Common use of Software and Data Integrity Clause in Contracts

Software and Data Integrity. 9.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation. 9.11.2 All software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces. 9.11.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed through the direct connection or dial up access to OSS Interfaces. 9.11.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.

Appears in 9 contracts

Samples: Interconnection Agreement, Wholesale Agreement, Telecommunications

AutoNDA by SimpleDocs

Software and Data Integrity. 9.11.1 33.11.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation. 9.11.2 All 33.11.10.2 Untrusted software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces. 9.11.3 33.11.10.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed through the direct connection or dial up access to OSS Interfaces. 9.11.4 33.11.10.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.

Appears in 7 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

Software and Data Integrity. 9.11.1 7.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation. 9.11.2 7.11.2 All software or data shall be scanned for viruses before use on a Party’s corporate facilities Facilities that can be accessed through the direct connection or dial up access to OSS interfaces. 9.11.3 7.11.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed through the direct connection or dial up access to OSS Interfaces. 9.11.4 7.11.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.

Appears in 4 contracts

Samples: Peering Agreement, Wholesale Agreement, Two Way CMRS Interconnection Agreement

Software and Data Integrity. 9.11.1 37.7.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation. 9.11.2 All 37.7.2 Suspected software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces. 9.11.3 37.7.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed access through the direct connection or dial up access to OSS Interfaces. 9.11.4 37.7.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.

Appears in 3 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

Software and Data Integrity. 9.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation. 9.11.2 All . Untrusted software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces. 9.11.3 . Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed access through the direct connection or dial up access to OSS Interfaces. 9.11.4 . Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.

Appears in 2 contracts

Samples: Interconnection Agreement, Interconnection Agreement

Software and Data Integrity. 9.11.1 40.7.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation. 9.11.2 All 40.7.2 Suspected software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces. 9.11.3 40.7.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed access through the direct connection or dial up access to OSS Interfaces. 9.11.4 40.7.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.

Appears in 1 contract

Samples: Interconnection Agreement

Software and Data Integrity. 9.11.1 7.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation. 9.11.2 7.11.2 All software or data shall be scanned for viruses before use on a Party’s corporate facilities Facilities that can be accessed through the direct connection or dial up access to OSS interfaces. 9.11.3 7.11.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed through the direct connection or dial up access to OSS Interfaces.. CN:03292017-7376 000081 9.11.4 7.11.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.

Appears in 1 contract

Samples: Telecommunications

AutoNDA by SimpleDocs

Software and Data Integrity. 9.11.1 8.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation. 9.11.2 8.11.2 All software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces. 9.11.3 8.11.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed access through the direct connection or dial up access to OSS Interfaces. 9.11.4 8.11.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.

Appears in 1 contract

Samples: Wholesale Agreement

Software and Data Integrity. 9.11.1 (1) Each Party shall use a comparable degree of care to protect the other Party’s 's software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation. 9.11.2 All (2) Suspected software or data shall be scanned for viruses before use on a Party’s 's corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces. 9.11.3 (3) Unauthorized use of copyrighted software is prohibited on each Party’s 's corporate systems that can be accessed access through the direct connection or dial up access to OSS Interfaces. 9.11.4 (4) Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s 's proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.

Appears in 1 contract

Samples: Interconnection Agreement

Software and Data Integrity. 9.11.1 7.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation. 9.11.2 7.11.2 All software or data shall be scanned for viruses before use on a Party’s corporate facilities Facilities that can be accessed through the direct connection or dial up access to OSS interfaces. 9.11.3 7.11.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed through the direct connection or dial up access to OSS Interfaces.. Page 83 of 339 9.11.4 7.11.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.

Appears in 1 contract

Samples: Wholesale Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!