Systems Security. (a) If the Provider, Purchaser, their Affiliates or their respective Personnel receive access to any of the Provider’s, Purchaser’s or their respective Affiliates’, as applicable, computer systems or software (“Systems”) in connection with the Transition Services, the accessing party or its Personnel, as the case may be, shall comply with all of such other party’s and its Affiliates’ Security Regulations as have been provided in writing to the other party, and will not tamper with, compromise or circumvent any security or audit measures employed by such other party. (b) Each party shall, and shall cause its Affiliates to, as required by Applicable Law, use commercially reasonable care to (i) ensure that only those of its Personnel who are specifically authorized to have access to the Systems of the other party or its Affiliates gain such access and (ii) prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its Personnel regarding the restrictions set forth in this Agreement and establishing appropriate policies designed to effectively enforce such restrictions. (c) The Provider and Purchaser shall, and shall cause their respective Affiliates to, access and use only those Systems of the other party and its Affiliates, and only such data and information within such Systems, to which they have been granted the right to access and use. Any party and its Affiliates shall have the right to deny the Personnel of the other party or its Affiliates access to such first party’s or its Affiliates’ Systems in the event the party reasonably believes that such Personnel pose a security concern, provided that the party denying access to its Systems shall provide notice to the other party promptly after such access is denied, and provided further that any dispute as to the appropriateness of such denial of access shall be resolved in accordance with Section 3.3 hereto.
Appears in 3 contracts
Samples: Master Agreement (AXA Equitable Holdings, Inc.), Master Agreement (Protective Life Insurance Co), Master Agreement (Protective Life Corp)
Systems Security. (a) If the ProviderPACTIV, PurchaserCompany, their Affiliates or their respective Personnel receive access to any of the ProviderPACTIV’s, Purchaser’s Company’s, or their respective Affiliates’, as applicable, computer systems or software (“Systems”) Systems in connection with the Transition Services, the accessing party Party or its Personnel, as the case may be, shall comply with all of such other partyParty’s and its Affiliates’ reasonable Security Regulations as have been provided known to such accessing Party or its Personnel or made known to such accessing Party or its Personnel in writing to the other partywriting, and will not tamper with, compromise or circumvent any security security, Security Regulations or audit measures employed by such other partyParty or its relevant Affiliate.
(b) Each party Party shall, and shall cause its Affiliates to, as required by Applicable applicable Law, use commercially reasonable care to (i) ensure that only those of its Personnel who are specifically authorized to have access to the Systems of the other party Party or its Affiliates gain such access and (ii) prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including by notifying its Personnel regarding the restrictions set forth in this Agreement and establishing appropriate policies designed to effectively enforce such restrictions.
(c) The Provider and Purchaser Each Party shall, and shall cause their respective Affiliates to, access and use only those Systems of the other party Party and its Affiliates, and only such data and information within such Systems, to which they have been granted the right to access and use. Any party Party and its Affiliates shall have the right to deny the Personnel of the other party Party or its Affiliates access to such first partyParty’s or its Affiliates’ Systems Systems, after prior written notice and consultation with the other Party, in the event the party Party reasonably believes that such Personnel pose a security concern, provided that the party denying access to its Systems shall provide notice to the other party promptly after such access is denied, and provided further that any dispute as to the appropriateness of such denial of access shall be resolved in accordance with Section 3.3 hereto.
Appears in 3 contracts
Samples: Transition Services Agreement (Pactiv Evergreen Inc.), Transition Services Agreement (Reynolds Group Holdings LTD), Transition Services Agreement (Reynolds Consumer Products Inc.)
Systems Security. (a) If Rank, the Provider, PurchaserCompany, their Affiliates or their respective Personnel receive access to any of the ProviderRank’s, Purchaser’s the Company’s, or their respective Affiliates’, as applicable, computer systems or software (“Systems”) Systems in connection with the Transition Services, the accessing party Party or its Personnel, as the case may be, shall comply with all of such other partyParty’s and its Affiliates’ reasonable Security Regulations as have been provided known to such accessing Party or its Personnel or made known to such accessing Party or its Personnel in writing to the other partywriting, and will not tamper with, compromise or circumvent any security security, Security Regulations or audit measures employed by such other partyParty or its relevant Affiliate.
(b) Each party Party shall, and shall cause its Affiliates to, as required by Applicable applicable Law, use commercially reasonable care to (i) ensure that only those of its Personnel who are specifically authorized to have access to the Systems of the other party Party or its Affiliates gain such access and (ii) prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including by notifying its Personnel regarding the restrictions set forth in this Agreement and establishing appropriate policies designed to effectively enforce such restrictions.
(c) The Provider and Purchaser Each Party shall, and shall cause their respective Affiliates to, access and use only those Systems of the other party Party and its Affiliates, and only such data and information within such Systems, to which they have been granted the right to access and use. Any party Party and its Affiliates shall have the right to deny the Personnel of the other party Party or its Affiliates access to such first partyParty’s or its Affiliates’ Systems Systems, after prior written notice and consultation with the other Party, in the event the party Party reasonably believes that such Personnel pose a security concern, provided that the party denying access to its Systems shall provide notice to the other party promptly after such access is denied, and provided further that any dispute as to the appropriateness of such denial of access shall be resolved in accordance with Section 3.3 hereto.
Appears in 2 contracts
Samples: Transition Services Agreement (Reynolds Consumer Products Inc.), Transition Services Agreement (Reynolds Consumer Products Inc.)
Systems Security. (a) If Rank, the Provider, PurchaserCompany, their Affiliates or their respective Personnel receive access to any of the ProviderRank’s, Purchaser’s the Company’s, or their respective Affiliates’, as applicable, computer systems or software (“Systems”) Systems in connection with the Transition Services, the accessing party Party or its Personnel, as the case may be, shall comply with all of such other partyParty’s and its Affiliates’ reasonable Security Regulations as have been provided known to such accessing Party or its Personnel or made known to such accessing Party or its Personnel in writing to the other partywriting, and will not tamper with, compromise or circumvent any security security, Security Regulations or audit measures employed by such other partyParty or its relevant Affiliate.
(b) Each party Party shall, and shall cause its Affiliates to, as required by Applicable applicable Law, use commercially reasonable care to (i) ensure that only those of its Personnel who are specifically authorized to have access to the Systems of the other party Party or its Affiliates gain such access and (ii) prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including by notifying its Personnel regarding the restrictions set forth in this Agreement and establishing appropriate policies designed to effectively enforce such restrictions.
(c) The Provider and Purchaser Each Party shall, and shall cause their its respective Affiliates to, access and use only those Systems of the other party Party and its Affiliates, and only such data and information within such Systems, to which they have been granted the right to access and use. Any party Party and its Affiliates shall have the right to deny the Personnel of the other party Party or its Affiliates access to such first partyParty’s or its Affiliates’ Systems Systems, after prior written notice and consultation with the other Party, in the event the party Party reasonably believes that such Personnel pose a security concern, provided that the party denying access to its Systems shall provide notice to the other party promptly after such access is denied, and provided further that any dispute as to the appropriateness of such denial of access shall be resolved in accordance with Section 3.3 hereto.
Appears in 2 contracts
Samples: Transition Services Agreement (Pactiv Evergreen Inc.), Transition Services Agreement (Pactiv Evergreen Inc.)
Systems Security. (a) If RGHI, the Provider, PurchaserCompany, their Affiliates or their respective Personnel receive access to any of the ProviderRGHI’s, Purchaser’s the Company’s, or their respective Affiliates’, as applicable, computer systems or software (“Systems”) Systems in connection with the Transition Services, the accessing party Party or its Personnel, as the case may be, shall comply with all of such other partyParty’s and its Affiliates’ reasonable Security Regulations as have been provided known to such accessing Party or its Personnel or made known to such accessing Party or its Personnel in writing to the other partywriting, and will not tamper with, compromise or circumvent any security security, Security Regulations or audit measures employed by such other partyParty or its relevant Affiliate.
(b) Each party Party shall, and shall cause its Affiliates to, as required by Applicable applicable Law, use commercially reasonable care to (i) ensure that only those of its Personnel who are specifically authorized to have access to the Systems of the other party Party or its Affiliates gain such access and (ii) prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including by notifying its Personnel regarding the restrictions set forth in this Agreement and establishing appropriate policies designed to effectively enforce such restrictions.
(c) The Provider and Purchaser Each Party shall, and shall cause their respective Affiliates to, access and use only those Systems of the other party Party and its Affiliates, and only such data and information within such Systems, to which they have been granted the right to access and use. Any party Party and its Affiliates shall have the right to deny the Personnel of the other party Party or its Affiliates access to such first partyParty’s or its Affiliates’ Systems Systems, after prior written notice and consultation with the other Party, in the event the party Party reasonably believes that such Personnel pose a security concern, provided that the party denying access to its Systems shall provide notice to the other party promptly after such access is denied, and provided further that any dispute as to the appropriateness of such denial of access shall be resolved in accordance with Section 3.3 hereto.
Appears in 1 contract
Samples: Transition Services Agreement (Pactiv Evergreen Inc.)