Common use of General Policies Clause in Contracts

General Policies. 9.6.1 Each Party’s resources are for approved this Agreement’s business purposes only. 9.6.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 Authorized users shall not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 9 contracts

Sources: Interconnection Agreement, Interconnection Agreement, Wholesale Agreement

General Policies. 9.6.1 6.2.4.1 Each Party’s resources are for approved this Agreement’s business purposes only. 9.6.2 6.2.4.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 6.2.4.3 Individuals will only be given access to resources that they are authorized to receive receive, and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 6.2.4.4 Authorized users shall must not develop, copy or use any program or code which that circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 6.2.4.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 9 contracts

Sources: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

General Policies. 9.6.1 7.6.1 Each Party’s resources are approved for approved this Agreement’s business purposes only. 9.6.2 7.6.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 7.6.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 7.6.4 Authorized users shall not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 7.6.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 8 contracts

Sources: Peering Agreement, Peering Agreement, Telecommunications

General Policies. 9.6.1 9.5.1 Each Party’s resources are for approved this Agreement’s business purposes only. 9.6.2 9.5.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 9.5.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 9.5.4 Authorized users shall must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 9.5.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 8 contracts

Sources: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

General Policies. 9.6.1 33.11.5.1 Each Party’s resources are for approved this Agreement’s business purposes only. 9.6.2 33.11.5.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 33.11.5.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 33.11.5.4 Authorized users shall must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 33.11.5.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 7 contracts

Sources: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

General Policies. 9.6.1 6.2.4.1 Each Party’s resources are for approved this Agreement’s business purposes only. 9.6.2 6.2.4.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 6.2.4.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 6.2.4.4 Authorized users shall must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 6.2.4.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 6 contracts

Sources: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

General Policies. 9.6.1 8.5.1 Each Party’s resources are for approved this Agreement’s business purposes only. 9.6.2 8.5.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 8.5.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 8.5.4 Authorized users shall must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 8.5.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 5 contracts

Sources: Cellular/PCS Interconnection Agreement, Cellular/PCS Interconnection Agreement, Cellular/PCS Interconnection Agreement

General Policies. 9.6.1 11.5.1 Each Party’s resources are for approved this Agreement’s business purposes only. 9.6.2 11.5.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 11.5.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 11.5.4 Authorized users shall must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 11.5.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 3 contracts

Sources: MFN Agreement, Interconnection Agreement, Missouri 271 Agreement

General Policies. 9.6.1 Each Party’s resources are approved for approved this Agreement’s business purposes only. 9.6.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 Authorized users shall not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 2 contracts

Sources: Telecommunications Agreement, Telecommunications

General Policies. 9.6.1 8.5.1 Each Party’s resources are for approved this Agreement’s business purposes only. 9.6.2 8.5.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 8.5.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 8.5.4 Authorized users shall must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms.. Page 96 of 108 9.6.5 8.5.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 1 contract

Sources: Cellular/PCS Interconnection Agreement

General Policies. 9.6.1 7.6.1 Each Party’s resources are approved for approved this Agreement’s business purposes only. 9.6.2 7.6.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 7.6.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 7.6.4 Authorized users shall not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms.. Page 82 of 339 9.6.5 7.6.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 1 contract

Sources: Wholesale Agreement

General Policies. 9.6.1 8.6.1 Each Party’s resources are for approved this Agreement’s business purposes only. 9.6.2 8.6.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 8.6.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 8.6.4 Authorized users shall must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 8.6.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 1 contract

Sources: Wholesale Agreement

General Policies. 9.6.1 7.6.1 Each Party’s resources are approved for approved this Agreement’s business purposes only. 9.6.2 7.6.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 7.6.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 7.6.4 Authorized users shall not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms.. CN:03292017-7376 000080 9.6.5 7.6.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 1 contract

Sources: Telecommunications