Common use of Limitation on Access Clause in Contracts

Limitation on Access. If either party is given access, whether -------------------- on-site or through remote facilities, to any computer or electronic data storage system of the other party in order to accomplish the Services called for in this Agreement, the party that receives such access shall limit such access and use solely to perform Services within the scope of this Agreement and shall not access or attempt to access any computer system, electronic file, software or other electronic services other than those specifically required to accomplish the Services required under this Agreement. Under no circumstances shall either party's personnel access any networks or facilities of the other party for the purpose of accessing other external networks, nor shall any such capabilities for such access be published or made known via any medium, as for example and not by way of limitation, posting on bulletin boards or E-mail. Any such use or publication shall be a material breach of this Agreement. Neither party shall use back doors, data capture routines, games, viruses, worms, or Trojan horses and any intentional introduction of such into the other party's data networks shall be deemed a material breach of this Agreement. The party receiving access shall limit such access to those of its employees whom the other party has authorized in writing to have such access in connection with this Agreement or the applicable Statement of Work, and shall strictly follow all security rules and procedures for use of the providing party's electronic resources. All user identification numbers and passwords and any information obtained as a result of access to and use of a party's computer and electronic data storage systems shall be deemed to be, and shall be treated as, Confidential Information under applicable provisions of this Agreement. Each party agrees to cooperate with the other in the investigation of any apparent unauthorized access to a party's computer or electronic data storage systems.

Appears in 2 contracts

Samples: Transition Services (Genuity Inc), Agreement for Transition Services (Genuity Inc)

AutoNDA by SimpleDocs

Limitation on Access. If either party is given access, whether -------------------- on-on- site or through remote facilities, to any computer or electronic data storage system of the other party in order to accomplish the Services called for in this Agreement, the party that receives such access shall limit such access and use solely to perform Services within the scope of this Agreement and shall not access or attempt to access any computer system, electronic file, software or other electronic services other than those specifically required to accomplish the Services required under this Agreement. Under no circumstances shall either party's personnel access any networks or facilities of the other party for the purpose of accessing other external networks, nor shall any such capabilities for such access be published or made known via any medium, as for example and not by way of limitation, posting on bulletin boards or E-mail. Any such use or publication shall be a material breach of this Agreement. Neither party shall use back doors, data capture routines, games, viruses, worms, or Trojan horses and any intentional introduction of such into the other party's data networks shall be deemed a material breach of this Agreement. The party receiving access shall limit such access to those of its employees whom the other party has authorized in writing to have such access in connection with this Agreement or the applicable Statement of Work, and shall strictly follow all security rules and procedures for use of the providing party's electronic resources. All user identification numbers and passwords and any information obtained as a result of access to and use of a party's computer and electronic data storage systems shall be deemed to be, and shall be treated as, Confidential Information under applicable provisions of this Agreement. Each party agrees to cooperate with the other in the investigation of any apparent unauthorized access to a party's computer or electronic data storage systems.

Appears in 1 contract

Samples: Agreement for It Transition Services (Genuity Inc)

AutoNDA by SimpleDocs

Limitation on Access. If either party is given access, whether -------------------- on-site or -------------------- through remote facilities, to any computer or electronic data storage system of the other party in order to accomplish the Services called for in this Agreement, the party that receives such access shall limit such access and use solely to perform Services within the scope of this Agreement and shall not access or attempt to access any computer system, electronic file, software or other electronic services other than those specifically required to accomplish the Services required under this Agreement. Under no circumstances shall either party's personnel access any networks or facilities of the other party for the purpose of accessing other external networks, nor shall any such capabilities for such access be published or made known via any medium, as for example and not by way of limitation, posting on bulletin boards or E-mail. Any such use or publication shall be a material breach of this Agreement. Neither party shall use back doors, data capture routines, games, viruses, worms, or Trojan horses and any intentional introduction of such into the other party's data networks shall be deemed a material breach of this Agreement. The party receiving access shall limit such access to those of its employees whom the other party has authorized in writing to have such access in connection with this Agreement or the applicable Statement of Work, and shall strictly follow all security rules and procedures for use of the providing party's electronic resources. All user identification numbers and passwords and any information obtained as a result of access to and use of a party's computer and electronic data storage systems shall be deemed to be, and shall be treated as, Confidential Information under applicable provisions of this Agreement. Each party agrees to cooperate with the other in the investigation of any apparent unauthorized access to a party's computer or electronic data storage systems.

Appears in 1 contract

Samples: Agreement for Transition Services (Genuity Inc)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!