Common use of Security and Access Clause in Contracts

Security and Access. Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Executive’s employment by the Company, whether termination is voluntary or involuntary. Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 14 contracts

Samples: Employment Agreement (Verde Clean Fuels, Inc.), Employment Agreement (Lightwave Logic, Inc.), Employment Agreement (Lightwave Logic, Inc.)

AutoNDA by SimpleDocs

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 14 contracts

Samples: Employment Agreement (Dipexium Pharmaceuticals, Inc.), Employment Agreement (Dipexium Pharmaceuticals, Inc.), Employment Agreement (Dipexium Pharmaceuticals, Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including including, without limitation limitation, those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, and passwords and any and all other Company facilities, IT resources and communication technologies ("Facilities and Information Technology and Access Resources"); (b) not to access or use any Facilities and Information Technology and Access Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology and Access Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology and Access Resources or other Company property or materials by others.

Appears in 9 contracts

Samples: Employment Agreement (RBB Bancorp), Employment Agreement (RBB Bancorp), Employment Agreement (RBB Bancorp)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 7 contracts

Samples: Executive Employment Agreement (Sugarmade, Inc.), Executive Employment Agreement (Cannabis Global, Inc.), Employment Agreement (Meridian Bioscience Inc)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies ("Facilities and Information Technology and Access Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 7 contracts

Samples: Employment Agreement (Biotech Products Services & Research, Inc.), Employment Agreement (Biotech Products Services & Research, Inc.), Employment Agreement (Biotech Products Services & Research, Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he the Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 6 contracts

Samples: Employment Agreement (Rise Oil & Gas, Inc.), Employment Agreement (Rise Oil & Gas, Inc.), Employment Agreement (Rise Oil & Gas, Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including including, without limitation limitation, those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, and passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology and Access Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology and Access Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology and Access Resources or other Company property or materials by others.

Appears in 5 contracts

Samples: Employment Agreement (First Choice Bancorp), Employment Agreement (First Choice Bancorp), Employment Agreement (RBB Bancorp)

Security and Access. Executive agrees I agree and covenants covenant (ai) to comply with all Company security policies and procedures as in force from time to time including including, without limitation limitation, those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology and Access Resources”); (bii) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Executive’s my employment by the Company, whether termination is voluntary or involuntary. Executive agrees I agree to notify the Company promptly in the event he learns I learn of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 5 contracts

Samples: Executive Employment Agreement (AppTech Payments Corp.), Executive Employment Agreement (AppTech Corp.), Executive Employment Agreement (AppTech Corp.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he the Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 4 contracts

Samples: Employment Agreement (Singing Machine Co Inc), Employment Agreement (Singing Machine Co Inc), Employment Agreement (Singing Machine Co Inc)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 4 contracts

Samples: Executive Employment Agreement (McTc Holdings, Inc.), Executive Employment Agreement (Marijuana Co of America, Inc.), Executive Employment Agreement (Marijuana Co of America, Inc.)

Security and Access. Executive agrees and covenants (a) to comply with all Company Group security policies and procedures as in force from time to time including time, including, without limitation limitation, those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company Group intranet, internet, social media and instant messaging systems, computer systems, e-mail email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, Group IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Executive’s employment by the Company, whether termination is voluntary or involuntary. Executive agrees to notify the Company promptly in the event he Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company Group property or materials by others.

Appears in 4 contracts

Samples: Employment Agreement (Nano Nuclear Energy Inc.), Employment Agreement (Flewber Global Inc.), Employment Agreement (Flewber Global Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies ("Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 3 contracts

Samples: Employment Agreement (Amerinac Holding Corp.), Employment Agreement (Amerinac Holding Corp.), Employment Agreement (Meridian Bioscience Inc)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, passwords, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 3 contracts

Samples: Employment Agreement (Workiva Inc), Employment Agreement (Workiva Inc), Employment Agreement (Workiva LLC)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, technological equipment of any kind, codes, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords passwords, and any and all other Company facilities, IT resources and communication technologies ("Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 3 contracts

Samples: Employment Agreement (Nodechain, Inc.), Employment Agreement (Nodechain, Inc.), Employment Agreement (Nodechain, Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (collectively, "Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 3 contracts

Samples: Executive Employment Agreement (Veru Inc.), Executive Employment Agreement (Veru Inc.), Executive Employment Agreement (Veru Inc.)

Security and Access. Executive The Consultant agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (collectively, "Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Executive’s employment by the Company, whether termination is voluntary or involuntaryAgreement. Executive The Consultant agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 2 contracts

Samples: Consulting Agreement, Consulting Agreement (Veru Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (collectively, “Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 2 contracts

Samples: Executive Employment Agreement (Veru Inc.), Executive Employment Agreement (Veru Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies ("Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 2 contracts

Samples: Employment Agreement (Diversified Restaurant Holdings, Inc.), Employment Agreement (Cti Industries Corp)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iiic) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 2 contracts

Samples: Employment Agreement (PLX Pharma Inc.), Employment Agreement (Dipexium Pharmaceuticals, Inc.)

Security and Access. Executive The Employee agrees and covenants (a) to comply with all Company of the Company’s security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies facilities (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iiic) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Executivethe Employee’s employment by the Company, whether termination is voluntary or involuntary. Executive The Employee agrees to notify the Company promptly in the event he the Employee learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 2 contracts

Samples: Employment Agreement (Clearwater Analytics Holdings, Inc.), Employment Agreement (Clearwater Analytics Holdings, Inc.)

Security and Access. Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards/fobs, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Executive’s employment by the Companyemployment, whether termination is voluntary or involuntary. Executive agrees to notify the Company promptly in the event he Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 2 contracts

Samples: Employment Agreement (Umpqua Holdings Corp), Employment Agreement (Umpqua Holdings Corp)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iiic) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Nac Global Technologies, Inc.)

AutoNDA by SimpleDocs

Security and Access. Executive agrees and covenants (ai) to comply with all Company security policies and procedures of the Companies as in force from time to time time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies ("Facilities and Information Technology Resources"); (bii) not to access or use any Facilities and Information Technology Resources except as authorized by the CompanyCompanies; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Executive’s employment by the Company, whether termination is voluntary or involuntary's employment. Executive agrees to notify the Company Companies promptly in the event he she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Executive Employment Agreement (AHP Servicing LLC)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies ("Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Electro Scientific Industries Inc)

Security and Access. The Executive agrees and covenants (a) to comply with all written Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iiic) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Female Health Co)

Security and Access. Executive agrees and covenants will (a) to comply with all Company and Affiliate security policies and procedures as in force from time to time time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company or Affiliate intranet, internet, social media media, and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords passwords, and any and all other Company and Affiliate facilities, IT resources resources, and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iiic) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Executive’s employment by the Company, whether termination is voluntary or involuntary. Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with with, any Facilities and Information Technology Resources or other Company or Affiliate property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Kewaunee Scientific Corp /De/)

Security and Access. Executive agrees and covenants (ai) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources resources, and communication technologies (“Facilities and Information Technology Resources”); (bii) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination discussion of Executive’s employment by anticipated relationship with the Company, whether termination is voluntary or involuntary. Executive agrees to notify the Company promptly in the event he Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Executive Employment Agreement (HCI Group, Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (collectively, “Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Executive Employment Agreement (Veru Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iiic) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Enochian Biosciences Inc)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies ("Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Diversified Restaurant Holdings, Inc.)

Security and Access. Executive agrees and covenants (ai) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (bii) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Executive’s employment by the Company, whether termination is voluntary or involuntary. Executive agrees to notify the Company promptly in the event he Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Executive Employment Agreement (AgEagle Aerial Systems Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iiic) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Executive Employment Agreement (Dolphin Entertainment, Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, databases, internet, social media and instant messaging systems, computer systems, e-mail email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he the Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Executive Employment Agreement (Akari Therapeutics PLC)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, passwords, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he the Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Workiva Inc)

Security and Access. The Executive agrees and covenants (a) to comply with all Company Group security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company Group facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he the Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company Group property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (LIVE VENTURES Inc)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!