Software and Data Integrity. 9.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation. 9.11.2 All software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces. 9.11.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed through the direct connection or dial up access to OSS Interfaces. 9.11.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.
Appears in 9 contracts
Samples: Interconnection Agreement, Wholesale Agreement, Telecommunications
Software and Data Integrity. 9.11.1 33.11.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
9.11.2 All 33.11.10.2 Untrusted software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces.
9.11.3 33.11.10.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed through the direct connection or dial up access to OSS Interfaces.
9.11.4 33.11.10.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.
Appears in 7 contracts
Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement
Software and Data Integrity. 9.11.1 7.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
9.11.2 7.11.2 All software or data shall be scanned for viruses before use on a Party’s corporate facilities Facilities that can be accessed through the direct connection or dial up access to OSS interfaces.
9.11.3 7.11.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed through the direct connection or dial up access to OSS Interfaces.
9.11.4 7.11.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.
Appears in 4 contracts
Samples: Peering Agreement, Wholesale Agreement, Two Way CMRS Interconnection Agreement
Software and Data Integrity. 9.11.1 37.7.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
9.11.2 All 37.7.2 Suspected software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces.
9.11.3 37.7.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed access through the direct connection or dial up access to OSS Interfaces.
9.11.4 37.7.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.
Appears in 3 contracts
Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement
Software and Data Integrity. 9.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
9.11.2 All . Untrusted software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces.
9.11.3 . Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed access through the direct connection or dial up access to OSS Interfaces.
9.11.4 . Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.
Appears in 2 contracts
Samples: Interconnection Agreement, Interconnection Agreement
Software and Data Integrity. 9.11.1 40.7.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
9.11.2 All 40.7.2 Suspected software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces.
9.11.3 40.7.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed access through the direct connection or dial up access to OSS Interfaces.
9.11.4 40.7.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.
Appears in 1 contract
Samples: Interconnection Agreement
Software and Data Integrity. 9.11.1 7.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
9.11.2 7.11.2 All software or data shall be scanned for viruses before use on a Party’s corporate facilities Facilities that can be accessed through the direct connection or dial up access to OSS interfaces.
9.11.3 7.11.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed through the direct connection or dial up access to OSS Interfaces.. CN:03292017-7376 000081
9.11.4 7.11.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.
Appears in 1 contract
Samples: Telecommunications
Software and Data Integrity. 9.11.1 8.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
9.11.2 8.11.2 All software or data shall be scanned for viruses before use on a Party’s corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces.
9.11.3 8.11.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed access through the direct connection or dial up access to OSS Interfaces.
9.11.4 8.11.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.
Appears in 1 contract
Samples: Wholesale Agreement
Software and Data Integrity. 9.11.1 (1) Each Party shall use a comparable degree of care to protect the other Party’s 's software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
9.11.2 All (2) Suspected software or data shall be scanned for viruses before use on a Party’s 's corporate facilities that can be accessed through the direct connection or dial up access to OSS interfaces.
9.11.3 (3) Unauthorized use of copyrighted software is prohibited on each Party’s 's corporate systems that can be accessed access through the direct connection or dial up access to OSS Interfaces.
9.11.4 (4) Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s 's proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.
Appears in 1 contract
Samples: Interconnection Agreement
Software and Data Integrity. 9.11.1 7.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
9.11.2 7.11.2 All software or data shall be scanned for viruses before use on a Party’s corporate facilities Facilities that can be accessed through the direct connection or dial up access to OSS interfaces.
9.11.3 7.11.3 Unauthorized use of copyrighted software is prohibited on each Party’s corporate systems that can be accessed through the direct connection or dial up access to OSS Interfaces.. Page 83 of 339
9.11.4 7.11.4 Proprietary software or information (whether electronic or paper) of a Party shall not be given by the other Party to unauthorized individuals. When it is no longer needed, each Party’s proprietary software or information shall be returned by the other Party or disposed of securely. Paper copies shall be shredded. Electronic copies shall be overwritten or degaussed.
Appears in 1 contract
Samples: Wholesale Agreement