Common use of Computer Matters Clause in Contracts

Computer Matters. Subject to any policies and procedures provided as set forth in Article XII above, to the extent that the Transition Services include a party’s access to computer support systems or electronic data storage systems of the other party or its Affiliates, whether on-site or through remote facilities, the accessing party shall use such computer support systems solely for the purpose of providing or receiving Transition Services. An accessing party or its Affiliates shall not access or attempt to access any computer system, electronic file, software or other electronic services other than those specifically required to accomplish or receive the Transition Services required under this Agreement. Under no circumstances shall either party’s personnel access any networks or facilities of the other party for the purpose of accessing other external networks, nor shall any such capabilities for such access be published or made known via any medium, as for example and not by way of limitation, posting on bulletin boards or E-mail. Any such use or publication shall be a material breach of this Agreement. Neither party shall use back doors, data capture routines, games, viruses, worms or Trojan horses, and any intentional introduction of such into the other party’s data networks shall be deemed a material breach of this Agreement. The party receiving access shall limit such access to those of its employees whom the other party has authorized in writing to have such access in connection with this Agreement or the applicable Transition Service, and shall strictly follow all security rules and procedures for use of the providing party’s electronic resources. All user identification numbers and passwords and any information obtained as a result of access to and use of a party’s computer and electronic data storage systems shall be deemed to be, and shall be treated as, Confidential Information under applicable provisions of the Confidentiality Agreement. Each party agrees to cooperate with the other in the investigation of any apparent unauthorized access to a party’s computer or electronic data storage systems.

Appears in 2 contracts

Samples: Transition Services Agreement (Fairpoint Communications Inc), Transition Services Agreement

AutoNDA by SimpleDocs

Computer Matters. Subject to any policies and procedures provided as set forth in Article XII Articles IV and XI above, to the extent that the Transition Services include a party’s access to computer support systems or electronic data storage systems of the other party or its Affiliates, whether on-site or through remote facilities, the accessing party shall use such computer support systems solely for the purpose of providing or receiving Transition Services. An accessing party or its Affiliates shall not access or attempt to access any computer system, electronic file, software or other electronic services other than those specifically required to accomplish or receive the Transition Services required under this Agreement. Under no circumstances shall either party’s personnel access any networks or facilities of the other party for the purpose of accessing other external networks, nor shall any such capabilities for such access be published or made known via any medium, as for example and not by way of limitation, posting on bulletin boards or E-mail. Any such use or publication shall be a material breach of this Agreement. Neither party shall use back doors, data capture routines, games, viruses, worms or Trojan horses, and any intentional introduction of such into the other party’s data networks shall be deemed a material breach of this Agreement. The party receiving access shall limit such access to those of its employees whom the other party has authorized in writing to have such access in connection with this Agreement or the applicable Transition Service, and shall strictly follow all security rules and procedures for use of the providing party’s electronic resources. All user identification numbers and passwords and any information obtained as a result of access to and use of a party’s computer and electronic data storage systems shall be deemed to be, and shall be treated as, Confidential Information under applicable provisions of the Confidentiality AgreementArticle IV. Each party agrees to cooperate with the other in the investigation of any apparent unauthorized access to a party’s computer or electronic data storage systems. Moreover, with respect to any access to or use of Supplier systems or databases, by SpinCo, SpinCo agree to abide by Supplier’s then-current data security practices or requirements applicable to such access.

Appears in 2 contracts

Samples: Transition Services Agreement (Idearc Inc.), Transition Services Agreement (Idearc Inc.)

Computer Matters. Subject to any policies and procedures provided as set forth in Article XII above, to the extent that the Transition Services include a party’s access to computer support systems or electronic data storage systems of the other party or its Affiliates, whether on-site or through remote facilities, the accessing party shall use such computer support systems solely for the purpose of providing or receiving Transition Services. An accessing party or its Affiliates shall not access or attempt to access any computer system, electronic file, software or other electronic services other than those specifically required to accomplish or receive the Transition Services required under this Agreement. Under no circumstances shall either party’s personnel access any networks or facilities of the other party for the purpose of accessing other external networks, nor shall any such capabilities for such access be published or made known via any medium, as for example and not by way of limitation, posting on bulletin boards or E-mail. Any such use or publication shall be a material breach of this Agreement. Neither party shall use back doors, data capture routines, games, viruses, worms or Trojan horses, and any intentional introduction of such into the other party’s data networks shall be deemed a material breach of this Agreement. The party receiving access shall limit such access to those of its employees whom the other party has authorized in writing to have such access in connection with this Agreement or the applicable Transition Service, and shall strictly follow all security rules and procedures for use of the providing party’s electronic resources. All user identification numbers and passwords and any information obtained as a result of access to and use of a party’s computer and electronic data storage systems shall be deemed to be, and shall be treated as, Confidential Information under applicable provisions of the Confidentiality Non-Disclosure Agreement. Each party agrees to cooperate with the other in the investigation of any apparent unauthorized access to a party’s computer or electronic data storage systems.

Appears in 1 contract

Samples: Transition Services Agreement (Hawaiian Telcom Communications, Inc.)

AutoNDA by SimpleDocs

Computer Matters. Subject to any policies and procedures provided as set forth in Article XII above, to the extent that the Transition Services include a party’s 's access to computer support systems or electronic data storage systems of the other party or its Affiliates, whether on-site or through remote facilities, the accessing party shall use such computer support systems solely for the purpose of providing or receiving Transition Services. An accessing party or its Affiliates shall not access or attempt to access any computer system, electronic file, software or other electronic services other than those specifically required to accomplish or receive the Transition Services required under this Agreement. Under no circumstances shall either party’s 's personnel access any networks or facilities of the other party for the purpose of accessing other external networks, nor shall any such capabilities for such access be published or made known via any medium, as for example and not by way of limitation, posting on bulletin boards or E-mail. Any such use or publication shall be a material breach of this Agreement. Neither party shall use back doors, data capture routines, games, viruses, worms or Trojan horses, and any intentional introduction of such into the other party’s 's data networks shall be deemed a material breach of this Agreement. The party receiving access shall limit such access to those of its employees whom the other party has authorized in writing to have such access in connection with this Agreement or the applicable Transition Service, and shall strictly follow all security rules and procedures for use of the providing party’s 's electronic resources. All user identification numbers and passwords and any information obtained as a result of access to and use of a party’s 's computer and electronic data storage systems shall be deemed to be, and shall be treated as, Confidential Information under applicable provisions of the Confidentiality Agreement. Each party agrees to cooperate with the other in the investigation of any apparent unauthorized access to a party’s 's computer or electronic data storage systems.

Appears in 1 contract

Samples: Iv Transition Services Agreement (Fairpoint Communications Inc)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!