Facilities and Systems Security. If either party or its personnel will be given access to the other party’s facilities, premises, equipment or systems, such party will comply with all such other party’s written security policies, procedures and requirements made available by each party to the other, and will not tamper with, compromise, or circumvent any security or audit measures employed by such other party. Each party shall use its reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.
Appears in 9 contracts
Samples: Merger Agreement (Stratex Networks Inc), Merger Agreement (Harris Corp /De/), Transition Services Agreement (Harris Stratex Networks, Inc.)
Facilities and Systems Security. If either party Party or its personnel will shall be given access to the other partyParty’s facilities, premises, equipment or systems, such party will Party shall comply with all such other partyParty’s written security policies, procedures and requirements made available by each party Party to the other, and will shall not tamper with, compromise, or circumvent any security or audit measures employed by such other partyParty. Each party Party shall use its reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party Party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.
Appears in 4 contracts
Samples: Operating Agreement (Celera CORP), Operating Agreement (Celera CORP), Operating Agreement (Applied Biosystems Inc.)
Facilities and Systems Security. If either party or its personnel will be given access to the other party’s facilities, premises, equipment or systems, such party will comply with all such other party’s written security policies, procedures and requirements made available by each party to the other, and will not tamper with, compromise, or circumvent any security or audit measures employed by such other party. Each party shall use its reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.. [SIGNATURE PAGE FOLLOWS]
Appears in 1 contract
Facilities and Systems Security. If either party or its personnel will be given access to the other party’s facilities, premises, equipment or systems, such party will comply with all such other party’s written security policies, procedures and requirements made available by each party to the other, and will not tamper with, compromise, or circumvent any security or audit measures employed by such other party. Each party shall use its commercially reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.. ****************************************
Appears in 1 contract