Security Relating to Competitors Sample Clauses

Security Relating to Competitors. (1) If Supplier intends to provide the Services from a Service Location that is shared with or used to provide services to a Customer Competitor, then, prior to providing any of the Services from such Service Location, Supplier shall develop a process, subject to Customer Party’s approval, to restrict access (electronically or physically, as applicable) in any such shared environment to Customer Confidential Information so that Supplier’s personnel providing services to such Customer Competitor do not have access to Customer Confidential Information. (2) [****]. (3) In the event that Supplier Party or IBM Global Services effects or undergoes an IBM Change in Control with, or otherwise acquires or becomes an Affiliate of, a Customer Competitor, Supplier shall, upon Customer’s request, demonstrate to Customer’s reasonable satisfaction that Supplier is, with respect to such Customer Competitor, complying with the security processes set forth in Section 7.04 as such process relates to Customer Competitors.
AutoNDA by SimpleDocs
Security Relating to Competitors. In the event that (1) Virtusa intends to provide the Services from a Service Location (a) that Virtusa shares with a third party or third parties (other than Virtusa Agents providing Services under this Agreement) or (b) from which Virtusa provides services to any competitor of Metavante or (2) any part of the business of Virtusa is now or in the future competitive with Metavante’s business, then, prior to providing any of the Services from such a Service Location, Virtusa shall use all reasonable commercial efforts to restrict access in any such shared environment to Metavante’s Confidential Information by taking such actions as are required, including without limitation, enforcing the Data Security Policy, so that Virtusa’s employees or Virtusa Agents providing services to such competitive business are restricted from having access to Metavante’s Confidential Information. PORTIONS OF THIS EXHIBIT WERE OMITTED AND HAVE BEEN FILED SEPARATELY WITH THE SECRETARY OF THE COMMISSION PURSUANT TO AN APPLICATION FOR CONFIDENTIAL TREATMENT UNDER RULE 24B-2 OF THE SECURITIES EXCHANGE ACT; [***] DENOTES OMISSIONS.
Security Relating to Competitors. If (1) IBM provides the Services to EMW from an IBM Service Location where it also provides similar services to a third party or third parties and (2) any part of the business of IBM or any such third party is now or in the future competitive with EMW's business, then IBM shall develop a process, subject to EMW's review, to restrict access in any such shared environment to EMW's Confidential Information so that IBM's employees or IBM Agents providing services to such competitive business do not have access to EMW's Confidential Information.
Security Relating to Competitors. [*] --------------------------------------
Security Relating to Competitors. Services may not be performed by TCS in a shared Resource model, facilities, Hardware or Software environment (“Shared Environment”) except as may be approved in writing by Xxxxxxx pursuant to Section 6.3. If Xxxxxxx approves and TCS provides the Services to Xxxxxxx from a Shared Environment and any part of the business of TCS or any such third party is now or in the future becomes competitive with Xxxxxxx’x business, then TCS shall establish and comply with such security practices as are consistent with the obligations provided in Section 14.3, so that TCS or TCS Agents providing services to such competitive business shall have no access to Xxxxxxx’x Confidential Information.
Security Relating to Competitors. If (a) TRX provides either the Services to Expedia from a Service Location that is shared with a Third Party or Third Parties, and (b) any part of the business of TRX or any such Third Party is now or in the future competitive with Expedia business, then TRX will develop a process, subject to Expedia’s approval, to restrict access in any such shared environment to Expedia’s Confidential Information so that Expedia’s Confidential Information is not shared with such Third Parties and/or any TRX Personnel who do not need such Confidential Information to perform the Services for Expedia.
Security Relating to Competitors. If (a) IBM provides the Basic Services to SCA from a Service Location that is shared with a Third Party or third parties and (b) any part of the business of IBM or any such Third Party is, as of the Effective Date or at any time thereafter, competitive with SCA's business, then IBM, at SCA's request, shall promptly develop and implement a process, subject to SCA's approval, to restrict access in any such shared environment to SCA's Confidential Information so that IBM or IBM Agents providing services to such competitive business shall have no access to SCA's Confidential Information, and IBM shall be responsible for all costs related to the development and implementation of such process. SCA shall be permitted to audit IBM's compliance with this Section upon reasonable written notice to IBM at any time during the Term.
AutoNDA by SimpleDocs
Security Relating to Competitors. Prior to the Cutover Date, the Parties shall agree on procedures that Supplier will implement at Supplier Service Locations if: (a) Supplier intends to provide the Services from a Service Location that is shared with a third party or third parties; or (b) any part of the business of Supplier or any such third party is now or in the future competitive with the PacifiCare Entities' business. Such procedures shall, at a minimum, restrict access in any such shared environment to PacifiCare's Confidential Information so that Supplier's employees or Supplier Agents providing services to such third parties do not have access to PacifiCare Confidential Information.
Security Relating to Competitors. If BETA intends to provide the Services from a Service Location that is shared with (a) a third party or (b) any part of the business of BETA or any of its Affiliates that is competitive with AGE’s businesses, then prior to providing any of the Services from such a Service Location, BETA shall develop physical and logical security measures, subject to AGE’s prior approval, not to be unreasonably withheld or delayed, to restrict access in any such shared Service Location to AGE’s Confidential Information so that BETA’s other customers do not have access to AGE’s Confidential Information.
Security Relating to Competitors. 22 10.04 Access to Personnel and Resources............................................................. 22 ARTICLE 11
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!