Security and Access Clause Example with 4 Variations from Business Contracts

This page contains Security and Access clauses in business contracts and legal agreements. An example clause is provided at the top of the page, followed by clauses with minor variations. You can view the text differences by selecting the "Show Differences" option.
Security and Access. The Employee agrees and covenants (a) to comply with all of the Company's security policies and procedures as in force from time to time including without limitation those regarding computer equipment, facilities access, monitoring, key cards, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities ("Facilities and Informa...tion Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (c) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Employee's employment by the Company, whether termination is voluntary or involuntary. The Employee agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others. View More

Variations of a "Security and Access" Clause from Business Contracts

Security and Access. The Employee Executive agrees and covenants (a) to comply with all of the Company's security policies and procedures as in force from time to time including without limitation those regarding computer equipment, facilities access, monitoring, key cards, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities ("Facilities a...nd Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (c) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Employee's Executive's employment by the Company, whether termination is voluntary or involuntary. The Employee Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others. clearwateranalytics.com | 14. Exit Obligations. Upon (a) voluntary or involuntary termination of the Executive's employment or (b) the Company's request at any time during the Executive's employment, the Executive shall (i) provide or return to the Company any and all Company property, including access cards, employer credit cards, network access devices, computers, cell phones, work product, e-mail messages, recordings, thumb drives or other removable information storage devices, hard drives, and data and all Company documents and materials belonging to the Company and stored in any fashion, including but not limited to those that constitute or contain any Confidential Information or Work Product, that are in the possession or control of the Executive, whether they were provided to the Executive by the Company or any of its business associates or created by the Executive in connection with his employment by the Company; and (ii) delete or destroy all copies of any such documents and materials not returned to the Company that remain in the Executive's possession or control, including those stored on any non-Company devices, networks, storage locations, and media in the Executive's possession or control. View More
Security and Access. The Employee agrees and covenants (a) (i) to comply with all of the Company's Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, fire...walls, passwords and any and all other Company facilities facilities, IT resources and communication technologies ("Facilities and Information Technology and Access Resources"); (b) (ii) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (c) (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Employee's employment by the Company, whether termination is voluntary or involuntary. The Employee agrees to notify the Company promptly in the event he Employee learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others. 6 6.1 Exit Obligations. Upon (i) voluntary or involuntary termination of Employee's employment or (ii) the Company's request at any time during Employee's employment, Employee shall (a) provide or return to the Company any and all Company property, including keys, key cards, access cards, identification cards, security devices, Company credit cards, network access devices, computers, cell phones, smartphones, equipment, manuals, reports, files, books, compilations, work product, e-mail messages, recordings, tapes, disks, thumb drives or other removable information storage devices, hard drives and data and all Company documents and materials belonging to the Company and stored in any fashion, including but not limited to those that constitute or contain any Confidential Information or Work Product, that are in the possession or control of Employee, whether they were provided to Employee by the Company or any of its business associates or created by Employee in connection with Employee's employment by the Company; and (b) delete or destroy all copies of any such documents and materials not returned to the Company that remain in Employee's possession or control, including those stored on any non-Company devices, networks, storage locations and media in Employee's possession or control. View More
Security and Access. The Employee agrees and covenants (a) (i) to comply with all of the Company's Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, fire...walls, passwords and any and all other Company facilities facilities, IT resources and communication technologies ("Facilities and Information Technology Resources"); (b) (ii) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (c) (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Employee's employment by the Company, whether termination is voluntary or involuntary. The Employee agrees to notify the Company promptly in the event he Employee learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others. 7.1 Exit Obligations. Upon (i) voluntary or involuntary termination of Employee's employment or (ii) the Company's request at any time during Employee's employment, Employee shall (a) provide or return to the Company any and all Company property, including keys, key cards, access cards, identification cards, security devices, Company credit cards, network access devices, computers, cell phones, smartphones, equipment, manuals, reports, files, books, compilations, work product, e-mail messages, recordings, tapes, disks, thumb drives or other removable information storage devices, hard drives and data and all Company documents and materials belonging to the Company and stored in any fashion, including but not limited to those that constitute or contain any Confidential Information or Work Product, that are in the possession or control of Employee, whether they were provided to Employee by the Company or any of its business associates or created by Employee in connection with Employee's employment by the Company; and (b) delete or destroy all copies of any such documents and materials following return to the Company that remain in Employee's possession or control, including those stored on any non-Company devices, networks, storage locations and media in Employee's possession or control. View More
Security and Access. The Employee Consultant agrees and covenants (a) to comply with all of the Company's Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passw...ords and any and all other Company facilities ("Facilities IT resources and communication technologies (collectively, "Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (c) (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Employee's employment by the Company, whether termination is voluntary or involuntary. Agreement. The Employee Consultant agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others. View More