Common use of Security and Access Clause in Contracts

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 3 contracts

Samples: Executive Employment Agreement (Us Xpress Enterprises Inc), Executive Employment Agreement (Us Xpress Enterprises Inc), Executive Employment Agreement (Us Xpress Enterprises Inc)

AutoNDA by SimpleDocs

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time, time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company Group intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company Group facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he he/she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company Group property or materials by others.

Appears in 3 contracts

Samples: Employment Agreement (Reviva Pharmaceuticals Holdings, Inc.), Employment Agreement (Byrna Technologies Inc.), Employment Agreement (Tenzing Acquisition Corp.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company Company/MMG security policies and procedures as in force from time to time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company Company/MMG intranet, internet, social media and instant messaging systems, computer systems, e-mail email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, and any and all other Company Company/MMG facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he the Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company and affiliates property or materials by others.

Appears in 2 contracts

Samples: Employment Agreement (Reliability Inc), Employment Agreement (Reliability Inc)

Security and Access. The Executive agrees and covenants to (a) to comply with all Company security policies and procedures as in force from time to time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); as well as (b) not to access or use any Facilities and Information Technology Resources Resources, except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns they learn of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.. ​

Appears in 2 contracts

Samples: Executive Employment Agreement (TILT Holdings Inc.), Executive Employment Agreement (TILT Holdings Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force effect from time to time, including without limitation limitation, those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company facilities, IT resources resources, and communication technologies (“Facilities and Information Technology Resources”); , (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; , and (iiic) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 2 contracts

Samples: Employment Agreement (Angion Biomedica Corp.), Employment Agreement (Elicio Therapeutics, Inc.)

Security and Access. The Executive agrees and covenants to (a) to comply with all Company security policies and procedures as in force from time to time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); as well as (b) not to access or use any Facilities and Information Technology Resources Resources, except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns they learn of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 2 contracts

Samples: Executive Employment Agreement (TILT Holdings Inc.), Executive Employment Agreement (TILT Holdings Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 2 contracts

Samples: Executive Employment Agreement (Us Xpress Enterprises Inc), Executive Employment Agreement (Us Xpress Enterprises Inc)

Security and Access. The Executive agrees and covenants (a) to comply with all Company Group security policies and procedures as in force from time to time, time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company Group intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company Group facilities, IT resources and communication technologies ("Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company Group property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Tecogen Inc.)

Security and Access. The Executive Consultant agrees and covenants (a) to comply with all Company Group security policies and procedures as in force from time to time, time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company Group intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company Group facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the ExecutiveConsultant’s employment service by the Company, whether termination is voluntary or involuntary. The Executive Consultant agrees to notify the Company promptly in the event he Consultant learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company Group property or materials by others.

Appears in 1 contract

Samples: Consultant Agreement (Mainz Biomed B.V.)

Security and Access. The Executive agrees and covenants (ai) to comply with all Company security policies and procedures as in force from time to time, time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology and Access Resources”); (bii) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he the Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Change in Control Agreement (Lancaster Colony Corp)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time, time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (PLx Pharma Inc.)

AutoNDA by SimpleDocs

Security and Access. The Executive agrees and covenants to: (ai) to comply with all the Company security policies and procedures as in force from time to time, including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, the Company intranet, internet, social media and instant messaging systems, computer systems, e-mail email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, and any and all other the Company facilities, IT resources and communication technologies (“Facilities and Information Technology and Access Resources”); (bii) not to access or use any Facilities and Information Technology and Access Resources except as authorized by in the course of his duties to the Company; and (iii) not to access or use any Facilities and Information Technology and Access Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, others or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse reverse-engineering of, or tampering with with, any Facilities and Information Technology and Access Resources or other the Company property or materials by others.

Appears in 1 contract

Samples: Executive Employment Agreement (Cannasys Inc)

Security and Access. The Executive Employee agrees and covenants (ai) to comply with all Company security policies and procedures as in force from time to time, time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (bii) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the ExecutiveEmployee’s employment by the Company, whether termination is voluntary or involuntary. The Executive Employee agrees to notify the Company promptly in the event he Employee learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Confidentiality Agreement (AgEagle Aerial Systems Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time, time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, and any and all other Company facilities, IT resources resources, and communication technologies ("Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he the Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Alopexx, Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time, time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Biotech Products Services & Research, Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and arid procedures as in force from time to time, time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company facilities, IT 1T resources and communication technologies ("Facilities and Information Technology and Access Resources"); (b) not to access or use any Facilities and Information information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Icon Vapor, Inc.)

Security and Access. The Executive Employee agrees and covenants (ai) to comply with all Company security policies and procedures as in force from time to time, time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology and Access Resources”); (bii) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the ExecutiveEmployee’s employment by the Company, whether termination is voluntary or involuntary. The Executive Employee agrees to notify the Company promptly in the event he Employee learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employee Confidentiality and Proprietary Rights Agreement (AgEagle Aerial Systems Inc.)

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time, time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, passwords and any and all other Company facilities, IT resources and communication technologies ("Facilities and Information Technology and Access Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s 's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Appears in 1 contract

Samples: Employment Agreement (Biotech Products Services & Research, Inc.)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!