Equipment and Network Security Sample Clauses

Equipment and Network Security. Any equipment or hardware that Company shall use to provide the Services shall remain the property of Company and/or its subsidiaries, affiliates, partners or contractors. If Client or an Affiliate provides Company with remote access to Client’s (or an Affiliate’s) computer systems, other equipment or personal property (“Client’s Systems”), then any and all information relating to such remote access shall be considered Client’s Confidential Information and shall be subject to the obligations of confidentiality set forth in Section 9 (Confidentiality) of the Agreement. Company shall not download, install or access any software application on Client’s Systems without Client’s written permission (which written permission can take the form of an email from the Client project manager designated on the applicable order).
AutoNDA by SimpleDocs
Equipment and Network Security. If access to Owner’s computer systems, other equipment or personal property (“Owner’s Systems”) is required in order for Contractor to fulfill its obligations to Owner pursuant to this Contract, then Owner shall determine the nature and extent of such access. If Owner provides Contractor with remote access to Owner’s Systems, then any and all information generated by or relating to such remote access shall be considered Owner’s Confidential Information and shall be subject to the obligations of confidentiality set forth in Sections 9.5(1) through (5) above. In addition, any and all access to and use of Owner’s Systems shall be subject to the following: • Owner’s Systems shall be used solely to perform the Services for Owner, and such Systems shall not be used for any purpose other than as provided for in this Contract. • Access to Owner’s Systems shall be restricted to Contractor’s employees who need access in order for Contractor to fulfill its Services and obligations under this Contract; which employees shall be identified to and approved by Owner prior to such access; and no access rights will be granted or transferred to any other individuals without the prior written consent of Owner. • Contractor will ensure that its employees do not attempt to decode, break, bypass or otherwise circumvent Owner’s or an Owner’s affiliate’s security system, or attempt to obtain access to any programs or data beyond the scope of the access granted by Owner in writing. • Contractor will ensure that it maintains, during the term of the Contract, current versions of anti-virus/malware software. • Without limiting any of its other rights, Owner reserves the right to restrict and monitor the use of Owner’s Systems, and Owner shall have the right to access, seize, modify, copy and disclose any information, data or files developed, processed, transmitted, displayed, reproduced orotherwise accessed in conjunction with such use. Owner may exercise its rights reserved hereunder: (i) to verify the performance of Services or the quality of deliverables provided for in this Contract; (ii) to assure compliance by any and all Contractor Responsible Parties with Owner’s policies and procedures;
Equipment and Network Security. If access to Citi’s or an Affiliate’s computer systems, other equipment or personal property (“Citi’s Systems”) is required in order for Provider to fulfill its obligations to Citi, then Citi shall determine the nature and extent of such access. If Citi or an Affiliate provides Provider with remote access to Citi’s Systems, then any and all information relating to such remote access shall be considered Citi’s Confidential Information and shall be subject to the obligations of confidentiality set forth in Section 8 of the Agreement. In addition, any and all access to Citi’s Systems shall be subject to the following.
Equipment and Network Security. If access to Licensee’s or an Affiliate’s computer systems, other equipment or personal property (“Licensee’s Systems”) is required in order for Licensor to fulfill its services obligations to Licensee, then Licensee shall determine the nature and extent of such access. If Licensee or an Affiliate provides Licensor with remote access to Licensee’s Systems, then any and all information relating to such remote access shall be considered Licensee’s Confidential Information and shall be subject to the obligations of confidentiality set forth in Section 12 above. In addition, any and all access to Licensee’s Systems shall be subject to the following.
Equipment and Network Security. If access to Citi’s Systems is required in order for CONTRACTOR to fulfill its obligations to Citi, then Citi will determine the nature and extent of access. If Citi or a Citi Affiliate provides CONTRACTOR with access to Citi’s Systems, then: (i) any and all information relating to or resulting from this access is considered Citi’s Confidential Information and is subject to the obligations of confidentiality set forth in Section 10 (Confidential Information), and

Related to Equipment and Network Security

  • Aircraft This peril includes self-propelled missiles and spacecraft.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Engines POSITION SERIAL NO. TOTAL HOURS TOTAL CYCLES HRS/CYCLES SINCE LAST SHOP VISIT Time Remaining to Next LIFE LIMITED PART REMOVAL PART NAME HOURS CYCLES MSN MSN

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Maintenance of Securities and Cash at Bank and Subcustodian Locations Unless Instructions specifically require another location acceptable to the Bank:

  • Equipment and Supplies Independent Contractor, at Independent Contractor's sole expense, shall provide all equipment, tools and supplies necessary to perform the Service.

  • Equipment The Fund shall obtain and maintain at its own cost and expense all equipment and services, including but not limited to communications services, necessary for it to utilize the Software and obtain access to the System, and Custodian shall not be responsible for the reliability or availability of any such equipment or services.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

Time is Money Join Law Insider Premium to draft better contracts faster.