Computer Information and Access Sample Clauses

Computer Information and Access. Unisys shall comply with Customer rules concerning access to computers of Customer and its Affiliates and use of computer data and Software, as specified in Exhibit 16 (Customer Policies).
AutoNDA by SimpleDocs
Computer Information and Access comScore will comply with all rules of Citadel concerning access to Citadel’s computers and use of computer data and software. Prior to performing any Services pursuant to this Agreement, comScore’s personnel shall execute Citadel’s standard forms concerning access protection and data/software security. Citadel shall issue to comScore personnel access mechanisms including, but not limited to, access IDs, passwords, and access cards that are to be used only by the comScore personnel to whom they are issued. Citadel’s computer data and software shall be used by comScore personnel only in connection with comScore’s obligations hereunder. Failure of comScore to comply with these rules may result in Citadel restricting offending personnel from access to Citadel computer systems or immediate termination of this Agreement.
Computer Information and Access. Prior to performing any services pursuant to this Agreement, Contractor's personnel who will access Client computer data and software, including the Client Data, shall execute Client's standard forms concerning access protection and data/software security. Contractor covenants that at all times during the Term, it, its employees, agents, and Subcontractors, shall, as communicated by Client to Contractor: (i) comply with all applicable Client policies and procedures regarding data access and security and those policies and procedures prohibiting or restricting remote access to Client's systems and data; (ii) comply with applicable Client network connectivity procedures; and (iii) use all resources that, under Section 3.3, are not required to be dedicated exclusively to the use or benefit of Client, in a manner that complies with such applicable Client policies and procedures. Contractor shall issue to the Contractor Personnel access mechanisms including access IDs, passwords, and 16 access cards that are to be used only by such personnel to whom they are issued. Contractor shall provide to such personnel only such level of access as is required to perform the tasks and functions for which such personnel are responsible. The Client Data shall be used by Contractor Personnel only in connection with Contractor's obligations hereunder, and shall not be commercially exploited by Contractor. Failure of Contractor to comply with these rules may result in Client restricting offending personnel from access to Client computer systems. Contractor shall maintain and ensure the confidentiality and security of the Client Data in accordance with the terms of this Agreement and in no event shall any Contractor action or inaction result in any situations that are less secure than either the security Client maintained as of the Service Commencement Date or the security Contractor then maintains for its own similar systems and data.
Computer Information and Access. Prior to performing any services pursuant to this Agreement, Amdocs' personnel who will access Sprint computer data and software, including the Sprint Data, shall execute Sprint's standard forms, to the extent they exist, concerning access protection and data/software security. At all times during the Term, Amdocs shall ensure that it, its employees, agents and Subcontractors, comply with all Sprint policies and procedures regarding data access and security, including those prohibiting or restricting remote access to Sprint's systems and data; provided however, that Sprint acknowledges that Amdocs shall require remote access to perform certain of the Services hereunder. Sprint shall provide copies of any such policies to, and discuss any such policies with, Amdocs. Amdocs shall issue to Amdocs' personnel access mechanisms including, but not limited to, access IDs, passwords, and access cards that are to be used only by such personnel to whom they are issued. Amdocs shall provide to such personnel only such level of access as is required to perform the tasks and functions for which such personnel are responsible. Amdocs shall from time to time provide Sprint with an updated list of those Amdocs personnel having the highest level of access to Sprint's systems, software and data. The Sprint Data shall be used by Amdocs personnel only in connection with Amdocs' obligations hereunder, and shall not be commercially exploited by Amdocs with Third Parties. Failure of Amdocs to comply with these rules may result in Sprint restricting offending personnel from access to Sprint computer systems. Amdocs shall maintain and ensure the confidentiality and security of the Sprint Data. To the extent applicable, the provisions of this paragraph (b) shall apply, mutatis mutandis, with regard to Sprint's employees, agents and Subcontractors, if any, who will have access to Amdocs' computers, data and software.
Computer Information and Access. Vendor will comply with all rules of Nextel concerning access to Nextel’s computers and use of computer data and software, including those set forth on Schedule 13.1.3 and any others communicated by Nextel to Vendor. Prior to performing any Services pursuant to this Agreement, Vendor’s personnel shall execute Nextel’s standard forms concerning access protection and data/software security. Nextel shall issue to Vendor personnel access mechanisms including, but not limited to, access Ids, passwords, and access cards that are to be used only by the Vendor personnel to whom they are issued. Nextel’s computer data and software shall be used by Vendor personnel only in connection with Vendor’s obligations hereunder. Failure of Vendor to comply with these rules may result in Nextel restricting offending personnel from access to Nextel computer systems or immediate termination of this Agreement.
Computer Information and Access. Prior to performing any services pursuant to this Agreement, the Acxiom Personnel shall execute Allstate's standard forms concerning access protection and data/software security in the form attached hereto as Schedule 9.2.1. Computer data and software shall be used by Acxiom Personnel only in connection with Acxiom's obligations hereunder. Failure of Acxiom to comply with these rules may result in Allstate restricting offending personnel from access to Allstate computer systems or data, or if such failure is willful, reckless or grossly negligent, immediate termination of this Agreement.

Related to Computer Information and Access

  • Information and Access (a) The Company and Parent each shall (and shall cause its Subsidiaries to, and shall use its commercially reasonable efforts to cause, its and their respective Representatives to), upon the reasonable request by the other, furnish to the other, as promptly as practicable, with all information concerning itself, its Representatives and such other matters as may be necessary or advisable in connection with the Schedule 14D-9 or Schedule TO (including with respect to Parent, information concerning the Investors) and any information or documentation to effect the expiration of all waiting periods under applicable Antitrust Laws and all filings, notices, reports, consents, registrations, approvals, permits and authorizations, made or sought by or on behalf of Parent, the Company or any of their respective Affiliates to or from any third party, including any Governmental Entity, in each case necessary or advisable in connection with the Transactions and, with respect to the information supplied in writing by or on behalf of Parent, its Affiliates or its or their respective Representatives for inclusion in or incorporation by reference into the Schedule 14D-9, including with respect to the Investors. Each of Parent and the Company acknowledges and agrees that such information supplied by it pursuant to this Section 7.8(a) (as applicable) will be correct and complete in all material respects at the time so supplied. (b) In addition to and without limiting the rights and obligations set forth in Section 7.8(a), the Company shall (and shall cause its Subsidiaries to), upon reasonable prior notice, afford Parent and its Representatives reasonable access, during normal business hours, from the date of this Agreement and continuing until the earlier of the Effective Time and the termination of this Agreement pursuant to Article IX, to the Company Employees, agents, properties, offices and other facilities, Contracts, books and records, and, during such period, the Company shall (and shall cause its Subsidiaries to) furnish promptly to Parent all other information and documents concerning or regarding its businesses, properties and assets and personnel as may reasonably be requested by or on behalf of Parent; provided, however, that, subject to compliance with the obligations set forth in Section 7.8(c): (i) neither the Company nor any of its Subsidiaries shall be required to provide such access or furnish such information or documents to the extent doing so would, in the reasonable opinion of the Company’s outside legal counsel result in (A) a violation of applicable Law, (B) the breach of any contractual confidentiality obligations in any Contract with a third party entered into prior to the date of this Agreement or following the date of this Agreement in compliance with Section 7.1 and Section 7.2; (C) waive the protection of any attorney-client privilege or protection (including attorney-client privilege, attorney work-product protections and confidentiality protections) or any other applicable privilege or protection concerning pending or threatened Proceedings, in any material respect; or (D) such information or documents are reasonably pertinent to any adverse Proceeding between the Company and its Affiliates, on the one hand, and Parent and its Affiliates, on the other hand (subject to any rules or guidelines of discovery applicable to such adverse Proceeding); and (ii) in no event shall the work papers of the Company’s and its Subsidiaries’ independent accountants and auditors be accessible to Parent or any of its Representative unless and until such accountants and auditors have provided a consent related thereto in form and substance reasonably acceptable to such auditors or independent accountants. Any investigation conducted pursuant to the access contemplated by this Section 7.8(b) will be conducted in a manner that does not unreasonably interfere with the conduct of the business of the Company and its Subsidiaries and that would not reasonably be expected to create a risk of damage or destruction to any property or assets of the Company or its Subsidiaries. Any access to the properties of the Company and its Subsidiaries shall be subject to the Company’s reasonable security measures and insurance requirements and shall not include the right to perform any “invasive” testing or soil, air or groundwater sampling, including any Phase II environmental assessments. All requests for such access or information made pursuant to this Section 7.8(b) shall be initially directed to the Person set forth on Section 7.8(b) of the Company Disclosure Schedule, which Person may be replaced by the Company at any time by providing written notice to Parent, and any access granted in connection with a request made pursuant to this Section 7.8(b) shall be supervised by such Persons. (c) In the event that the Company objects to any request submitted pursuant to Section 7.8(b) on the basis of one or more of the matters set forth in clause (i) of Section 7.8(b), it must do so by providing Parent, in reasonable detail, the nature of what is being prevented and/or withheld and the reasons and reasonable support therefor, and prior to preventing such access or withholding such information or documents from Parent and its Representatives, the Company shall cooperate with Parent to make appropriate substitute arrangements to permit reasonable disclosure that does not suffer from any of the impediments expressly set forth in clause (i) of Section 7.8(b) (other than clause (D)) including through the use of commercially reasonable efforts to take such actions and implement appropriate and mutually agreeable measures to as promptly as practicable permit such access and the furnishing of such information and documents in a manner to remove the basis for the objection, including by arrangement of appropriate “counsel-to-counsel” disclosure, clean room procedures, redaction and other customary procedures, entry into a customary joint defense agreement and, with respect to the contractual confidentiality obligations contemplated by clause (i)(B) of Section 7.8(b), obtaining a waiver with respect to or consent under such contractual confidentiality obligations. (d) Without limiting the generality of the other provisions of this Section 7.8, the Company and Parent, as each deems advisable and necessary, after consultation with their respective outside legal counsel, may reasonably designate competitively sensitive information and documents (including those that relate to valuation of the Company or Parent (as the case may be)) as “Outside Counsel Only Information.” Such information and documents shall only be provided to the outside legal counsel of the Company or Parent (as the case may be), or subject to such other similar restrictions mutually agreed to by the Company and Parent, and subject to any amendment, supplement or other modification to the Confidentiality Agreement or additional confidentiality or joint defense agreement between or among the Company and Parent; provided, however, that, subject to any applicable Laws relating to the exchange of information, the outside legal counsel receiving such information and documents may prepare one or more reports summarizing the results of any analysis of any such shared information and documents, and disclose such reports, other summaries or aggregated information derived from such shared information and documents to Representatives of such outside legal counsel’s client. (e) No access or information provided to Parent or any of its Representatives or to the Company or any of its Representatives following the date of this Agreement, whether pursuant to this Section 7.8 or otherwise, shall affect or be deemed to affect, modify or waive the representations and warranties of the Parties set forth in this Agreement and, for the avoidance of doubt, all information and documents disclosed or otherwise made available pursuant to Section 7.5, Section 7.6, this Section 7.8 or otherwise in connection with this Agreement and the Transactions shall be governed by the terms and conditions of the Confidentiality Agreement mutatis mutandis as if Parent were Counterparty (as defined in the Confidentiality Agreement) and subject to applicable Laws relating to the exchange or sharing of information and any restrictions or requirements imposed by any Governmental Entity; provided, that, in the event of a conflict, the provisions of Section 7.13 shall override any conflicting provisions of the Confidentiality Agreement, and any Person who is a potential source of, or may provide, equity, debt or any other type of financing to Parent or any of its Representatives in connection with the Transactions shall be deemed a “Representative” for purposes of the Confidentiality Agreement without the prior written consent of the Company.

  • Power Supply Information and Access to Information POWER SUPPLY INFORMATION

  • Cooperation and Access The Cooperative Member agrees that it will cooperate in compliance with any reasonable requests for information and/or records made by the Cooperative. The Cooperative reserves the right to audit the relevant records of any Cooperative Member. Any breach of this provision shall be considered material and shall make the Agreement subject to termination on ten (10) days written notice to the Cooperative Member.

  • Records Retention and Access 1. Grantee will keep and maintain, as applicable, accurate and complete records necessary to determine compliance with this Contract and applicable laws. 2. Grantee will provide access to its records to DFPS, the Texas State Auditor’s Office (SAO), the Federal Government, and their authorized representatives. 3. Unless otherwise specified in this Contract, Grantee will maintain legible copies of this Contract and all related documentation for a minimum of seven years after the termination of this Contract or seven years after the completion of any litigation or dispute involving the Contract, whichever is longer. 4. THE GRANTEE WILL NOT DISPOSE OF RECORDS BEFORE PROVIDING THE DFPS CONTRACT MANAGER WRITTEN NOTICE OF ITS INTENT TO DISPOSE OF RECORDS AND RECEIVING WRITTEN APPROVAL FROM THE DFPS CONTRACT MANAGER.

  • Records and Access The Advisor, in the conduct of its responsibilities to the Company, shall maintain adequate and separate books and records for the Company’s operations in accordance with GAAP, which shall be supported by sufficient documentation to ascertain that such books and records are properly and accurately recorded. Such books and records shall be the property of the Company and shall be available for inspection by the Board and by counsel, auditors and other authorized agents of the Company, at any time or from time to time during normal business hours. The Advisor shall at all reasonable times have access to the books and records of the Company and the Operating Partnership.

  • User Information Any user or usage data or information collected via Station’s digital properties or related to Station’s digital properties, or any information collected from websites operated by Station’s affiliates under this Agreement, shall be the property of Station and/or such affiliates. Advertiser shall have no rights in such information by virtue of this Agreement.

  • Member Information a. ODM, or its designee, will provide membership notices, informational materials, and instructional materials to members and eligible individuals in a manner and format that may be easily understood. At least annually, ODM or its designee will provide current MCP members with an open enrollment notice which describes the managed care program and includes information on the MCP options in the service area and other information regarding the managed care program as specified in 42 CFR 438.10. b. ODM will notify members or ask the MCP to notify members about significant changes affecting contractual requirements, member services or access to providers. c. If the MCP elects not to provide, reimburse, or cover a counseling service or referral service due to an objection to the service on moral or religious grounds, ODM will provide coverage and reimbursement for these services for the MCP’s members. d. As applicable, ODM will provide information to MCP members on what services the MCP will not cover and how and where the MCP’s members may obtain these services.

  • - CLEC INFORMATION 3.1 Except as otherwise required by law, CenturyLink will not provide or establish Interconnection, Unbundled Network Elements, ancillary services and/or resale of Telecommunications Services in accordance with the terms and conditions of this Agreement prior to CLEC's execution of this Agreement. The Parties shall complete CenturyLink's "New Customer Questionnaire," as it applies to CLEC's obtaining of Interconnection, Unbundled Network Elements, ancillary services, and/or resale of Telecommunications Services hereunder. 3.2 Prior to placing any orders for services under this Agreement, the Parties will jointly complete the following sections of CenturyLink's "New Customer Questionnaire:" General Information Billing and Collection (Section 1) Credit Information Billing Information Summary Billing OSS and Network Outage Notification Contact Information System Administration Contact Information Ordering Information for LIS Trunks, Collocation, and Associated Products (if CLEC plans to order these services) Design Layout Request – LIS Trunking and Unbundled Loop (if CLEC plans to order these services) 3.2.1 The remainder of this questionnaire must be completed within two (2) weeks of completing the initial portion of the questionnaire. This questionnaire will be used to: Determine geographical requirements; Identify CLEC identification codes; Determine CenturyLink system requirements to support CLEC's specific activity; Collect credit information; Obtain Billing information; Create summary bills; Establish input and output requirements; Create and distribute CenturyLink and CLEC contact lists; and Identify CLEC hours and holidays. 3.2.2 CLECs that have previously completed a Questionnaire need not fill out a New Customer Questionnaire; however, CLEC will update its New Customer Questionnaire with any changes in the required information that have occurred and communicate those changes to CenturyLink. Before placing an order for a new product, CLEC will need to complete the relevant New Product Questionnaire and amend this Agreement.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Inspection and Access Landlord and its agents, representatives, and contractors may enter the Premises at any reasonable time to inspect the Premises and to make such repairs as may be required or permitted pursuant to this Lease and for any other business purpose. Landlord and Landlord’s representatives may enter the Premises during business hours on not less than 48 hours advance written notice (except in the case of emergencies in which case no such notice shall be required and such entry may be at any time) for the purpose of effecting any such repairs, inspecting the Premises, showing the Premises to prospective purchasers and, during the last year of the Term, to prospective tenants or for any other business purpose. Landlord may erect a suitable sign on the Premises stating the Premises are available to let or that the Project is available for sale. Landlord may grant easements, make public dedications, designate Common Areas and create restrictions on or about the Premises, provided that no such easement, dedication, designation or restriction materially, adversely affects Tenant’s use or occupancy of the Premises for the Permitted Use. At Landlord’s request, Tenant shall execute such instruments as may be necessary for such easements, dedications or restrictions. Tenant shall at all times, except in the case of emergencies, have the right to escort Landlord or its agents, representatives, contractors or guests while the same are in the Premises, provided such escort does not materially and adversely affect Landlord’s access rights hereunder.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!