Systems Security. (a) If either Party or any of its respective Subsidiaries (such Party together with its Subsidiaries, the “Accessing Party”) is given access to the computer system(s), facilities, networks (including voice or data networks) or software (collectively, “Systems”) used by the other Party or any of the other Party’s Subsidiaries (such other Party and its Subsidiaries, the “Disclosing Party”) in connection with the provision of the Services, the Accessing Party shall comply with the Disclosing Party’s security regulations, which shall be provided by the Disclosing Party prior to access to the Systems. The Accessing Party will not tamper with, compromise or circumvent any security or audit measures employed by the Disclosing Party. The Accessing Party shall (i) ensure that only those users who are specifically authorized to gain access to the other’s Systems gain such access and (ii) prevent unauthorized destruction, alteration or loss of information contained therein. If at any time the Disclosing Party determines that any personnel of the Accessing Party has sought to circumvent or has circumvented the Disclosing Party’s security regulations or other security or audit measures or that an unauthorized person has accessed or may access the Disclosing Party’s Systems or a person has engaged in activities that may lead to the unauthorized access, destruction or alteration or loss of data, information or software, the Disclosing Party may immediately terminate any such person’s access to the Systems and, if such person’s access is terminated, shall immediately notify the Accessing Party. In addition, a material failure to comply with the Disclosing Party’s security regulations shall be a breach of this Agreement, and the Parties shall work together to rectify any such failure to comply with the Disclosing Party’s security regulations. If any breach of the Disclosing Party’s security regulations is not rectified within ten days following its occurrence, the Disclosing Party shall be entitled to immediately terminate the Services to which the breach relates or, if it relates to all the Services that the Disclosing Party receives or provides, as applicable, the non-breaching Party shall be entitled to immediately terminate the Agreement in its entirety. (b) The Accessing Party represents and warrants to the Disclosing Party that all software code, any related deliverables and any data or information input into any Systems in connection with the Services does not and will not contain any program, routine, device, code, instructions (including any code or instructions provided by third parties) or other undisclosed feature, including a time bomb, virus, software lock, drop-dead device, malicious logic, worm, Trojan horse, spyware, bug, error, defect or trap door, that is capable of (or has the effect of allowing any untrusted party to be capable of) accessing, modifying, deleting, damaging, disabling, deactivating, interfering with or otherwise harming the Services or any of the Disclosing Party’s Systems, data or other electronically stored information (collectively, “Disabling Procedures”). Such representation and warranty applies regardless of whether such Disabling Procedures are authorized by the Disclosing Party to be included in the Services or related deliverables. Notwithstanding any other limitations in this Agreement, each Accessing Party agrees to notify the applicable Disclosing Party immediately upon discovery of any Disabling Procedures that are or reasonably suspected to be included in the Services or related deliverables, and if Disabling Procedures are discovered or reasonably suspected to be present therein, the Accessing Party shall immediately take all actions reasonably necessary, at its own expense, to identify and eradicate (or equip the other party to identify and eradicate) such Disabling Procedures and carry out any recovery necessary to remedy any impact of such Disabling Procedures.
Appears in 3 contracts
Samples: Transitional Services Agreement (Great Western Bancorp, Inc.), Transitional Services Agreement (Great Western Bancorp, Inc.), Transitional Services Agreement (Great Western Bancorp, Inc.)
Systems Security. (a) If either Party The parties hereto acknowledge that personnel of each party or any of its respective Subsidiaries such party’s Affiliates (such Party together with its Subsidiaries, the “Accessing Party”) is ), as the case may be, will be given access to the other parties’ or its Affiliates’ (the “Granting Party”) information technology systems, information technology, platforms, networks, applications, software, software databases or computer system(s), facilities, networks hardware (including voice or data networks) or software (collectively, “Systems”) used by the other Party or any of the other Party’s Subsidiaries (such other Party and its Subsidiaries, the “Disclosing Party”) in connection with the provision or receipt of the Services, in which there is no commercially practical method to partition or separate portions of the Systems or restrict the access of the personnel of the Accessing Party in connection with the Services. Accordingly, the Accessing Party shall comply with all of the Disclosing Granting Party’s system security regulationspolicies, which procedures and requirements (collectively, “Security Regulations”), and shall be provided by the Disclosing Party prior to access to the Systems. The Accessing Party will not tamper with, compromise or circumvent any security or audit measures employed by the Disclosing PartyGranting Party or any of its Affiliates. The Each Accessing Party shall ensure that its personnel accessing the Granting Party’s Systems are made aware of the restrictions set forth in this Agreement and the Security Regulations prior to connecting to the Granting Party’s Systems.
(b) If the Granting Party in good faith determines that there is a material risk to the Granting Party due to the ability of the Accessing Party’s personnel to access the Granting Party’s Systems or data, the Granting Party may, but is under no obligation to, establish and implement commercially reasonable restrictions on the Accessing Party’s access to the Systems or data used in connection with the Services for the purposes of: (i) ensure that only those users who are specifically authorized to gain access to protecting the other’s Systems gain such access security of data on physical and electronic networks of the Granting Party; (ii) prevent unauthorized destructionassuring compliance with contractual restrictions imposed by third parties; (iii) protecting the integrity of the Systems or data; or (iv) complying with applicable Law; provided that any such restrictions will be designed to minimize any disruption or limitation on the receipt and benefit of the Services by the Accessing Party; provided, alteration or loss further, that, prior to implementing any such restrictions, the Granting Party shall notify the Accessing Party of information contained therein. If the reasons for seeking to limit such access including providing a description of the restrictions it intends to implement, and the parties hereto will cooperate in good faith to determine if such risks can be addressed without implementing such restrictions.
(c) If, at any time the Disclosing time, an Accessing Party determines that any such personnel of the Accessing Party has (i) sought to circumvent circumvent, or has circumvented circumvented, the Disclosing Party’s security regulations or other security or audit measures or that an unauthorized person has accessed or may access the Disclosing Party’s Systems or a person Security Regulations, (ii) has engaged in activities that may lead to the unauthorized accessdestruction, destruction or alteration or loss of data, information or softwaresoftware of the Granting Party or any of its Affiliates, or (iii) has breached clause (y) of the last sentence of Section 14, the Disclosing Accessing Party may immediately terminate any such person’s access to the Systems and, if such person’s access is terminated, shall and immediately notify the Accessing Granting Party. In addition, a material failure to comply with the Disclosing Party’s security regulations shall be a breach of this Agreement, and the Parties shall work together to rectify any such failure to comply with the Disclosing Party’s security regulations. If any breach of the Disclosing Party’s security regulations is not rectified within ten days following its occurrence, the Disclosing Party shall be entitled to immediately terminate the Services to which the breach relates or, if it relates to all the Services that the Disclosing Party receives or provides, as applicable, the non-breaching Party shall be entitled to immediately terminate the Agreement in its entirety.
(b) The Accessing Party represents and warrants to the Disclosing Party that all software code, any related deliverables and any data or information input into any Systems in connection with the Services does not and will not contain any program, routine, device, code, instructions (including any code or instructions provided by third parties) or other undisclosed feature, including a time bomb, virus, software lock, drop-dead device, malicious logic, worm, Trojan horse, spyware, bug, error, defect or trap door, that is capable of (or has the effect of allowing any untrusted party to be capable of) accessing, modifying, deleting, damaging, disabling, deactivating, interfering with or otherwise harming the Services or any of the Disclosing Party’s Systems, data or other electronically stored information (collectively, “Disabling Procedures”). Such representation and warranty applies regardless of whether such Disabling Procedures are authorized by the Disclosing Party to be included in the Services or related deliverables. Notwithstanding any other limitations in this Agreement, each Accessing Party agrees to notify the applicable Disclosing Party immediately upon discovery of any Disabling Procedures that are or reasonably suspected to be included in the Services or related deliverables, and if Disabling Procedures are discovered or reasonably suspected to be present therein, the Each Accessing Party shall immediately take all actions reasonably necessary, at its own expense, to identify and eradicate (or equip cooperate with the other party to identify and eradicate) such Disabling Procedures and carry out relevant Granting Party in investigating any recovery necessary to remedy any impact of such Disabling Procedurespossible issues resulting from System’s access described in the preceding sentence.
Appears in 2 contracts
Samples: Shared Services Agreement (Curbline Properties Corp.), Shared Services Agreement (Curbline Properties Corp.)
Systems Security. (a) If either Party or any of its respective Subsidiaries (such Party together with its Subsidiaries, the “Accessing Party”) is given access to the computer system(s), facilities, networks (including voice or data networks) or software (collectively, “Systems”) used by the other Party or any of the other Party’s Subsidiaries (such other Party and its Subsidiaries, the “Disclosing Party”) in connection with the provision of the Services, the Accessing Party shall comply with the Disclosing Party’s security regulations, which shall be provided by the Disclosing Party prior to access to the Systems. The Accessing Party will not tamper with, compromise or circumvent any security or audit measures employed by the Disclosing Party. The Accessing Party shall (i) ensure that only those users who are specifically authorized to gain access to the other’s Systems gain such access and (ii) prevent unauthorized destruction, alteration or loss of information contained therein. If at any time the Disclosing Party determines that any personnel of the Accessing Party has sought to circumvent or has circumvented the Disclosing Party’s security regulations or other security or audit measures or that an unauthorized person has accessed or may access the Disclosing Party’s Systems or a person has engaged in activities that may lead to the unauthorized access, destruction or alteration or loss of data, information or software, the Disclosing Party may immediately terminate any such person’s access to the Systems and, if such person’s access is terminated, shall immediately notify the Accessing Party. In addition, a material failure to comply with the Disclosing Party’s security regulations shall be a breach of this Agreement, and the Parties shall work together to rectify any such failure to comply with the Disclosing Party’s security regulations. If any breach of the Disclosing Party’s security regulations is not rectified within ten days following its occurrence, the Disclosing Party shall be entitled to immediately terminate the Services to which the breach relates or, if it relates to all the Services that the Disclosing Party receives or provides, as applicable, the non-breaching Party shall be entitled to immediately terminate the Agreement in its entirety.
(b) The Accessing Party represents and warrants to the Disclosing Party that all software code, any related deliverables and any data or information input into any Systems in connection with the Services does not and will not contain any program, routine, device, code, instructions (including any code or instructions provided by third parties) or other undisclosed feature, including a time bomb, virus, software lock, drop-dead device, malicious logic, worm, Trojan horse, spyware, bug, error, defect or trap door, that is capable of (or has the effect of allowing any untrusted party to be capable of) accessing, modifying, deleting, damaging, disabling, deactivating, interfering with or otherwise harming the Services or any of the Disclosing Party’s Systems, data or other electronically stored information (collectively, “Disabling Procedures”). Such representation and warranty applies regardless of whether such Disabling Procedures are authorized by the Disclosing Party to be included in the Services or related deliverables. Notwithstanding any other limitations in this Agreement, each Accessing Party agrees to notify the applicable Disclosing Party immediately upon discovery of any Disabling Procedures that are or reasonably suspected to be included in the Services or related deliverables, and if Disabling Procedures are discovered or reasonably suspected to be present therein, the Accessing Party shall immediately take all actions reasonably necessary, at its own expense, to identify and eradicate (or equip the other party to identify and eradicate) such Disabling Procedures and carry out any recovery necessary to remedy any impact of such Disabling Procedures.
Appears in 1 contract
Samples: Transitional Services Agreement (Great Western Bancorp, Inc.)