We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Equipment and Network Security Sample Clauses

Equipment and Network Security. Any equipment or hardware that Company shall use to provide the Services shall remain the property of Company and/or its subsidiaries, affiliates, partners or contractors. If Client or an Affiliate provides Company with remote access to Client’s (or an Affiliate’s) computer systems, other equipment or personal property (“Client’s Systems”), then any and all information relating to such remote access shall be considered Client’s Confidential Information and shall be subject to the obligations of confidentiality set forth in Section 9 (Confidentiality) of the Agreement. Company shall not download, install or access any software application on Client’s Systems without Client’s written permission (which written permission can take the form of an email from the Client project manager designated on the applicable order).
Equipment and Network Security. If access to Owner’s computer systems, other equipment or personal property (“Owner’s Systems”) is required in order for Contractor to fulfill its obligations to Owner pursuant to this Contract, then Owner shall determine the nature and extent of such access. If Owner provides Contractor with remote access to Owner’s Systems, then any and all information generated by or relating to such remote access shall be considered Owner’s Confidential Information and shall be subject to the obligations of confidentiality set forth in Sections 9.5(1) through (5) above. In addition, any and all access to and use of Owner’s Systems shall be subject to the following: • Owner’s Systems shall be used solely to perform the Services for Owner, and such Systems shall not be used for any purpose other than as provided for in this Contract. • Access to Owner’s Systems shall be restricted to Contractor’s employees who need access in order for Contractor to fulfill its Services and obligations under this Contract; which employees shall be identified to and approved by Owner prior to such access; and no access rights will be granted or transferred to any other individuals without the prior written consent of Owner. • Contractor will ensure that its employees do not attempt to decode, break, bypass or otherwise circumvent Owner’s or an Owner’s affiliate’s security system, or attempt to obtain access to any programs or data beyond the scope of the access granted by Owner in writing. • Contractor will ensure that it maintains, during the term of the Contract, current versions of anti-virus/malware software. • Without limiting any of its other rights, Owner reserves the right to restrict and monitor the use of Owner’s Systems, and Owner shall have the right to access, seize, modify, copy and disclose any information, data or files developed, processed, transmitted, displayed, reproduced or otherwise accessed in conjunction with such use. Owner may exercise its rights reserved hereunder: (i) to verify the performance of Services or the quality of deliverables provided for in this Contract; (ii) to assure compliance by any and all Contractor Responsible Parties with Owner’s policies and procedures;
Equipment and Network Security. If access to Licensee’s or an Affiliate’s computer systems, other equipment or personal property (“Licensee’s Systems”) is required in order for Licensor to fulfill its services obligations to Licensee, then Licensee shall determine the nature and extent of such access. If Licensee or an Affiliate provides Licensor with remote access to Licensee’s Systems, then any and all information relating to such remote access shall be considered Licensee’s Confidential Information and shall be subject to the obligations of confidentiality set forth in Section 12 above. In addition, any and all access to Licensee’s Systems shall be subject to the following.
Equipment and Network Security. If access to Citi’s or an Affiliate’s computer systems, other equipment or personal property (“Citi’s Systems”) is required in order for Provider to fulfill its obligations to Citi, then Citi shall determine the nature and extent of such access. If Citi or an Affiliate provides Provider with remote access to Citi’s Systems, then any and all information relating to such remote access shall be considered Citi’s Confidential Information and shall be subject to the obligations of confidentiality set forth in Section 8 of the Agreement. In addition, any and all access to Citi’s Systems shall be subject to the following. 1) Citi’s Systems shall be used solely to perform Services for Citi, and shall not be used for any purpose other than the legitimate business purposes of Citi.
Equipment and Network Security. If access to Citi’s Systems is required in order for CONTRACTOR to fulfill its obligations to Citi, then Citi will determine the nature and extent of access. If Citi or a Citi Affiliate provides CONTRACTOR with access to Citi’s Systems, then: (i) any and all information relating to or resulting from this access is considered Citi’s Confidential Information and is subject to the obligations of confidentiality set forth in Section 10 (Confidential Information), and
Equipment and Network Security. If the parties determine that access to Conduit’s computer systems, other equipment or personal property is required in order for Sarborg to fulfill its obligations under this Appendix A, such access shall be subject to the following: ● Conduit’s computer systems shall be used solely to perform the Services for Conduit, and such Conduit’s computer systems shall not be used for any other purpose. ● All information and data generated through access to Conduit’s computer systems shall be Conduit Confidential Information subject to the confidentiality provisions of the Agreement and may not be (i) accessed from outside the United States and/or the Cayman Islands, or (ii) saved or stored to any local storage device or media outside of the Conduit system, unless authorized by Conduit in writing. ● Access shall be restricted to Sarborg’s employees who have a direct need to access Conduit computer systems to perform the Services hereunder and all such employees shall be identified and approved by Conduit prior to such access; and no access rights will be granted or transferred to any other individuals without the prior written consent of Conduit. ● Sarborg will ensure that its employees do not attempt to decode, break, bypass or otherwise circumvent Conduit’s security system, or attempt to obtain access to any programs or data beyond the scope of the access granted by Conduit in writing. ● Sarborg will ensure that it maintains, during the Term, current versions of anti-virus/malware software. ● Without limiting any of its other rights, Conduit reserves the right to restrict access to, and to monitor the use of Conduit’s computer systems. Conduit shall have the right to access, seize, modify, copy and disclose any information, data or files developed, processed, transmitted, displayed, reproduced or otherwise accessed in conjunction with such use. ● For the duration of the Agreement and to the extent necessary to provide the Services, Conduit grants to Sarborg a non-exclusive, non-transferable, revocable, limited right, to access, use, and perform activities on and/or within, Conduit’s information technology networks, systems, software, programs, and equipment (collectively or individually, “IT Environment”) solely for the purposes of providing the Services set forth in the Agreement, provided each party agrees to the manner and configuration in which such access and use shall be granted. Conduit and Sxxxxxx shall approve, in writing, all Sarborg personnel who are ...

Related to Equipment and Network Security

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Equipment and Software To use the Mobile Remote Deposit Services, you must obtain and maintain at your expense, compatible equipment and software that we may specify from time to time.

  • Equipment and Tools 40.01 The Employer will make available all necessary tools and equipment it requires for the performance of work assignments at no cost to the employees. Such tools and equipment will remain the property of the Employer and the employees will be required to take reasonable care of this property and may be required to sign out certain equipment and tools.

  • Customer Equipment “Customer Equipment” means any Customer-owned or provided software, hardware or services that you elect to use in connection with the Service(s). You agree to allow us and our agents the rights to insert CableCARDs and other hardware in the Customer Equipment, send software and/or downloads to the Customer Equipment and install, configure, maintain, inspect and upgrade the Customer Equipment. You warrant you are either the owner of the Customer Equipment or that you have the authority to give us access to the Customer Equipment. You should call Customer Service at 0-000-XXX-XXXX to find out if it meets our technical, security and other requirements. We reserve the right to disallow the use of Customer Equipment that we determine is not compatible with our network. We shall have no obligation to provide, maintain, or service Customer Equipment, including, but not limited to, Customer Equipment to which the Company or a third party has sent software or downloads. If you use Customer Equipment, you agree that the following limitation of liability shall apply: THE COMPANY DOES NOT WARRANT THAT CUSTOMER EQUIPMENT WILL ENABLE YOU TO SUCCESSFULLY INSTALL, ACCESS, OPERATE, OR USE THE SERVICE(S). YOU ACKNOWLEDGE THAT ANY SUCH INSTALLATION, ACCESS, OPERATION, OR USE COULD CAUSE CUSTOMER EQUIPMENT TO FAIL TO OPERATE OR COULD CAUSE DAMAGE TO CUSTOMER EQUIPMENT, YOU, YOUR PREMISES OR COMPANY EQUIPMENT. NEITHER THE COMPANY NOR ANY OF ITS AFFILIATES, SUPPLIERS OR AGENTS SHALL HAVE ANY LIABILITY WHATSOEVER FOR ANY SUCH FAILURE OR DAMAGE, INCLUDING LACK OF 911/E911 CAPABILITY OR DIALING ASSOCIATED WITH A SECURITY SYSTEM. YOUR USE OF CUSTOMER EQUIPMENT MAY PREVENT PROVISION OF SERVICE. The foregoing limitation of liability is in addition to and shall not limit any other limitation of liability set forth in this Agreement.

  • Aircraft This peril includes self-propelled missiles and spacecraft.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Office Equipment The Client must not install any cabling, IT or telecom connections without the Provider’s consent, which the Provider may refuse at its absolute discretion.

  • Electrical Equipment Residents must use only CSA, UL-approved or Canadian-certified electrical equipment; the rated wattage of light fixtures must never be exceeded; and only replacement bulbs supplied by Waterloo maintenance staff may be used. Do not leave any unattended electrical equipment turned on (i.e. hair straighteners, lights etc.)

  • Network Access During its performance of this Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks;

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.