Security, Access and Use Sample Clauses

Security, Access and Use. (a) Except as otherwise set forth in the Services Schedule, each Party shall be responsible for all health, safety and security at its facilities and for its systems, which security shall be comparable to security provided to its own businesses and functions; provided, however, that neither Party makes any representation or warranty that such security will ensure compliance with any Law or reach any desired or intended result. Each Party has the right to monitor and reasonably audit, in accordance with the terms and conditions of this Agreement, the other Party’s compliance with such systems and security procedures. At all times when a Party is accessing the facilities, systems, equipment, computers, software, network or files owned or controlled by the other Party pursuant to this Agreement, such Party shall, and shall cause its Affiliates and Representatives to, use commercially reasonable efforts to comply with the policies and procedures of the other Party concerning health, safety and security, to the extent such policies and procedures are communicated to such Party in advance. (b) During the term of this Agreement, except as determined in good faith by AS as necessary to ensure compliance with any applicable Laws and subject to any applicable privileges and contractual confidentiality provisions, AS shall, and shall cause its Affiliates to, allow the Acquirors and their Representatives reasonable access to the AS facilities (that are part of the Carve-Out Transaction or not owned by the Acquirors following the Closing) as reasonably necessary for the Acquirors to continue to operate the business of the Acquired Companies in substantially the same manner in which the business of the Acquired Companies operated prior to Closing and to fulfill their obligations under this Agreement; provided, that such access shall not unreasonably interfere with the business or operations of AS and such access shall be through secured controlled processes as determined by AS in accordance with the safety, security and other facility policies of AS. (c) During the term of this Agreement, except as determined in good faith by the Acquirors as necessary to ensure compliance with any applicable Laws and subject to any applicable privileges and contractual confidentiality provisions, the Acquirors shall, and shall cause their Affiliates to, allow AS and its Representatives reasonable access to the facilities of the Acquired Companies as reasonably necessary for AS to conti...
AutoNDA by SimpleDocs
Security, Access and Use. Quinyx will maintain a level of security for the Service and the Solutions that is in accordance with: industry practice, applicable Data Protection Laws (including putting in place reasonable administrative, physical, technical, organisational and other security measures to protect against unauthorized access to, or loss, destruction, unavailability or alteration of any Customer Data processed or stored by the Service) and the Information Security Overview. Quinyx may update the Information Security Overview from time to time, provided however, that any changes will not degrade the information security policies and procedures in place. Quinyx warrants that it has and will maintain, for the duration of the Agreement, ISO/IEC 27001 certification or equivalent. As far as Quinyx is reasonably aware, the Service does not contain any Viruses.
Security, Access and Use. Quinyx will maintain a comprehensive information security program consistent with industry standards and the Quinyx Information Security Standard Policies and Procedures that contains appropriate administrative, technical, physical, organizational and other security safeguards reasonably designed to protect Personal Information from unauthorized disclosure, loss, destruction, unavailability or alteration. Such information security program will include business continuity and disaster recovery plans that are consistent with industry standards and are designed to protect against loss of Customer Content. In the event that Quinyx has reason to believe that there has been any unauthorized access to, or loss of, Personal Information from its systems or premises, then it will promptly notify Customer according to its policies and protocols Quinyx aligned with the data type and nature of the event.

Related to Security, Access and Use

  • Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.

  • Collateral Access Agreements Such Grantor shall use commercially reasonable efforts to obtain a Collateral Access Agreement, from the lessor of each leased property, mortgagee of owned property or bailee or consignee with respect to the operator of any warehouse, processor or converter facility or other location (each of which is identified on Exhibit B hereto), where Collateral in excess of $1,000,000 is stored or located at any given time (other than (i) company-owned facilities and (ii) retail stores), which agreement or letter shall provide access rights, contain a waiver or subordination of all Liens or claims that the landlord, mortgagee, bailee or consignee may assert against the Collateral at that location, and shall otherwise be reasonably satisfactory in form and substance to the Administrative Agent. With respect to such locations or warehouse space leased as of the Effective Date and thereafter where Collateral in excess of $1,000,000 is stored or located (other than (i) company-owned facilities and (ii) retail stores), if the Administrative Agent has not received a Collateral Access Agreement as of the Effective Date (or, if later as of the date such location is acquired or leased), the Borrower’s Eligible Inventory at that location shall be subject to such Reserves as may be established by the Administrative Agent. After the Effective Date, no real property or warehouse space shall be leased by such Grantor (other than retail stores) and no Inventory shall be shipped to a processor or converter under arrangements established after the Effective Date, unless and until a satisfactory Collateral Access Agreement shall first have been obtained with respect to such location or if it has not been obtained, the Borrower’s Eligible Inventory at that location shall be subject to the establishment of Reserves acceptable to the Administrative Agent. Such Grantor shall timely and fully pay and perform its obligations under all leases and other agreements with respect to each leased location or third party warehouse where any Collateral is or may be located.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Location of the Collateral Except in the ordinary course of Grantor’s business, Grantor agrees to keep the Collateral (or to the extent the Collateral consists of intangible property such as accounts or general intangibles, the records concerning the Collateral) at Grantor’s address shown above or at such other locations as are acceptable to Lender. Upon Lender’s request, Grantor will deliver to Lender in form satisfactory to Lender a schedule of real properties and Collateral locations relating to Grantor’s operations, including without limitation the following: (1) all real property Grantor owns or is purchasing; (2) all real property Grantor is renting or leasing; (3) all storage facilities Grantor owns, rents, leases, or uses; and (4) all other properties where Collateral is or may be located.

  • Installation and Use Rights You may install and use any number of copies of the software on your devices.

  • Possession and Use of Collateral Subject to the provisions of the Security Documents, the Issuer and the Guarantors shall have the right to remain in possession and retain exclusive control of and to exercise all rights with respect to the Collateral (other than monies or U.S. government obligations deposited pursuant to Article VIII, and other than as set forth in the Security Documents and this Indenture), to operate, manage, develop, lease, use, consume and enjoy the Collateral (other than monies and U.S. government obligations deposited pursuant to Article VIII and other than as set forth in the Security Documents and this Indenture), to alter or repair any Collateral so long as such alterations and repairs do not impair the creation or perfection of the Lien of the Security Documents thereon, and to collect, receive, use, invest and dispose of the reversions, remainders, interest, rents, lease payments, issues, profits, revenues, proceeds and other income thereof.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Possession and Use Contractor may possess, use and reproduce Confidential Information solely for the Purpose. Contractor shall not use the Confidential Information for any other purpose.

  • Access and Cooperation Each Party will, and will cause its Other Indemnified Persons to, cooperate and assist in all reasonable respects regarding such Third Party Claim, including by promptly making available to such other Party (and its legal counsel and other professional advisers with a reasonable need to know) all books and records of such Person relating to such Third Party Claim, subject to reasonable confidentiality precautions.

  • Access and Records ‌ A. County, the State of California and the United States Government and/or their representatives, shall have access, for purposes of monitoring, auditing, and examining, to Subrecipient’s activities, books, documents and papers (including computer records and emails) and to records of Subrecipient’s subcontractors, consultants, contracted employees, bookkeepers, accountants, employees and participants related to this Contract. Subrecipient shall insert this condition in each Contract between Subrecipient and a subcontractor that is pursuant to this Contract shall require the subcontractor to agree to this condition. Such departments or representatives shall have the right to make excerpts, transcripts and photocopies of such records and to schedule on site monitoring at their discretion. Monitoring activities also may include, but are not limited to, questioning employees and participants and entering any premises or onto any site in which any of the services or activities funded hereunder are conducted or in which any of the records of Subrecipient are kept. Subrecipient shall make available its books, documents, papers, financial records, etc., within three (3) days after receipt of written demand by Director which shall be deemed received upon date of sending. In the event Subrecipient does not make the above referenced documents available within the County of Orange, California, Subrecipient agrees to pay all necessary and reasonable expenses incurred by County, or County’s designee, in conducting any audit at the location where said records and books of account are maintained.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!