Reporting Unauthorized Access Sample Clauses

Reporting Unauthorized Access. Employees who observe a person attempting to enter GCHD facilities or systems by bypassing security measures in an unauthorized manner must report this information immediately to his/her supervisor, Manager of Information Technology, or Security Officer.
AutoNDA by SimpleDocs

Related to Reporting Unauthorized Access

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all the provisions of the Federal Immigration and Nationality Act, 8 U.S.C.A. § 1101, et seq., as amended, and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for performance of work and/or services covered by this Agreement, and should any liability or sanctions be imposed against City for such use of unauthorized aliens, Consultant hereby agrees to and shall reimburse City for the cost of all such liabilities or sanctions imposed, together with any and all costs, including attorneys’ fees, incurred by City.

  • Unauthorized Absence An unauthorized absence from the work site or failure to report for duty after a leave request has been disapproved, revoked, or canceled by the appointing authority, or at the expiration of a leave, shall be without pay. Such absence may also be grounds for disciplinary action.

  • Information and Access (a) The Company and Parent each shall (and shall cause its Subsidiaries to, and shall use its commercially reasonable efforts to cause, its and their respective Representatives to), upon the reasonable request by the other, furnish to the other, as promptly as practicable, with all information concerning itself, its Representatives and such other matters as may be necessary or advisable in connection with the Schedule 14D-9 or Schedule TO (including with respect to Parent, information concerning the Investors) and any information or documentation to effect the expiration of all waiting periods under applicable Antitrust Laws and all filings, notices, reports, consents, registrations, approvals, permits and authorizations, made or sought by or on behalf of Parent, the Company or any of their respective Affiliates to or from any third party, including any Governmental Entity, in each case necessary or advisable in connection with the Transactions and, with respect to the information supplied in writing by or on behalf of Parent, its Affiliates or its or their respective Representatives for inclusion in or incorporation by reference into the Schedule 14D-9, including with respect to the Investors. Each of Parent and the Company acknowledges and agrees that such information supplied by it pursuant to this Section 7.8(a) (as applicable) will be correct and complete in all material respects at the time so supplied. (b) In addition to and without limiting the rights and obligations set forth in Section 7.8(a), the Company shall (and shall cause its Subsidiaries to), upon reasonable prior notice, afford Parent and its Representatives reasonable access, during normal business hours, from the date of this Agreement and continuing until the earlier of the Effective Time and the termination of this Agreement pursuant to Article IX, to the Company Employees, agents, properties, offices and other facilities, Contracts, books and records, and, during such period, the Company shall (and shall cause its Subsidiaries to) furnish promptly to Parent all other information and documents concerning or regarding its businesses, properties and assets and personnel as may reasonably be requested by or on behalf of Parent; provided, however, that, subject to compliance with the obligations set forth in Section 7.8(c): (i) neither the Company nor any of its Subsidiaries shall be required to provide such access or furnish such information or documents to the extent doing so would, in the reasonable opinion of the Company’s outside legal counsel result in (A) a violation of applicable Law, (B) the breach of any contractual confidentiality obligations in any Contract with a third party entered into prior to the date of this Agreement or following the date of this Agreement in compliance with Section 7.1 and Section 7.2; (C) waive the protection of any attorney-client privilege or protection (including attorney-client privilege, attorney work-product protections and confidentiality protections) or any other applicable privilege or protection concerning pending or threatened Proceedings, in any material respect; or (D) such information or documents are reasonably pertinent to any adverse Proceeding between the Company and its Affiliates, on the one hand, and Parent and its Affiliates, on the other hand (subject to any rules or guidelines of discovery applicable to such adverse Proceeding); and (ii) in no event shall the work papers of the Company’s and its Subsidiaries’ independent accountants and auditors be accessible to Parent or any of its Representative unless and until such accountants and auditors have provided a consent related thereto in form and substance reasonably acceptable to such auditors or independent accountants. Any investigation conducted pursuant to the access contemplated by this Section 7.8(b) will be conducted in a manner that does not unreasonably interfere with the conduct of the business of the Company and its Subsidiaries and that would not reasonably be expected to create a risk of damage or destruction to any property or assets of the Company or its Subsidiaries. Any access to the properties of the Company and its Subsidiaries shall be subject to the Company’s reasonable security measures and insurance requirements and shall not include the right to perform any “invasive” testing or soil, air or groundwater sampling, including any Phase II environmental assessments. All requests for such access or information made pursuant to this Section 7.8(b) shall be initially directed to the Person set forth on Section 7.8(b) of the Company Disclosure Schedule, which Person may be replaced by the Company at any time by providing written notice to Parent, and any access granted in connection with a request made pursuant to this Section 7.8(b) shall be supervised by such Persons. (c) In the event that the Company objects to any request submitted pursuant to Section 7.8(b) on the basis of one or more of the matters set forth in clause (i) of Section 7.8(b), it must do so by providing Parent, in reasonable detail, the nature of what is being prevented and/or withheld and the reasons and reasonable support therefor, and prior to preventing such access or withholding such information or documents from Parent and its Representatives, the Company shall cooperate with Parent to make appropriate substitute arrangements to permit reasonable disclosure that does not suffer from any of the impediments expressly set forth in clause (i) of Section 7.8(b) (other than clause (D)) including through the use of commercially reasonable efforts to take such actions and implement appropriate and mutually agreeable measures to as promptly as practicable permit such access and the furnishing of such information and documents in a manner to remove the basis for the objection, including by arrangement of appropriate “counsel-to-counsel” disclosure, clean room procedures, redaction and other customary procedures, entry into a customary joint defense agreement and, with respect to the contractual confidentiality obligations contemplated by clause (i)(B) of Section 7.8(b), obtaining a waiver with respect to or consent under such contractual confidentiality obligations. (d) Without limiting the generality of the other provisions of this Section 7.8, the Company and Parent, as each deems advisable and necessary, after consultation with their respective outside legal counsel, may reasonably designate competitively sensitive information and documents (including those that relate to valuation of the Company or Parent (as the case may be)) as “Outside Counsel Only Information.” Such information and documents shall only be provided to the outside legal counsel of the Company or Parent (as the case may be), or subject to such other similar restrictions mutually agreed to by the Company and Parent, and subject to any amendment, supplement or other modification to the Confidentiality Agreement or additional confidentiality or joint defense agreement between or among the Company and Parent; provided, however, that, subject to any applicable Laws relating to the exchange of information, the outside legal counsel receiving such information and documents may prepare one or more reports summarizing the results of any analysis of any such shared information and documents, and disclose such reports, other summaries or aggregated information derived from such shared information and documents to Representatives of such outside legal counsel’s client. (e) No access or information provided to Parent or any of its Representatives or to the Company or any of its Representatives following the date of this Agreement, whether pursuant to this Section 7.8 or otherwise, shall affect or be deemed to affect, modify or waive the representations and warranties of the Parties set forth in this Agreement and, for the avoidance of doubt, all information and documents disclosed or otherwise made available pursuant to Section 7.5, Section 7.6, this Section 7.8 or otherwise in connection with this Agreement and the Transactions shall be governed by the terms and conditions of the Confidentiality Agreement mutatis mutandis as if Parent were Counterparty (as defined in the Confidentiality Agreement) and subject to applicable Laws relating to the exchange or sharing of information and any restrictions or requirements imposed by any Governmental Entity; provided, that, in the event of a conflict, the provisions of Section 7.13 shall override any conflicting provisions of the Confidentiality Agreement, and any Person who is a potential source of, or may provide, equity, debt or any other type of financing to Parent or any of its Representatives in connection with the Transactions shall be deemed a “Representative” for purposes of the Confidentiality Agreement without the prior written consent of the Company.

  • Unauthorized Acts Each Party shall (a) notify the other Party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "Unauthorized Access"), (b) promptly furnish to the other Party full details of the Unauthorized Access and use reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to prevent a reoccurrence of any such Unauthorized Access.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit C. 9.2 BellSouth will provide LIDB Storage upon written request to <<customer_name>>’s Account Manager stating a requested activation date.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!