Security and Access Sample Clauses

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.
AutoNDA by SimpleDocs
Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.
Security and Access. The Mandatary shall request and familiarise its employees with the Client security rules which is not included in this agreement.
Security and Access. The Executive acknowledges that he has no reasonable expectation of privacy in any computer, technology system, email, handheld device, telephone, or documents that are used to conduct the business of the Company whether such device is personally owned or provided by the Company. As such, the Company has the right to audit and search all such items and systems, without further notice to Executive, to ensure that the Company is licensed to use the software on the Company’s devices in compliance with the Company’s software licensing policies, to ensure compliance with the Company’s policies, and for any other business-related purposes in the Company’s sole discretion. Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.
Security and Access. 14.1. Employees and agents of Cincinnati Bell and its subsidiaries, while on the premises of Customer, will comply with all reasonable rules, regulations and security requirements of Customer.
Security and Access. The Executive agrees and covenants to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone and voicemail systems, facilities access, key cards, access codes, intranet and internet, social media, computer systems and networks, e-mail systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”), and not to access or use any Facilities and Information Technology Resources except as authorized by the Company. The Executive also agrees not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether such termination is voluntary or involuntary, without the Company’s consent.
AutoNDA by SimpleDocs
Security and Access. 15.1 The Mandatary and his employees shall enter and leave the premises only through the main gate(s) and/or checkpoint(s) designated by the Employer. The Mandatary shall ensure that employees observe the security rules of the Employer at all times and shall not permit any person who is not directly associated with the work from entering the premises. 15.2 The Mandatary and his employees shall not enter any area of the premises that is not directly associated with their work. 15.3 The Mandatary shall ensure that all materials, machinery or equipment brought by him onto the premises are recorded at the main gate(s) and/or checkpoint(s). Failure to do this may result in a refusal by the Employer to allow the materials, machinery or equipment to be removed from the Employer’s premises.
Security and Access. Employee agrees and covenants (i) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (ii) not to access or use any Facilities and Information Technology Resources except as authorized by Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Employee’s employment by the Company, whether termination is voluntary or involuntary. Employee agrees to notify the Company promptly in the event Employee learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others. Employee acknowledges and agrees that any property situated on the Company’s premises and owned by the Company, including disks and other storage media, filing cabinets, other work areas and other Facilities and Information Technology Resources, is subject to inspection by personnel of the Company at any time with or without notice. Employee acknowledges and agrees that Employee has no expectation of privacy with respect to the Company’s Facilities and Information Technology Resources and that Employee’s activity and any files or messages on or using any of such Facilities and Information Technology Resources may be monitored at any time without notice.
Security and Access. Executive agrees and covenants to: (i) comply with all the Company security policies and procedures as in force from time to time including, without limitation, those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, the Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other the Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (ii) not access or use any Facilities Information Technology and Access Resources except in the course of his duties to the Company; and (iii) not access or use any Facilities Information Technology and Access Resources in any manner after the termination of Executive’s employment by the Company, whether termination is voluntary or involuntary. Executive agrees to notify the Company promptly in the event Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with, any Facilities Information Technology and Access Resources or other the Company property or materials by others.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!