Software and Data Integrity. 6.2.9.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
Appears in 12 contracts
Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement
Software and Data Integrity. 6.2.9.1 9.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
Appears in 9 contracts
Samples: Interconnection Agreement, Resale Agreement, Interconnection Agreement
Software and Data Integrity. 6.2.9.1 8.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
Appears in 4 contracts
Samples: Cellular/PCS Interconnection Agreement, Cellular/PCS Interconnection Agreement, Cellular/PCS Interconnection Agreement
Software and Data Integrity. 6.2.9.1 11.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
Appears in 3 contracts
Samples: MFN Agreement, Interconnection Agreement, Missouri 271 Agreement
Software and Data Integrity. 6.2.9.1 (1) Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.
Appears in 1 contract
Samples: Interconnection Agreement