Cooperation and Access. (a) Service Recipients shall cooperate with the Service Providers to the extent necessary or appropriate to facilitate the performance of the Services in accordance with the terms of this Agreement. Without limiting the generality of the foregoing, (i) each Party shall make available on a timely basis to the other Party all information and materials requested by such Party to the extent reasonably necessary for the performance or receipt of the Services, (ii) each Party shall, and shall cause the members of its Group to, upon reasonable notice, give or cause to be given to the other Party and its Affiliates and Sub-Contractors reasonable access, during regular business hours and at such other times as are reasonably required, to the relevant premises and personnel to the extent reasonably necessary for the performance or receipt of the Services and (iii) each Party shall, and shall cause the members of its Group to, give the other Party and its Affiliates and Sub-Contractors reasonable access to, and all necessary rights to utilize, such Party’s, and its Group’s, information, facilities, personnel, assets, systems and technologies to the extent reasonably necessary for the performance or receipt of the Services. (b) Each Party shall (and shall cause the members of its Group and its personnel and the personnel of its Affiliates and Sub-Contractors providing or receiving Services to): (i) not attempt to obtain access to or use any information technology systems of the other Party or any member of its Group, or any confidential Information, Personal Data or competitively sensitive information owned, used or Processed by the other Party, except where it has been granted in writing the right to do so or, to the extent reasonably necessary to do so, to provide or receive Services; (ii) maintain reasonable security measures to protect the systems of the other Party and the members of its Group to which it has access pursuant to this Agreement from access by unauthorized third parties; (iii) follow applicable Laws and all of the other Party’s security rules, access agreements, and procedures for restricting access and use, when allowed, to such other Party’s information technology systems; (iv) when on the property of the other Party or any of its Affiliates, or when given access to any facilities, infrastructure or personnel of the other Party or any of its Affiliates, follow applicable Laws and all of the other Party’s policies and procedures concerning health, safety, conduct and security which are made known to the Party receiving such access from time to time and (v) not disable, damage or erase or disrupt, interfere with or impair the normal operation of the information technology systems of the other Party or any member of its Group. (c) Service Provider shall (i) immediately notify Service Recipient of any confirmed misuse, disclosure or loss of, or inability to account for, any Personal Data or any confidential or competitively sensitive Information, and any confirmed unauthorized access to Service Provider’s facilities, systems or network, in each case, solely to the extent related to the Service Recipient; and Service Provider will investigate such confirmed security incidents and reasonably cooperate with Service Recipient’s incident response team, supplying logs and other necessary information to mitigate and limit the damages resulting from such a security incident; provided that the Service Recipient agrees to reimburse Service Provider for time spent and actual travel expenses incurred in connection with any such investigation; and (ii) subject to applicable Law, use commercially reasonable efforts to comply with any commercially reasonable requests to assist Service Recipient with its electronic discovery obligations related to Services provided to the Service Recipient; provided that the Service Recipient agrees to reimburse Service Provider for time spent and actual travel expenses incurred for such response. (d) In the event of a security breach that relates to the Services, the Parties shall, subject to any applicable Law, reasonably cooperate with each other regarding the timing and manner of (a) notification to their respective customers, potential customers, employees or agents concerning a breach or potential breach of security and (b) disclosures to appropriate Governmental Authorities. (e) Notwithstanding anything to the contrary in this Agreement (but subject to the following proviso), any Personal Data transferred or otherwise made available to the other Party in connection with the Services shall be subject to the Data Transfer Agreement, and each Party agrees to abide by the applicable provisions thereof, to the extent related to such data; provided, however, that any Personal Data provided by Service Recipient to Service Provider under this Agreement shall only be used to the extent reasonably necessary for Service Provider to provide Services and solely for the applicable term of such Services.
Appears in 5 contracts
Samples: Transition Services Agreement (Resideo Technologies, Inc.), Transition Services Agreement (Garrett Motion Inc.), Transition Services Agreement (Garrett Motion Inc.)
Cooperation and Access. (a) Subject to the other terms and conditions of this Agreement, Service Recipients shall cooperate with the Service Providers to the extent necessary or appropriate to facilitate the performance of the Services in accordance with the terms of this Agreement. Without limiting the generality of the foregoing, subject to Section 10.05, (i) each Party shall make available on a timely basis to the other Party all information and materials requested by such Party to the extent reasonably necessary for the performance or receipt of the Services, (ii) each Party shall, and shall cause the members of its Group to, upon reasonable notice, give or cause to be given to the other Party and its Affiliates and Sub-Contractors reasonable access, during regular business hours and at such other times as are reasonably required, to the relevant premises and personnel to the extent reasonably necessary for the performance or receipt of the Services and (iii) each Party shall, and shall cause the members of its Group to, give the other Party and its Affiliates and Sub-Contractors reasonable access to, and all necessary rights to utilize, such Party’s, and its Group’s, information, facilities, personnel, assets, systems and technologies to the extent reasonably necessary for the performance or receipt of the Services.
(b) Each Party shall (and shall cause the members of its Group and its personnel and the personnel of its Affiliates and Sub-Contractors providing or receiving Services to): (i) not attempt to obtain access to or use any information technology systems of the other Party or any member of its Group, or any confidential Information, Personal Data or competitively sensitive information owned, used or Processed by the other Party, except where it has been granted in writing the right to do so or, to the extent reasonably necessary to do so, to provide or receive Services; (ii) maintain reasonable security measures to protect the systems of the other Party and the members of its Group to which it has access pursuant to this Agreement from access by unauthorized third parties; (iii) follow applicable Laws and all of the other Party’s security rules, access agreements, and procedures for restricting access and use, when allowed, to such other Party’s information technology systems; (iv) when on the property of the other Party or any of its Affiliates, or when given access to any facilities, infrastructure or personnel of the other Party or any of its Affiliates, follow applicable Laws and all of the other Party’s policies and procedures concerning health, safety, conduct and security which are made known to the Party receiving such access from time to time and (v) not disable, damage or erase or disrupt, interfere with or impair the normal operation of the information technology systems of the other Party or any member of its Group.
(c) Service Provider shall (i) immediately notify Service Recipient of any confirmed misuse, disclosure or loss of, or inability to account for, any Personal Data or any confidential or competitively sensitive Information, and any confirmed unauthorized access to Service Provider’s facilities, systems or network, in each case, solely to the extent related to the Service Recipient; and Service Provider will investigate such confirmed security incidents and reasonably cooperate with Service Recipient’s incident response team, supplying logs and other necessary information to mitigate and limit the damages resulting from such a security incident; provided that the Service Recipient agrees to reimburse Service Provider for time spent and actual travel expenses incurred in connection with any such investigation; and (ii) subject to applicable Law, use commercially reasonable efforts to comply with any commercially reasonable requests to assist Service Recipient with its electronic discovery obligations related to Services provided to the Service Recipient; provided that the Service Recipient agrees to reimburse Service Provider for time spent and actual travel expenses incurred for such response.
(d) In the event of a security breach that relates to the Services, the Parties shall, subject to any applicable Law, reasonably cooperate with each other regarding the timing and manner of (a) notification to their respective customers, potential customers, employees or agents concerning a breach or potential breach of security and (b) disclosures to appropriate Governmental Authorities.
(e) Notwithstanding anything to the contrary in this Agreement (but subject to the following proviso), any Personal Data transferred or otherwise made available to the other Party in connection with the Services shall be subject to the Data Transfer Agreementany data transfer agreement required by applicable law, and each Party agrees to abide by the applicable provisions thereof, to the extent related to such data; provided, however, that any Personal Data provided by Service Recipient to Service Provider under this Agreement shall only be used to the extent reasonably necessary for Service Provider to provide Services and solely for the applicable term of such Services.
Appears in 4 contracts
Samples: Transition Services Agreement (Cerence Inc.), Transition Services Agreement (Nuance Communications, Inc.), Transition Services Agreement (Cerence LLC)
Cooperation and Access. (a) Service Recipients shall cooperate with the Service Providers to the extent necessary or appropriate to facilitate the performance of the Services in accordance with the terms of this Agreement. Without limiting the generality of the foregoing, (i) each Party shall make available on a timely basis to the other Party all information and materials requested by such Party to the extent reasonably necessary for the performance or receipt of the Services, (ii) each Party shall, and shall cause the members of its Group to, upon reasonable notice, give or cause to be given to the other Party and its Affiliates and Sub-Contractors reasonable access, during regular business hours and at such other times as are reasonably required, to the relevant premises and personnel to the extent reasonably necessary for the performance or receipt of the Services and (iii) each Party shall, and shall cause the members of its Group to, give the other Party and its Affiliates and Sub-Contractors reasonable access to, and all necessary rights to utilize, such Party’s, and its Group’s, information, facilities, personnel, assets, systems and technologies to the extent reasonably necessary for the performance or receipt of the Services.
(b) Each Party shall (and shall cause the members of its Group and its personnel and the personnel of its Affiliates and Sub-Contractors providing or receiving Services to): (i) not attempt to obtain access to or use any information technology systems of the other Party or any member of its Group, or any confidential Information, Personal Data or competitively sensitive information owned, used or Processed processed by the other Party, except where it has been granted in writing the right to do so or, to the extent reasonably necessary to do so, to provide or receive Services; (ii) maintain reasonable security measures to protect the systems of the other Party and the members of its Group to which it has access pursuant to this Agreement from access by unauthorized third parties; (iii) follow applicable Laws and all of the other Party’s security rules, access agreements, and procedures for restricting access and use, when allowed, to such other Party’s information technology systems; (iv) when on the property of the other Party or any of its Affiliates, or when given access to any facilities, infrastructure or personnel of the other Party or any of its Affiliates, follow applicable Laws and all of the other Party’s policies and procedures concerning health, safety, conduct and security which are made known to the Party receiving such access from time to time and (v) not disable, damage or erase or disrupt, interfere with or impair the normal operation of the information technology systems of the other Party or any member of its Group.
(c) Service Provider shall (i) immediately notify Service Recipient of any confirmed misuse, disclosure or loss of, or inability to account for, any Personal Data or any confidential or competitively sensitive Informationinformation, and any confirmed unauthorized access to Service Provider’s facilities, systems or network, in each case, solely to the extent related to the Service Recipient; and Service Provider will investigate such confirmed security incidents and reasonably cooperate with Service Recipient’s incident response team, supplying logs and other necessary information to mitigate and limit the damages resulting from such a security incident; provided that the Service Recipient agrees to reimburse Service Provider for time spent and actual travel expenses incurred in connection with any such investigation; and (ii) subject to applicable Law, use commercially reasonable efforts to comply with any commercially reasonable requests to assist Service Recipient with its electronic discovery obligations related to Services provided to the Service Recipient; provided that the Service Recipient agrees to reimburse Service Provider for time spent and actual travel expenses incurred for such response.
(d) In the event of a security breach that relates to the Services, the Parties shall, subject to any applicable Law, reasonably cooperate with each other regarding the timing and manner of (a) notification to their respective customers, potential customers, employees or agents concerning a breach or potential breach of security and (b) disclosures to appropriate Governmental Authorities.
(e) Notwithstanding anything to the contrary in this Agreement (but subject to the following proviso), any Personal Data transferred or otherwise made available to the other Party in connection with the Services shall be subject to the Data Transfer Agreement, and each Party agrees to abide by the applicable provisions thereof, to the extent related to such data; provided, however, that any Personal Data provided by Service Recipient to Service Provider under this Agreement shall only be used to the extent reasonably necessary for Service Provider to provide Services and solely for the applicable term of such Services.
Appears in 1 contract
Samples: Transition Services Agreement (Garrett Transportation Systems Inc.)
Cooperation and Access. (a1) Each Party, whether as Service Recipients Provider or Receiver as specified in the applicable Exhibit to Schedule A, shall cause its employees to reasonably cooperate with employees of the Service Providers other Party to the extent necessary required for effective provision or appropriate to facilitate the performance receipt of the Services and in accordance with support of the terms continuation, and orderly and timely transition, of this Agreementthe Purchased Business. Without limiting the generality of the foregoing, :
(ia) each Party shall make available on designate a timely basis to the other Party all information and materials requested by such Party to the extent reasonably necessary point of contact person who shall be responsible for the performance or day-to-day receipt of (as Receiver) or performance of the ServicesServices (as the Service Provider) under, this Agreement (iicollectively, the “Transition Services Representatives”), including attempted resolution of any issues that may arise during the performance of either Party’s obligations hereunder;
(b) the Parties agree, through their Transition Services Representatives, to, in writing, attempt to correct or clarify the description of the Services specified in Schedule A in the event that such description is incomplete or unclear;
(c) each Party shall, and shall cause the members use commercially reasonable efforts to ensure that those of its Group topersonnel whose decisions are necessary for, upon reasonable noticerespectively, give or cause to be given to the other Party and its Affiliates and Sub-Contractors reasonable access, during regular business hours and at such other times as are reasonably required, to the relevant premises and personnel to the extent reasonably necessary for the performance or receipt of the Services and are available, upon the reasonable request of the other Party, at reasonable times, for consultation on any matter relating to, respectively, such performance or receipt the Services;
(iiid) each Party shall, and shall cause the members of its Group to, give promptly provide to the other Party such information (including copies of data and its Affiliates and Sub-Contractors reasonable access todocuments) as may be reasonably requested by the other Party in writing, and all necessary rights that is readily available to utilize, such Party’s, and its Group’s, information, facilities, personnel, assets, systems and technologies Party relating to the extent reasonably necessary for Services;
(e) the performance or Parties shall cooperate with each other in connection with the provision and receipt of the Services., including by developing reasonable procedures with respect to information sharing, transfer of data and similar matters; and
(bf) Each each Party shall (and shall cause the members of its Group and its personnel and the personnel of its Affiliates and Sub-Contractors providing or receiving Services to): (i) not attempt to obtain access to or use any information technology systems of agrees that it shall, without charge, provide the other Party or any member of its Group, or any confidential Information, Personal Data or competitively sensitive information owned, used or Processed by the other with such access to such Party, except where it has been granted in writing the right to do so or, to the extent ’s systems and personnel and facilities as may reasonably necessary to do so, to provide or receive Services; (ii) maintain reasonable security measures to protect the systems of be required for the other Party and to obtain or provide (as applicable) the members of its Group to which it Services. If a Party has access pursuant (either on-site or remotely) to this Agreement from access by unauthorized third parties; (iii) follow applicable Laws and all any of the other Party’s security rulescomputer systems and/or information, access agreements, and procedures for restricting access and use, when allowed, to such Party shall (i) comply with the other Party’s information technology systemsapplicable policies and procedures (including security); and (ivii) when on limit such access solely to the property use of such systems for purposes of receiving or providing (as applicable) the other Party Services and shall not access or attempt to access any of its Affiliates, or when given access to any facilities, infrastructure or personnel of the other Party or any of its Affiliates, follow applicable Laws and all of the other Party’s policies and procedures concerning healthcomputer systems, safetyfiles, conduct and security which are made known to the Party receiving such access from time to time and software or services other than those required for its receipt or provision (vas applicable) not disable, damage or erase or disrupt, interfere with or impair the normal operation of the information technology systems of the other Party Services, or any member of its Groupthose that are publicly available (e.g., public websites).
(c2) Service Provider The Transition Services Representatives shall (i) immediately notify Service Recipient meet not less than monthly to review performance of any confirmed misuse, disclosure or loss of, or inability to account for, any Personal Data or any confidential or competitively sensitive Information, and any confirmed unauthorized access to Service Provider’s facilities, systems or network, in each case, solely to the extent related to the Service Recipient; and Service Provider will investigate such confirmed security incidents and reasonably cooperate with Service Recipient’s incident response team, supplying logs and other necessary information to mitigate and limit the damages resulting from such a security incident; provided that the Service Recipient agrees to reimburse Service Provider for time spent and actual travel expenses incurred in connection with any such investigation; and (ii) subject to applicable Law, use commercially reasonable efforts to comply with any commercially reasonable requests to assist Service Recipient with its electronic discovery obligations related to Services provided to the Service Recipient; provided that the Service Recipient agrees to reimburse Service Provider for time spent and actual travel expenses incurred for such response.
(d) In the event of a security breach that relates to the Services, the Parties shall, subject to any applicable Law, reasonably cooperate with each other regarding the timing and manner of (a) notification to their respective customers, potential customers, employees or agents concerning a breach or potential breach of security and (b) disclosures to appropriate Governmental Authorities.
(e) Notwithstanding anything to the contrary in this Agreement (but subject to the following proviso)service levels, any Personal Data transferred or otherwise made available to the other Party resourcing challenges and any matters that may then be in connection with the Services shall be subject to the Data Transfer Agreement, and each Party agrees to abide by the applicable provisions thereof, to the extent related to such data; provided, however, that any Personal Data provided by Service Recipient to Service Provider under this Agreement shall only be used to the extent reasonably necessary for Service Provider to provide Services and solely for the applicable term of such ServicesDispute.
Appears in 1 contract
Cooperation and Access. (a1) Service Recipients Each Party shall cause its employees to reasonably cooperate with employees of the Service Providers other Party to the extent necessary or appropriate to facilitate the performance required for effective provision of the Services in accordance with the terms of this AgreementServices. Without limiting the generality of the foregoing, :
(ia) each Party shall make designate a point of contact person who shall be responsible for the daytoday implementation of this Agreement (collectively, the “Transition Services Representatives”), including attempted resolution of any issues that may arise during the performance of either Party’s obligations hereunder;
(b) the Parties agree to correct or clarify the description of the Services specified in Schedule A in the event that such description is incomplete or unclear;
(c) each Party shall use commercially reasonable efforts to ensure that those of its personnel whose decisions are necessary for the performance and receipt of the Services are available at all reasonable times for consultation on a timely basis any matter relating to the Services;
(d) each Party shall promptly provide to the other Party all information (including copies of data and materials requested documents) readily available to such Party and other assistance reasonably required by such Party relating to the extent reasonably necessary for Services;
(e) the performance or Parties shall cooperate with each other in connection with the provision and receipt of the Services, including by developing reasonable procedures with respect to information sharing, transfer of data and similar matters; and
(iif) each Party agrees that it shall, and shall cause the members of its Group towithout charge, upon reasonable notice, give or cause to be given to provide the other Party and its Affiliates and Sub-Contractors reasonable access, during regular business hours and at with such other times as are reasonably required, access to the relevant premises such Party’s systems and personnel to the extent and facilities as may reasonably necessary be required for the performance or receipt of the Services and (iii) each Party shall, and shall cause the members of its Group to, give the other Party and its Affiliates and Sub-Contractors reasonable access to, and all necessary rights to utilize, such Party’s, and its Group’s, information, facilities, personnel, assets, systems and technologies to the extent reasonably necessary for the performance obtain or receipt of provide (as applicable) the Services.
(b) Each . If a Party shall (and shall cause the members of its Group and its personnel and the personnel of its Affiliates and Sub-Contractors providing or receiving Services to): (i) not attempt to obtain access to or use any information technology systems of the other Party or any member of its Group, or any confidential Information, Personal Data or competitively sensitive information owned, used or Processed by the other Party, except where it has been granted in writing the right to do so or, to the extent reasonably necessary to do so, to provide or receive Services; (ii) maintain reasonable security measures to protect the systems of the other Party and the members of its Group to which it has access pursuant (either on-site or remotely) to this Agreement from access by unauthorized third parties; (iii) follow applicable Laws and all any of the other Party’s security rulescomputer systems and/or information, access agreements, and procedures for restricting access and use, when allowed, to such Party shall (i) comply with the other Party’s information technology systemsapplicable policies and procedures (including security); and (ivii) when on limit such access solely to the property use of such systems for purposes of receiving or providing (as applicable) the other Party Services and shall not access or attempt to access any of its Affiliates, or when given access to any facilities, infrastructure or personnel of the other Party or any of its Affiliates, follow applicable Laws and all of the other Party’s policies and procedures concerning healthcomputer systems, safetyfiles, conduct and security which are made known to the Party receiving such access from time to time and software or services other than those required for its receipt or provision (vas applicable) not disable, damage or erase or disrupt, interfere with or impair the normal operation of the information technology systems of the other Party or any member of its Group.
(c) Service Provider shall (i) immediately notify Service Recipient of any confirmed misuse, disclosure or loss of, or inability to account for, any Personal Data or any confidential or competitively sensitive Information, and any confirmed unauthorized access to Service Provider’s facilities, systems or network, in each case, solely to the extent related to the Service Recipient; and Service Provider will investigate such confirmed security incidents and reasonably cooperate with Service Recipient’s incident response team, supplying logs and other necessary information to mitigate and limit the damages resulting from such a security incident; provided that the Service Recipient agrees to reimburse Service Provider for time spent and actual travel expenses incurred in connection with any such investigation; and (ii) subject to applicable Law, use commercially reasonable efforts to comply with any commercially reasonable requests to assist Service Recipient with its electronic discovery obligations related to Services provided to the Service Recipient; provided that the Service Recipient agrees to reimburse Service Provider for time spent and actual travel expenses incurred for such response.
(d) In the event of a security breach that relates to the Services, the Parties shallor those that are publicly available (e.g., subject to any applicable Law, reasonably cooperate with each other regarding the timing and manner of (a) notification to their respective customers, potential customers, employees or agents concerning a breach or potential breach of security and (b) disclosures to appropriate Governmental Authoritiespublic websites).
(e) Notwithstanding anything to the contrary in this Agreement (but subject to the following proviso), any Personal Data transferred or otherwise made available to the other Party in connection with the Services shall be subject to the Data Transfer Agreement, and each Party agrees to abide by the applicable provisions thereof, to the extent related to such data; provided, however, that any Personal Data provided by Service Recipient to Service Provider under this Agreement shall only be used to the extent reasonably necessary for Service Provider to provide Services and solely for the applicable term of such Services.
Appears in 1 contract
Samples: Asset Purchase Agreement (Rayonier Advanced Materials Inc.)