Common use of Third-Party Procedures and Telecommunication Network and Information Security Clause in Contracts

Third-Party Procedures and Telecommunication Network and Information Security. 3.1. During Party B’s Service Term, if Party B is engaged in any project assignments for a Third Party, Party B shall strictly abide by such Third Party’s rules and regulations on safety, work process and confidentiality and privacy. 3.2. Unless and until upon written approval of Party A and/or the Third Party, Party B shall not access any Third Party’s product data, or add, delete, or revise any data or program in the Third Party’s system or software. 3.3. Party B agrees that Party B shall not take any non-work related individuals to the Third Party’s business location. 3.4. Party B may not engage in any behavior which might compromise Party A’s and/or the Third Party’s telecommunications network security and information security: 3.4.1. Party B may not use Party A or any Third Party’s telecommunications networks to produce, copy, publish or transmit any information that is in violation of applicable Chinese rules and regulations, including information that: 3.4.1.1. violates the fundamental principles of the Chinese constitution; 3.4.1.2. is detrimental to state security, state secrecy, state power as well as national unification; 3.4.1.3. impairs state honor and interests; 3.4.1.4. agitates ethnic hatred and discrimination, and jeopardizes ethnic solidarity; 3.4.1.5. violates state religious policies by promoting cult, feudalism and superstition; 3.4.1.6. spreads rumor and disturbs social stability; 3.4.1.7. promotes obscenity, eroticism, gambling, violence, homicide and terror or the abetment of criminality; 3.4.1.8. insults or slanders others or violates the legal right of others; and 3.4.1. 9. contains matters that are prohibited by Chinese laws and regulations. 3.4.2. Party B may not engage in any activity that may endanger Party A’s and/or the Third Party’s telecommunications network security and information security, including but not limited to: 3.4.2.1. deleting or modifying the functions of telecommunications networks or the data stored, processed or transmitted and the application programs thereof; 3.4.2.2. stealing or destroying the information of others, or carrying out any activities that are harmful to the lawful rights and interests of others by using Party A and/or the Third Party’s telecommunications networks; 3.4.2.3. producing, copying or transmitting computer viruses or attacking Party A and/or any Third Party’s telecommunications networks and other telecommunications facilities; and 3.4.2.4. carrying out other activities harmful to telecommunications network security and information security. 3.4.3. Party B may not disclose or use any information transmitted by Party A and/or the Third Party’s customers through the telecommunications network without proper authorization. 3.4.4. Party B may not wiretap, copy, modify customers’ communication information, or provide conveniences for others to wiretap, copy, or modify, customers’ communication information. 3.4.5. Party B shall abide by Party’s A code of ethics. Party B may not misappropriate any resources available through Party A and/or the Third Party’s telecommunications network including any customers’ numbers, card numbers, and passwords, etc.

Appears in 3 contracts

Samples: Master Executive Employment Agreement (Asiainfo Holdings Inc), Master Executive Employment Agreement (Asiainfo Holdings Inc), Master Executive Employment Agreement (Asiainfo Holdings Inc)

AutoNDA by SimpleDocs

Third-Party Procedures and Telecommunication Network and Information Security. 3.1. 3.1 During Party B’s Service Term, if Party B is engaged in any project assignments for a Third Party, Party B shall strictly abide by such Third Party’s rules and regulations on safety, work process and confidentiality and privacy. 3.2. 3.2 Unless and until upon written approval of Party A and/or and / or the Third Party, Party B shall not access any Third Party’s product data, or add, delete, or revise any data or program in the Third Party’s system or software. 3.3. 3.3 Party B agrees that Party B shall not take any non-work related individuals to the Third Party’s business location. 3.4. 3.4 Party B may not engage in any behavior which might compromise Party A’s and/or B and / or the Third Party’s telecommunications network security and information security: 3.4.1. 3.4.1 Party B may not use Party A or any Third Party’s telecommunications networks to produce, copy, publish or and transmit any information that is are in violation of applicable Chinese rules and regulations, including information that: 3.4.1.1. 3.4.1.1 violates the fundamental principles of the Chinese constitution; 3.4.1.2. is 3.4.1.2 be detrimental to state security, state secrecy, state power as well as national unification; 3.4.1.3. 3.4.1.3 impairs state honor and interests; 3.4.1.4. 3.4.1.4 agitates ethnic hatred and discrimination, and jeopardizes ethnic solidarity; 3.4.1.5. 3.4.1.5 violates state religious policies by promoting cult, feudalism and superstition; 3.4.1.6. 3.4.1.6 spreads rumor and disturbs disturb social stability; 3.4.1.7. 3.4.1.7 promotes obscenity, eroticism, gambling, violence, homicide and terror or the abetment of criminality; 3.4.1.8. 3.4.1.8 insults or slanders slander others or violates violate the legal right of others; and 3.4.1. 9. contains matters 3.4.1.9 any other contents that are prohibited by Chinese laws and regulations. 3.4.2. 3.4.2 Party B may not engage in any activity that may endanger Party A’s and/or A and / or the Third Party’s telecommunications network security and information security, including but not limited to: 3.4.2.1. 3.4.2.1 deleting or modifying the functions of telecommunications networks or the data stored, processed or and transmitted and the application programs thereof; 3.4.2.2. 3.4.2.2 stealing or destroying the information of others, or carrying out any activities that are harmful to the lawful rights and interests of others by using Party A and/or and / or the Third Party’s telecommunications networks; 3.4.2.3. 3.4.2.3 producing, copying or and transmitting computer viruses or attacking Party A and/or and /or any Third Party’s telecommunications networks and other telecommunications facilities; and 3.4.2.4. 3.4.2.4 carrying out other activities harmful to telecommunications network security and information security. 3.4.3. 3.4.3 Party B may not disclose or use any information transmitted by Party A and/or and / or the Third Party’s customers through the telecommunications network without proper authorization. 3.4.4. 3.4.4 Party B may not wiretap, copy, modify customers’ communication information, or provide conveniences for others to wiretap, copy, or modify, modify customers’ communication information. 3.4.5. 3.4.5 Party B shall abide by Party’s A code of ethics. Party B may not misappropriate any resources available through Party A and/or and / or the Third Party’s telecommunications network including any customers’ numbers, card numbers, and passwords, etc.

Appears in 2 contracts

Samples: Confidentiality and Non Competition Agreement (Asiainfo-Linkage, Inc), Confidentiality and Non Competition Agreement (Asiainfo-Linkage, Inc)

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!