Common use of Systems Security Clause in Contracts

Systems Security. (a) If any Party or its Personnel are given access to any computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s performance or receipt of IT Services, such Party shall comply, and shall cause the other members of its Group and its Personnel to comply, with all of such other Party’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such other Party. (b) Each Party shall use commercially reasonable efforts to ensure that only those of its Personnel who are specifically authorized to have access to the Systems of the other Party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its Personnel regarding the restrictions set forth in this Agreement and establishing appropriate policies designed to effectively enforce such restrictions. (c) If, at any time, either Party determines that the other Party or its Personnel has sought to circumvent, or has circumvented, its Security Regulations, that any unauthorized Personnel of the other Party has accessed its Systems or that the other Party or any of its Personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software, such Party shall immediately terminate any such Personnel’s access to the Systems and promptly notify the other Party. (d) Each Party shall access and use, and shall cause their respective Personnel to access and use, only those Systems, and only such data and information within such Systems, to which it or they have been granted the right to access and use. Any Party shall have the right to deny the Personnel of the other Party access to such Party’s Systems, after prior written notice and consultation with the other Party, in the event the Party reasonably believes that such Personnel pose a security concern.

Appears in 3 contracts

Samples: It Services Agreement (KLX Inc.), Separation and Distribution Agreement (KLX Inc.), It Services Agreement (KLX Inc.)

AutoNDA by SimpleDocs

Systems Security. (a) If any Party or its Personnel are given access to any computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s performance or receipt of IT Transition Services, such Party shall comply, and shall cause the other members of its Group and its Personnel to comply, with all of such other Party’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such other Party. (b) Each Party shall use commercially reasonable efforts to ensure that only those of its Personnel who are specifically authorized to have access to the Systems of the other Party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its Personnel regarding the restrictions set forth in this Agreement and establishing appropriate policies designed to effectively enforce such restrictions. (c) If, at any time, either Party determines that the other Party or its Personnel has sought to circumvent, or has circumvented, its Security Regulations, that any unauthorized Personnel of the other Party has accessed its Systems or that the other Party or any of its Personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software, such Party shall immediately terminate any such Personnel’s access to the Systems and promptly notify the other Party. (d) Each Party shall access and use, and shall cause their respective Personnel to access and use, only those Systems, and only such data and information within such Systems, to which it or they have been granted the right to access and use. Any Party shall have the right to deny the Personnel of the other Party access to such Party’s Systems, after prior written notice and consultation with the other Party, in the event the Party reasonably believes that such Personnel pose a security concern.

Appears in 3 contracts

Samples: Separation and Distribution Agreement (KLX Inc.), Transition Services Agreement (KLX Inc.), Transition Services Agreement (KLX Inc.)

AutoNDA by SimpleDocs

Systems Security. (a) If any either Party or its Personnel are personnel will be given access to any computer systems or software of any member of the other Party’s Group computer systems or software (“Systems”) in connection with such Party’s the performance or receipt of IT the Transition Services, such the accessing Party or its personnel, as the case may be, shall comply, and shall cause the other members of its Group and its Personnel to comply, comply with all of such other Party’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will shall not tamper with, compromise or circumvent any security or audit measures employed by such other Party. (b) Each Party shall use commercially reasonable efforts to ensure that only those of its Personnel personnel who are specifically authorized to have access to the Systems of the other Party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its Personnel personnel regarding the restrictions set forth in this Agreement and establishing appropriate policies designed to effectively enforce such restrictions. (c) If, at any time, either Party determines that the other Party or its Personnel personnel has sought to circumvent, or has circumvented, its Security Regulations, that any unauthorized Personnel personnel of the other Party has accessed its Systems or that the other Party or any of its Personnel personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software, such Party shall immediately terminate any such Personnelpersonnel’s access to the Systems and promptly immediately notify the other Party. (d) Each Party and its personnel shall access and use, and shall cause their respective Personnel to access and use, use only those Systems, and only such data and information within with such Systems, to which it or they have has been granted the right to access and use. Any Party shall have the right to deny the Personnel personnel of the other Party access to such Party’s Systems, after prior written notice and consultation with the other Partynotice, in the event the such Party reasonably believes that such Personnel personnel pose a security concern.

Appears in 2 contracts

Samples: Asset Purchase Agreement (Park Ohio Holdings Corp), Asset Purchase Agreement (Lawson Products Inc/New/De/)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!