Computer Information and Access Sample Clauses

Computer Information and Access. Unisys shall comply with Customer rules concerning access to computers of Customer and its Affiliates and use of computer data and Software, as specified in Exhibit 16 (Customer Policies).
AutoNDA by SimpleDocs
Computer Information and Access comScore will comply with all rules of Citadel concerning access to Citadel’s computers and use of computer data and software. Prior to performing any Services pursuant to this Agreement, comScore’s personnel shall execute Citadel’s standard forms concerning access protection and data/software security. Citadel shall issue to comScore personnel access mechanisms including, but not limited to, access IDs, passwords, and access cards that are to be used only by the comScore personnel to whom they are issued. Citadel’s computer data and software shall be used by comScore personnel only in connection with comScore’s obligations hereunder. Failure of comScore to comply with these rules may result in Citadel restricting offending personnel from access to Citadel computer systems or immediate termination of this Agreement.
Computer Information and Access. Prior to performing any services pursuant to this Agreement, Contractor's personnel who will access Client computer data and software, including the Client Data, shall execute Client's standard forms concerning access protection and data/software security. Contractor covenants that at all times during the Term, it, its employees, agents, and Subcontractors, shall, as communicated by Client to Contractor: (i) comply with all applicable Client policies and procedures regarding data access and security and those policies and procedures prohibiting or restricting remote access to Client's systems and data; (ii) comply with applicable Client network connectivity procedures; and (iii) use all resources that, under Section 3.3, are not required to be dedicated exclusively to the use or benefit of Client, in a manner that complies with such applicable Client policies and procedures. Contractor shall issue to the Contractor Personnel access mechanisms including access IDs, passwords, and 16 access cards that are to be used only by such personnel to whom they are issued. Contractor shall provide to such personnel only such level of access as is required to perform the tasks and functions for which such personnel are responsible. The Client Data shall be used by Contractor Personnel only in connection with Contractor's obligations hereunder, and shall not be commercially exploited by Contractor. Failure of Contractor to comply with these rules may result in Client restricting offending personnel from access to Client computer systems. Contractor shall maintain and ensure the confidentiality and security of the Client Data in accordance with the terms of this Agreement and in no event shall any Contractor action or inaction result in any situations that are less secure than either the security Client maintained as of the Service Commencement Date or the security Contractor then maintains for its own similar systems and data.
Computer Information and Access. Prior to performing any Services pursuant to this Agreement, Amdocs’ personnel who will access Sprint computer data and software, including the Sprint Data, will execute Sprint’s standard forms, to the extent they exist, concerning access protection and data/software security. At all times during the Term, Amdocs will ensure that it, its employees, agents and Subcontractors, comply with all Sprint policies and procedures regarding data access and security, including those prohibiting or restricting remote access to Sprint’s systems and data; provided however, that Sprint acknowledges that Amdocs will require remote access to perform certain of the Services hereunder. Sprint will provide copies of any such policies to, and discuss any such policies with, Amdocs. Amdocs will issue to Amdocs’ personnel access mechanisms including, but not limited to, access IDs, passwords, and access cards that are to be used only by such personnel to whom they are issued. Amdocs will provide to such personnel only such level of access as is required to perform the tasks and functions for which such personnel are responsible. Amdocs will from time to time provide Sprint with an updated list of those Amdocs personnel having the highest level of access to Sprint’s systems, software and data. The Sprint Data will be used by Amdocs personnel only in connection with Amdocs’ obligations hereunder, and will not be commercially exploited by Amdocs with Third Parties. Failure of Amdocs to comply with these rules may result in Sprint restricting offending personnel from access to Sprint computer systems. Amdocs will maintain and ensure the confidentiality and security of the Sprint Data. To the extent applicable, the provisions of this paragraph (b) will apply, mutatis mutandis, with regard to Sprint’s employees, agents and Subcontractors, if any, who will have access to Amdocs’ computers, data and software.
Computer Information and Access. Prior to performing any services pursuant to this Agreement, the Acxiom Personnel shall execute Allstate's standard forms concerning access protection and data/software security in the form attached hereto as Schedule 9.2.1. Computer data and software shall be used by Acxiom Personnel only in connection with Acxiom's obligations hereunder. Failure of Acxiom to comply with these rules may result in Allstate restricting offending personnel from access to Allstate computer systems or data, or if such failure is willful, reckless or grossly negligent, immediate termination of this Agreement.
Computer Information and Access. Vendor will comply with all rules of Nextel concerning access to Nextel’s computers and use of computer data and software, including those set forth on Schedule 13.1.3 and any others communicated by Nextel to Vendor. Prior to performing any Services pursuant to this Agreement, Vendor’s personnel shall execute Nextel’s standard forms concerning access protection and data/software security. Nextel shall issue to Vendor personnel access mechanisms including, but not limited to, access Ids, passwords, and access cards that are to be used only by the Vendor personnel to whom they are issued. Nextel’s computer data and software shall be used by Vendor personnel only in connection with Vendor’s obligations hereunder. Failure of Vendor to comply with these rules may result in Nextel restricting offending personnel from access to Nextel computer systems or immediate termination of this Agreement.

Related to Computer Information and Access

  • Information and Access 5.1 The Customer shall:

  • Sharing of Information and Access In the event that any Junior Priority Agent shall, in the exercise of its rights under the applicable Junior Priority Collateral Documents or otherwise, receive possession or control of any books and records of any Credit Party that contain information identifying or pertaining to the Collateral, such Junior Priority Agent shall, upon request from any other Agent, and as promptly as practicable thereafter, either make available to such Agent such books and records for inspection and duplication or provide to such Agent copies thereof. In the event that any Senior Priority Agent shall, in the exercise of its rights under the applicable Senior Priority Collateral Documents or otherwise, receive possession or control of any books and records of any Senior Priority Credit Party that contain information identifying or pertaining to the Collateral, such Agent shall, upon request from any other Senior Priority Agent, and as promptly as practicable thereafter, either make available to such Agent such books and records for inspection and duplication or provide to such Agent copies thereof.

  • Records and Access The Advisor, in the conduct of its responsibilities to the Company, shall maintain adequate and separate books and records for the Company’s operations in accordance with GAAP, which shall be supported by sufficient documentation to ascertain that such books and records are properly and accurately recorded. Such books and records shall be the property of the Company and shall be available for inspection by the Board and by counsel, auditors and other authorized agents of the Company, at any time or from time to time during normal business hours. The Advisor shall at all reasonable times have access to the books and records of the Company and the Operating Partnership.

  • Member Information a. ODM, or its designee, will provide membership notices, informational materials, and instructional materials to members and eligible individuals in a manner and format that may be easily understood. At least annually, ODM or its designee will provide current MCP members with an open enrollment notice which describes the managed care program and includes information on the MCP options in the service area and other information regarding the managed care program as specified in 42 CFR 438.10.

  • Inspection and Access Landlord and its agents, representatives, and contractors may enter the Premises at any reasonable time to inspect the Premises and to make such repairs as may be required or permitted pursuant to this Lease and for any other business purpose. Landlord and Landlord’s representatives may enter the Premises during business hours on not less than 48 hours advance written notice (except in the case of emergencies in which case no such notice shall be required and such entry may be at any time) for the purpose of effecting any such repairs, inspecting the Premises, showing the Premises to prospective purchasers and, during the last year of the Term, to prospective tenants or for any other business purpose. Landlord may erect a suitable sign on the Premises stating the Premises are available to let or that the Project is available for sale. Landlord may grant easements, make public dedications, designate Common Areas and create restrictions on or about the Premises, provided that no such easement, dedication, designation or restriction materially, adversely affects Tenant’s use or occupancy of the Premises for the Permitted Use. At Landlord’s request, Tenant shall execute such instruments as may be necessary for such easements, dedications or restrictions. Tenant shall at all times, except in the case of emergencies, have the right to escort Landlord or its agents, representatives, contractors or guests while the same are in the Premises, provided such escort does not materially and adversely affect Landlord’s access rights hereunder.

  • REPORTS AND ACCESS The Advisor agrees to supply such information to the Fund’s administrator and to permit such compliance inspections by the Fund’s administrator as shall be reasonably necessary to permit the administrator to satisfy its obligations and respond to the reasonable requests of the Board of Trustees.

  • Seller Information The Company may require each seller of Registrable Securities as to which any registration is being effected to furnish, and such seller shall furnish, to the Company such information regarding the distribution of such securities as the Company may from time to time reasonably request in writing.

  • Buyer Information True and complete copies of all documents listed in the Buyer Disclosure Schedule have been made available or provided to Seller. The books of account, stock record books and other financial and corporate records of Buyer and the Buyer Subsidiaries, all of which have been made available to Seller, are complete and correct in all material respects.

  • Confidentiality/Protection of Customer Information The Company shall keep confidential and shall not divulge to any party, without the Purchaser's prior written consent, the price paid by the Purchaser for the Mortgage Loans, except to the extent that it is reasonable and necessary for the Company to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies. Each party agrees that it shall comply with all applicable laws and regulations regarding the privacy or security of Customer Information and shall maintain appropriate administrative, technical and physical safeguards to protect the security, confidentiality and integrity of Customer Information, including maintaining security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information, 66 Fed. Reg. 8616 (the "Interagency Guidelines"). For purposes of this Section, the term "Customer Information" shall have the meaning assigned to it in the Interagency Guidelines.

  • Purchaser Information Each Purchaser covenants that it will promptly notify the Company of any changes in the information set forth in the Registration Statement regarding such Purchaser or such Purchaser's "Plan of Distribution."

Time is Money Join Law Insider Premium to draft better contracts faster.