Security and Access Policies Sample Clauses

Security and Access Policies. BIMSYM shall use commercially reasonable efforts to protect the physical security and electronic security of the equipment utilized to provide the Services to HIIQUOTE, including by using anti-virus, security and firewall technology commonly used in the industry. BIMSYM further agrees that its employees, contractors and agents shall take all necessary actions when accessing the HIIQUOTE network to avoid negatively impacting the confidentiality, integrity, or availability of HIIQUOTE internal systems and information assets. Without limiting the foregoing, HIIQUOTE shall also comply with any and all reasonable HIIQUOTE policies applicable to HIIQUOTE third party vendors that receive access to HIIQUOTE networks and systems and identified from time to time, and any other requirements identified in each applicable SOW. HIIQUOTE may amend its policies from time to time upon reasonable notice to BIMSYM (it being understood that BIMSYM shall have a reasonable time period in which to comply with any such amendments). To the extent that BIMSYM is authorized to gain remote access to HIIQUOTE’s networks or equipment for purposes of performing its obligations hereunder, BIMSYM shall ensure that (a) such access is restricted to authorized employees only; (b) it provides HIIQUOTE with a list of all such authorized employees; (c) such remote access is used solely for purposes of fulfilling BIMSYM’s obligations under this Agreement; (d) such remote access is obtained through a secure connection; and (e) BIMSYM uses such remote access capability only to access equipment or software that is directly involved in BIMSYM’s performance of its obligations hereunder and does not access any other HIIQUOTE or third party systems, databases, equipment or software. Upon HIIQUOTE’s request, BIMSYM will provide periodic security audits of its access system and methods and will change authentication elements periodically to maintain the integrity and security of BIMSYM’s access.
AutoNDA by SimpleDocs
Security and Access Policies. Xxxxxxx.xxx shall use commercially reasonable efforts to protect the physical security and electronic security of the equipment utilized to provide the Services to Comcast, including by using anti-virus, security and firewall technology commonly used in the industry. Xxxxxxx.xxx further agrees that its employees, contractors and agents will take reasonable actions when accessing the Comcast network to avoid negatively impacting the confidentiality, integrity, and availability of Comcast’s internal systems and information assets. In any event, Xxxxxxx.xxx shall also comply with any and all applicable Comcast’s policies identified in Exhibit C, attached hereto and incorporated herein by reference, and any other requirements identified in the applicable Program Description, subject to exceptions approved in writing by Comcast, including without limitation those presently documented in Exhibit F, incorporated herein by reference. By the Program Description Launch Date or such later date as set forth in Exhibit F, Xxxxxxx.xxx shall implement all elements of its proposed security threat mitigation plan as provided in Exhibit F. Xxxxxxx.xxx shall continue to investigate alternatives to the *** security mechanism described in Exhibit F and report as mutually agreed regarding such alternatives, cost, and technical feasibility. Comcast may amend its policies from time to time upon reasonable notice to Xxxxxxx.xxx, provided that in the event any such amendment would have a material adverse effect on Xxxxxxx.xxx’s ability to perform or costs incurred in relation to this Agreement, the Parties agree to negotiate in good faith to agree on a way to resolve the effects of such policy amendments.
Security and Access Policies 

Related to Security and Access Policies

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Information and Access From the date of this Agreement and continuing until the Effective Time, Parent, as to itself and Sub, on the one hand, and the Company, as to itself and its subsidiaries, on the other hand, each agrees that it shall afford and, with respect to clause (b) below, shall cause its independent auditors to afford, (a) to the officers, independent auditors, counsel and other representatives of the other reasonable access, upon reasonable advance notice, to its (and in the case of Parent, Sub's, and in the case of the Company, its subsidiaries') properties, books, records (including tax returns filed and those in preparation) and executives and personnel in order that the other may have a full opportunity to make such investigation as it reasonably desires to make of the other consistent with their rights under this Agreement, and (b) to the independent auditors of the other, reasonable access to the audit work papers and other records of its independent auditors. No investigation pursuant to this Section 5.1 shall affect or otherwise obviate or diminish any representations and warranties of any party or conditions to the obligations of any party. No party shall be required to provide access to or to disclose information where such access or disclosure would violate or prejudice the rights of its customers, jeopardize the attorney-client privilege or the institution in possession or control of such information or contravene any law, rule, regulations, order, judgment, decree, fiduciary duty or binding agreement entered into prior to the date of this Agreement. The parties hereto will make appropriate substitute disclosure arrangements under circumstances in which the restrictions of the preceding sentence apply.

  • Utilities and Access To the knowledge of the Transaction Entities, water, stormwater, sanitary sewer, electricity and telephone service are all available at the property lines of each Property over duly dedicated streets or perpetual easements of record benefiting the applicable Property. To the actual knowledge of the Transaction Entities, each of the Properties has legal access to public roads and all other roads necessary for the use of each of the Properties.

  • Inspection and Access Landlord and its agents, representatives, and contractors may enter the Premises at any reasonable time to inspect the Premises and to make such repairs as may be required or permitted pursuant to this Lease and for any other business purpose. Landlord and Landlord’s representatives may enter the Premises during business hours on not less than 48 hours advance written notice (except in the case of emergencies in which case no such notice shall be required and such entry may be at any time) for the purpose of effecting any such repairs, inspecting the Premises, showing the Premises to prospective purchasers and, during the last year of the Term, to prospective tenants or for any other business purpose. Landlord may erect a suitable sign on the Premises stating the Premises are available to let or that the Project is available for sale. Landlord may grant easements, make public dedications, designate Common Areas and create restrictions on or about the Premises, provided that no such easement, dedication, designation or restriction materially, adversely affects Tenant’s use or occupancy of the Premises for the Permitted Use. At Landlord’s request, Tenant shall execute such instruments as may be necessary for such easements, dedications or restrictions. Tenant shall at all times, except in the case of emergencies, have the right to escort Landlord or its agents, representatives, contractors or guests while the same are in the Premises, provided such escort does not materially and adversely affect Landlord’s access rights hereunder.

  • Foreign Asset and Account Reporting To the extent that Spanish residents hold rights or assets (e.g., shares of common stock, cash, etc.) in a bank or brokerage account outside of Spain with a value in excess of €50,000 per type of right or asset as of December 31 each year, such residents are required to report information on such rights and assets on their tax return for such year. Shares of common stock constitute securities for purposes of this requirement, but unvested rights (e.g., RSUs) are not considered assets or rights for purposes of this requirement. If applicable, Spanish residents must report the assets or rights on Form 720 by no later than March 31 following the end of the relevant year. After such assets or rights are initially reported, the reporting obligation will only apply for subsequent years if the value of any previously-reported assets or rights increases by more than €20,000. Failure to comply with this reporting requirement may result in penalties. Spanish residents are also required to electronically declare to the Bank of Spain any securities accounts (including brokerage accounts held abroad), as well as the securities held in such accounts, if the value of the transactions for all such accounts during the prior tax year or the balances in such accounts as of December 31 of the prior tax year exceeds €1,000,000. More frequent reporting is required if such transaction value or account balance exceeds €1,000,000. Spanish residents should consult with their personal tax and legal advisors to ensure compliance with their personal reporting obligations.

  • Records and Access The Advisor, in the conduct of its responsibilities to the Company, shall maintain adequate and separate books and records for the Company’s operations in accordance with GAAP, which shall be supported by sufficient documentation to ascertain that such books and records are properly and accurately recorded. Such books and records shall be the property of the Company and shall be available for inspection by the Board and by counsel, auditors and other authorized agents of the Company, at any time or from time to time during normal business hours. The Advisor shall at all reasonable times have access to the books and records of the Company and the Operating Partnership.

  • Patent Term Extension and Supplementary Protection Certificate Upon receiving Marketing Approval for a POZEN Product, the Parties agree to coordinate the application for any patent term extension or supplementary protection certificates that may be available. The primary responsibility of applying for any extension or supplementary protection certificate will be the Party having the right to make the application under the Applicable Law. The Party responsible for filing the application will keep the other Party fully informed of its efforts to obtain such extension or supplementary protection certificate. Each Party will provide prompt and reasonable assistance, without additional compensation, to obtain such patent extension or supplementary protection certificate. The Party filing such request will pay all expenses in regard to obtaining the extension or supplementary protection certificate.

  • REPORTS AND ACCESS The Advisor agrees to supply such information to the Fund's administrator and to permit such compliance inspections by the Fund's administrator as shall be reasonably necessary to permit the administrator to satisfy its obligations and respond to the reasonable requests of the Trustees.

  • Intellectual Property Security Agreements Duly executed originals of Trademark Security Agreements, Copyright Security Agreements and Patent Security Agreements, each dated the Closing Date and signed by each Credit Party which owns Trademarks, Copyrights and/or Patents, as applicable, all in form and substance reasonably satisfactory to Agent, together with all instruments, documents and agreements executed pursuant thereto.

  • Intellectual Property Security Agreement An Intellectual Property Security Agreement executed by Borrower in form and substance reasonably satisfactory to Lender.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!