Common use of Access to Computer Systems Clause in Contracts

Access to Computer Systems. If Service Provider is given access to any of Recipient’s equipment, computer, software, network, electronic files, or electronic data storage system, Service Provider shall limit such access and use solely to perform Services for Recipient and shall not access or attempt to access any equipment, computer, software, network, electronic files, or electronic data storage system, other than those specifically required to accomplish the Services. Service Provider shall limit such access to those Service Provider Personnel with an express requirement to have such access in connection with this Agreement, shall advise Recipient in writing of the name of each such employee who will be granted such access, and shall strictly follow all Recipient security rules and procedures for use of Recipient’s electronic resources. All user identification numbers and passwords disclosed to Service Provider and any information obtained by Service Provider as a result of their access to and use of Recipient’s equipment, computers, software, networks, electronic files, and electronic data storage systems, shall be deemed to be, and shall be treated as, Confidential Information (as defined in the Sublicense Agreement) under applicable provisions of this Agreement. Service Provider agrees to cooperate with Recipient in the investigation of any apparent unauthorized access by Service Provider to Recipient’s equipment, computer, software, network, electronic file, or electronic data storage systems, or any apparent unauthorized release of Recipient’s Confidential Information (as defined in the Sublicense Agreement) by Service Provider Personnel.

Appears in 2 contracts

Sources: Asset Purchase Agreement (Vivus Inc), Asset Purchase Agreement (Vivus Inc)