Common use of Software and Data Integrity Clause in Contracts

Software and Data Integrity. 6.2.9.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 10 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

AutoNDA by SimpleDocs

Software and Data Integrity. 6.2.9.1 33.11.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 7 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

Software and Data Integrity. 6.2.9.1 9.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 6 contracts

Samples: Resale Agreement, Interconnection Agreement, apps.psc.wi.gov

Software and Data Integrity. 6.2.9.1 9.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 6 contracts

Samples: Agreement, Wholesale Agreement, Agreement

Software and Data Integrity. 6.2.9.1 7.11.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 3 contracts

Samples: Wholesale Agreement, Agreement, Two Way CMRS Interconnection Agreement

Software and Data Integrity. 6.2.9.1 37.7.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 2 contracts

Samples: Interconnection Agreement, Interconnection Agreement

Software and Data Integrity. 6.2.9.1 11.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 2 contracts

Samples: MFN Agreement, Interconnection Agreement – Nevada

AutoNDA by SimpleDocs

Software and Data Integrity. 6.2.9.1 40.7.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 1 contract

Samples: Interconnection Agreement

Software and Data Integrity. 6.2.9.1 8.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 1 contract

Samples: PCS Interconnection Agreement

Software and Data Integrity. 6.2.9.1 (1) Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 1 contract

Samples: Interconnection Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.