Unauthorized Acts. Each Party shall (a) notify the other Party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "Unauthorized Access"), (b) promptly furnish to the other Party full details of the Unauthorized Access and use reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to prevent a reoccurrence of any such Unauthorized Access.
Appears in 12 contracts
Samples: Corporate Services Agreement (Fidelity National Title Group, Inc.), Corporate Services Agreement (Fidelity National Title Group, Inc.), Corporate Services Agreement (Fidelity National Title Group, Inc.)
Unauthorized Acts. Each Party shall (a) notify the other Party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "“Unauthorized Access"”), (b) promptly furnish to the other Party full details of the Unauthorized Access and use reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to prevent a reoccurrence of any such Unauthorized Access.
Appears in 10 contracts
Samples: Corporate Services Agreement (Lender Processing Services, Inc.), Corporate Services Agreement (Lender Processing Services, Inc.), Stock Purchase Agreement (Landamerica Financial Group Inc)
Unauthorized Acts. Each Party shall (a) notify the other Party promptly upon becoming aware of any unauthorized possession, use, or knowledge of any the other Party’s Confidential Information by any person which shall become known to itPerson, any attempt by any person Person to gain possession of such Confidential Information without authorization or any attempt to use or acquire knowledge of any such Confidential Information without authorization (collectively, "“Unauthorized Access"”), (b) promptly furnish to the other Party full details with reasonable detail of the Unauthorized Access and use commercially reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to prevent a reoccurrence of any such Unauthorized Access.
Appears in 8 contracts
Samples: Corporate Services Agreement (F&G Annuities & Life, Inc.), Reverse Corporate Services Agreement (F&G Annuities & Life, Inc.), Corporate Services Agreement (F&G Annuities & Life, Inc.)
Unauthorized Acts. Each Party shall (a) notify the other Party promptly of any unauthorized possession, use, access to, or knowledge of any Confidential Information by any person Person which shall become known to it, any attempt by any person Person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "“Unauthorized Access"”), (b) promptly furnish to the other Party full details of the Unauthorized Access and use reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties Third Parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to prevent a reoccurrence recurrence of any such Unauthorized Access.
Appears in 3 contracts
Samples: Transition Services Agreement (UCP, Inc.), Transition Services Agreement (UCP, Inc.), Transition Services Agreement (UCP, Inc.)
Unauthorized Acts. Each Party shall party shall: (a1) notify the other Party party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "Unauthorized Access"), (b2) promptly furnish to the other Party party full details of the Unauthorized Access and use reasonable efforts to assist the other Party party in investigating or preventing the reoccurrence of any Unauthorized Access, (c3) cooperate with the other Party party in any litigation and investigation against third parties deemed necessary by such Party party to protect its proprietary rights, and (d4) use commercially reasonable efforts to promptly prevent a reoccurrence of any such Unauthorized Access.
Appears in 3 contracts
Samples: Master Information Technology Services Agreement (Fidelity National Title Group, Inc.), Master Information Technology Services Agreement (Fidelity National Title Group, Inc.), Master Services Agreement (Fidelity National Information Services, Inc.)
Unauthorized Acts. Each Party shall party shall: (a1) notify the other Party party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "“Unauthorized Access"”), (b2) promptly furnish to the other Party party full details of the Unauthorized Access and use reasonable efforts to assist the other Party party in investigating or preventing the reoccurrence of any Unauthorized Access, (c3) cooperate with the other Party party in any litigation and investigation against third parties deemed necessary by such Party party to protect its proprietary rights, and (d4) use commercially reasonable efforts to promptly prevent a reoccurrence of any such Unauthorized Access.
Appears in 2 contracts
Samples: Master Information Technology and Application Development Services Agreement (Lender Processing Services, Inc.), Master Information Technology Services Agreement (Fidelity National Information Services, Inc.)
Unauthorized Acts. Each Party shall (a) notify the other Party promptly of any unauthorized possession, use, or knowledge of any the other Party’s Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of such Confidential Information without authorization or any attempt to use or acquire knowledge of any such Confidential Information without authorization (collectively, "“Unauthorized Access"”), (b) promptly furnish to the other Party full details of the Unauthorized Access and use reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to prevent a reoccurrence of any such Unauthorized Access.
Appears in 2 contracts
Samples: Corporate and Transitional Services Agreement (New Remy Holdco Corp.), Corporate and Transitional Services Agreement (New Remy Holdco Corp.)
Unauthorized Acts. Each Party party hereto shall (ai) notify the other Party party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "Unauthorized Access"), (bii) promptly furnish to the other Party party full details of the Unauthorized Access and use reasonable efforts to assist the other Party party in investigating or preventing the reoccurrence of any Unauthorized Access, (ciii) cooperate with the other Party party in any litigation and investigation against third parties deemed necessary by such Party party to protect its proprietary rights, and (div) use commercially reasonable efforts promptly take all steps necessary to prevent a reoccurrence of any such Unauthorized Access.
Appears in 2 contracts
Samples: Transition and Integration Services Agreement (Scottish Re Group LTD), Administrative Services Agreement (Scottish Re Group LTD)
Unauthorized Acts. Each Party shall party shall: (a1) notify the other Party party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "Unauthorized Access"”), (b2) promptly furnish to the other Party party full details of the Unauthorized Access and use reasonable efforts to assist the other Party party in investigating or preventing the reoccurrence of any Unauthorized Access, (c3) cooperate with the other Party party in any litigation and investigation against third parties deemed necessary by such Party party to protect its proprietary rights, and (d4) use commercially reasonable efforts to promptly prevent a reoccurrence of any such Unauthorized Access.
Appears in 2 contracts
Samples: Master Information Technology and Application Development Services Agreement (Lender Processing Services, Inc.), Master Information Technology and Application Development Services Agreement (Lender Processing Services, Inc.)
Unauthorized Acts. Each Party shall (a) notify the other Party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "Unauthorized Access"), (b) promptly furnish to the other Party full details of the Unauthorized Access and use reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to promptly prevent a reoccurrence of any such Unauthorized Access.
Appears in 1 contract
Samples: Transition Services Agreement (Fidelity National Information Services, Inc.)
Unauthorized Acts. Each Party shall (a) notify the other Party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "Unauthorized Access"), (bAccess"),(b) promptly furnish to the other Party full details of the Unauthorized Access and use reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to promptly prevent a reoccurrence of any such Unauthorized Access.
Appears in 1 contract
Samples: Reverse Transition Services Agreement (Fidelity National Information Services, Inc.)