Common use of Software and Data Integrity Clause in Contracts

Software and Data Integrity. 6.2.9.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 12 contracts

Samples: T Wholesale Agreement, Interconnection Agreement, Interconnection Agreement

AutoNDA by SimpleDocs

Software and Data Integrity. 6.2.9.1 9.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 8 contracts

Samples: Resale Agreement, Interconnection Agreement, apps.psc.wi.gov

Software and Data Integrity. 6.2.9.1 33.11.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 7 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

Software and Data Integrity. 6.2.9.1 7.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 7 contracts

Samples: Agreement, Wholesale Agreement, Agreement

Software and Data Integrity. 6.2.9.1 9.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 6 contracts

Samples: Agreement, Wholesale Agreement, Agreement

Software and Data Integrity. 6.2.9.1 37.7.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 3 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

Software and Data Integrity. 6.2.9.1 8.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 3 contracts

Samples: PCS Interconnection Agreement, PCS Interconnection Agreement, PCS Interconnection Agreement

AutoNDA by SimpleDocs

Software and Data Integrity. 6.2.9.1 11.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 3 contracts

Samples: MFN Agreement, Interconnection Agreement – Nevada, www.efis.psc.mo.gov

Software and Data Integrity. 6.2.9.1 (1) Each Party shall use a comparable degree of care to protect the other Party’s 's software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 1 contract

Samples: Interconnection Agreement

Software and Data Integrity. 6.2.9.1 (1) Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 1 contract

Samples: Interconnection Agreement

Software and Data Integrity. 6.2.9.1 40.7.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 1 contract

Samples: Interconnection Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!