Security Relating to Competitors. (1) If Supplier intends to provide the Services from a Service Location that is shared with or used to provide services to a Customer Competitor, then, prior to providing any of the Services from such Service Location, Supplier shall develop a process, subject to Customer Party’s approval, to restrict access (electronically or physically, as applicable) in any such shared environment to Customer Confidential Information so that Supplier’s personnel providing services to such Customer Competitor do not have access to Customer Confidential Information.
Appears in 2 contracts
Samples: Information Technology Services Agreement, Information Technology Services Agreement (Broadridge Financial Solutions, Inc.)
Security Relating to Competitors. (1) If Supplier intends to provide the Services from a Service Location that is shared with or used to provide services to a Customer Competitor, then, prior to providing any of the Services from such Service Location, Supplier shall develop a process, subject to Customer Party’s 's approval, to restrict access (electronically or physically, as applicable) in any such shared environment to Customer Confidential Information so that Supplier’s 's personnel providing services to such Customer Competitor do not have access to Customer Confidential Information.
Appears in 2 contracts
Samples: 2019 Master Services Agreement (Broadridge Financial Solutions, Inc.), Information Technology Services Agreement (Broadridge Financial Solutions, Inc.)