Computer-Based Resources. (i) Prior to the Trigger Date, Company shall continue to have reasonable access to the Information Systems of Genworth (whether directly or remotely, and including reasonable physical or logical entry or access) consistent and in accordance with the Data Protection and Cyber Security Policy. On and after the Trigger Date, Company shall not have access to all or any part of the Information Systems of Genworth, except to the extent, and consistent and in accordance with the Data Protection and Cyber Security Policy, necessary for Company to perform Company Services or receive and enjoy the full benefit of, the Genworth Services (subject to Company complying with Genworth’s security policies, procedures and requirements (including physical security, network access, and confidentiality and personal data security guidelines); provided, that Company has had a commercially reasonable period of time in which to comply with such security measures). (ii) Prior to the Trigger Date, Genworth shall continue to have reasonable access to the Information Systems of Company (whether directly or remotely, and including reasonable physical or logical entry or access). On and after the Trigger Date, Genworth shall not have access to all or any part of the Information Systems of Company, except to the extent necessary for Genworth to perform the Genworth Services or receive and enjoy the full benefit of, Company Services (subject to Genworth complying with the Company’s security policies, procedures and requirements (including physical security, network access, and confidentiality and personal data security guidelines); provided, that Genworth has had a commercially reasonable period of time in which to comply with such security measures).
Appears in 5 contracts
Samples: Shared Services Agreement (Enact Holdings, Inc.), Shared Services Agreement (Enact Holdings, Inc.), Shared Services Agreement (Enact Holdings, Inc.)
Computer-Based Resources. (i) Prior to the Trigger Date, Company shall continue to have reasonable access to the Information Systems of Genworth (whether directly or remotely, and including reasonable physical or logical entry or access) consistent and in accordance with the Data Protection and Cyber Security Policy. On and after the Trigger Date, Company shall not have access to all or any part of the Information Systems of Genworth, except to the extent, and consistent and in accordance with the Data Protection and Cyber Security Policy, necessary for Company to perform Company Services or receive and enjoy the full benefit of, the Genworth Services (subject to Company complying with GenworthXxxxxxxx’s security policies, procedures and requirements (including physical security, network access, and confidentiality and personal data security guidelines); provided, that Company has had a commercially reasonable period of time in which to comply with such security measures).
(ii) Prior to the Trigger Date, Genworth shall continue to have reasonable access to the Information Systems of Company (whether directly or remotely, and including reasonable physical or logical entry or access). On and after the Trigger Date, Genworth shall not have access to all or any part of the Information Systems of Company, except to the extent necessary for Genworth to perform the Genworth Services or receive and enjoy the full benefit of, Company Services (subject to Genworth complying with the Company’s security policies, procedures and requirements (including physical security, network access, and confidentiality and personal data security guidelines); provided, that Genworth has had a commercially reasonable period of time in which to comply with such security measures).
Appears in 1 contract