This example Security clause appears in
3 contracts
from
1 company
Security. 12.1 Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, technological equipment of any kind, codes, telephone systems, facilities access, monitoring, Company intranet, internet, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords, and any and all othe...r Company facilities, IT resources and communication technologies ("Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others. 12.2 Exit Obligations. Upon (a) voluntary or involuntary termination of the Executive's employment or (b) the Company's request at any time during the Executive's employment, the Executive shall (i) provide or return to the Company any and all Company property, documents and materials belonging to the Company and stored in any fashion, including but not limited to those that constitute or contain any Confidential Information or Work Product, that are in the possession or control of the Executive, whether they were provided to the Executive by the Company or any of its business associates or created by the Executive in connection with his employment by the Company; and (ii) delete or destroy all copies of any such documents and materials not returned to the Company that remain in the Executive's possession or control, including those stored on any non-Company devices, networks, storage locations, and media in the Executive's possession or control.View More