Common use of Systems Security Clause in Contracts

Systems Security. (a) If any Party or its Personnel are given access to any computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s performance or receipt of IT Services, such Party shall comply, and shall cause the other members of its Group and its Personnel to comply, with all of such other Party’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such other Party.

Appears in 3 contracts

Samples: It Services Agreement (KLX Inc.), Separation and Distribution Agreement (KLX Inc.), It Services Agreement (KLX Inc.)

AutoNDA by SimpleDocs

Systems Security. (a) If any Party or its Personnel are given access to any computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s performance or receipt of IT Transition Services, such Party shall comply, and shall cause the other members of its Group and its Personnel to comply, with all of such other Party’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such other Party.

Appears in 3 contracts

Samples: Transition Services Agreement (KLX Inc.), Separation and Distribution Agreement (KLX Inc.), Form of Transition Services Agreement (KLX Inc.)

Systems Security. (a) If any Party the Provider, Purchaser, their Affiliates or its their respective Personnel are given receive access to any of the Provider’s, Purchaser’s or their respective Affiliates’, as applicable, computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s performance or receipt of IT the Transition Services, such Party the accessing party or its Personnel, as the case may be, shall comply, and shall cause the other members of its Group and its Personnel to comply, comply with all of such other Partyparty’s system security policies, procedures and requirements (its Affiliates’ Security Regulations as amended from time have been provided in writing to time, the “Security Regulations”)other party, and will not tamper with, compromise or circumvent any security or audit measures employed by such other Partyparty.

Appears in 3 contracts

Samples: Transition Services Agreement (AXA Equitable Holdings, Inc.), Transition Services Agreement (Protective Life Insurance Co), Transition Services Agreement (Protective Life Corp)

Systems Security. (a) If any Seller Party or Purchaser Party, or its Personnel are Personnel, will be given access to any Seller Party’s or Purchaser Party’s, as applicable, computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s the performance or receipt of IT the Services, such Party the accessing party or its Personnel, as the case may be, shall comply, and shall cause the other members of its Group and its Personnel to comply, comply with all of such other Party’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such other Party.

Appears in 3 contracts

Samples: Transition Services Agreement (Legg Mason Inc), Private Client Transition Services Agreement (Legg Mason Inc), Capital Markets Transition Services Agreement (Legg Mason Inc)

Systems Security. (a) If any either Party or its Personnel are will be given access to any of the computer systems or software of any member of the other Party’s Group Party or any party performing the Services on its behalf (“Systems”) in connection with such Party’s the performance or receipt of IT the Services, such the accessing Party shall comply, and shall cause the other members of its Group and its Personnel to comply, shall comply with all of such other Party’s system security policies, procedures and requirements related to the Systems (as amended from time to time, the “Security Regulations”)) in effect as of the Effective Date and of which such accessing Party or its Personnel has been reasonably informed, and will not tamper with, compromise or circumvent any security or audit measures employed by such other Partythe Party granting such access and its Personnel.

Appears in 3 contracts

Samples: Transition Services Agreement (AdvanSix Inc.), Transition Services Agreement (AdvanSix Inc.), Transition Services Agreement (AdvanSix Inc.)

Systems Security. (a) If any Party or its Personnel are given access to any computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s performance or receipt of IT Transition Services, such Party shall comply, and shall cause the other members of its Group and its Personnel to comply, with all of such other Party’s Group’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such other Party’s Group.

Appears in 3 contracts

Samples: Services Agreement, Services Agreement (Liberty Latin America Ltd.), Services Agreement (Liberty Latin America Ltd.)

AutoNDA by SimpleDocs

Systems Security. (a) If any Party either Party, or its Personnel are or clients, will be given access to any the other Party’s computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s performance or receipt the Provision of IT the Services, such Party the accessing Party, its Personnel, or its clients, as the case may be, shall comply, and shall cause the other members of its Group and its Personnel to comply, comply with all of such other Party’s written system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such other Party.

Appears in 2 contracts

Samples: Securities Purchase Agreement (BATS Global Markets, Inc.), Securities Purchase Agreement (KCG Holdings, Inc.)

Systems Security. (a) If any either Party or its Personnel are personnel will be given access to any computer systems or software of any member of the other Party’s Group computer systems or software (“Systems”) in connection with such Party’s the performance or receipt of IT the Transition Services, such the accessing Party or its personnel, as the case may be, shall comply, and shall cause the other members of its Group and its Personnel to comply, comply with all of such other Party’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will shall not tamper with, compromise or circumvent any security or audit measures employed by such other Party.

Appears in 2 contracts

Samples: Asset Purchase Agreement (Park Ohio Holdings Corp), Asset Purchase Agreement (Lawson Products Inc/New/De/)

Systems Security. (a) If any Party or its Personnel are personnel will be given access to any another Party’s computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s the performance or receipt of IT the Services, such the accessing Party or its personnel, as the case may be, shall comply, comply with applicable Law and shall cause the other members of its Group and its Personnel to comply, with all of such other Party’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will shall not tamper with, compromise or circumvent any security or audit measures employed by such other Party. Each Party shall provide to the other its respective Security Regulations in writing prior to permitting the other Party to access its Systems.

Appears in 1 contract

Samples: Transition Services Agreement (Clearway Energy, Inc.)

Time is Money Join Law Insider Premium to draft better contracts faster.