
AutoNDA by SimpleDocs
Computer-Based Resources. (a) Prior to the Trigger Date, the Company shall continue to have access to the Information Systems of GE. On and after the Trigger Date, the Company shall not have access to all or any part of the Information Systems of GE, except to the extent necessary for the Company to perform the Company Services or receive the GE Services (subject to the Company complying with all reasonable security measures implemented by GE as deemed necessary by GE to protect its Information Systems, provided that the Company has had a commercially reasonable period of time in which to comply with such security measures). (b) Prior to the Trigger Date, GE shall continue to have access to the Information Systems of the Company. On and after the Trigger Date, GE shall not have access to all or any part of the Information Systems of the Company, except to the extent necessary for GE to perform the GE Services or receive the Company Services (subject to GE complying with all reasonable security measures implemented by the Company as deemed necessary by the Company to protect its Information Systems, provided that GE has had a commercially reasonable period of time in which to comply with such security measures).
Computer-Based Resources. (a) Alon LP and Brands agree that (i) prior to the Trigger Date, the Brands Group will continue to have access to the Information Systems of the Alon USA Group, and (ii) on and after the Trigger Date, the Brands Group will not have access to all or any part of the Information Systems of the Alon USA Group, except to the extent necessary for the Brands Group to receive the Services (subject to the Brands Group complying with all reasonable security measures implemented by the Alon USA Group as deemed necessary by the Alon USA Group to protect its Information Systems; provided, that, the Brands Group has had a commercially reasonable period of time in which to comply with such security measures). (b) Alon LP and Brands agree that (i) prior to the Trigger Date, the Alon USA Group will continue to have access to the Information Systems of the Brands Group, and (ii) on and after the Trigger Date, the Alon USA Group will not have access to all or any part of the Information Systems of the Brands Group, except to the extent necessary for the Alon USA Group to perform the Services (subject to the Alon USA Group complying with all reasonable security measures implemented by the Brands Group as deemed necessary by the Brands Group to protect its Information Systems; provided, that, the Alon USA Group has had a commercially reasonable period of time in which to comply with such security measures).
Computer-Based Resources. Commencing on the Commencement Date, and for twenty four (24) months thereafter, each party (the “Accessing Party”) shall continue to have access to the Information Systems owned or controlled by the other party (the “Providing Party”), to the extent such access to such Information Systems was available to the Accessing Party immediately prior to the 15 September 2008 and remains necessary for the Accessing Party to operate its operations, assets or properties; provided, that (a) Xxxxxx Europe may take reasonable measures to restrict access by the LBHI Entities to any systems or data unrelated to the needs of LBHI Entities (b) the LBHI Entities may take reasonable measures to restrict access by Xxxxxx Europe, to any systems or data unrelated to the needs of Xxxxxx Europe, (c) such continued access shall be subject to the Accessing Party complying with all reasonable security measures implemented by the Providing Party as deemed necessary by such Providing Party to protect its Information Systems and (d) the Providing Party shall not be obliged to continue access if the Providing Party is unable to do so due to regulatory or legal restrictions or it is no longer technically possible to do so in which event the Providing Party shall notify the Accessing Party and the parties shall enter into good faith discussions in order to determine whether suitable alternative arrangements can be put in place and if so, the nature of such arrangements (the costs of which shall be included within the Services Charges).
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!