03.07.2013 Views

MASTER ASSET PURCHASE AGREEMENT BY ... - Canadian Stocks

MASTER ASSET PURCHASE AGREEMENT BY ... - Canadian Stocks

MASTER ASSET PURCHASE AGREEMENT BY ... - Canadian Stocks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

(c) Buyer acknowledges that it will acquire no right, title or interest (including any<br />

license rights or rights of use) in any firmware, software or hardware of Seller, or the licenses or<br />

leases in any firmware, software or hardware which are held by Seller, by reason of Seller’s<br />

provision of or in connection with the Services.<br />

8.07 Seller Systems.<br />

(a) As of the Closing, except as otherwise expressly provided in this Agreement, (i)<br />

Buyer shall cause the Local Distribution Businesses to cease to use and shall have no further<br />

access to, and Seller shall have no obligation to otherwise provide or make available, any<br />

business or other services, including any Seller Party intranet or any other owned, licensed,<br />

leased or used computer software, networks, hardware or technology of a Seller Party, provided<br />

or made available to the Local Distribution Businesses by any Seller Party prior to the Closing<br />

and (ii) Buyer and the Local Distribution Businesses shall have no access to, and Seller shall<br />

have no obligation to otherwise provide, any Seller Party’s computer-based resources (including<br />

third party services, e-mail and access to its computer networks, databases and equipment),<br />

whether or not such resources require a password or are available on a secured access basis or on<br />

a non-secured access basis.<br />

(b) To the extent that the performance or receipt of Services hereunder requires Buyer<br />

to have access to any Seller Party’s intranet or other computer software, networks, hardware,<br />

technology or computer-based resources (including third party services, e-mail and access to<br />

computer networks, database and equipment) owned, licensed, leased or used by such Seller<br />

Party (“Required Technology”), Buyer shall: (i) limit such access to those Buyer personnel who<br />

are authorized to use the Services; (ii) upon Seller’s request, provide to Seller a written list of the<br />

names of all of the Buyer personnel who have been granted such access; and (iii) adhere to<br />

Seller’s (or its Affiliates’ or any applicable subcontractors’) security rules and procedures for use<br />

of the Required Technology and other computer or electronic data storage systems. All user<br />

identification numbers and passwords disclosed to Buyer to permit Buyer personnel to access the<br />

Required Technology shall be deemed to be, and shall be treated as, Seller’s Confidential<br />

Information. Buyer shall cooperate with Seller in the investigation of any apparent unauthorized<br />

access by Buyer personnel to the Required Technology. If any Buyer personnel’s access to the<br />

Required Technology and other computer or electronic data storage systems could technically<br />

enable such personnel to obtain access to systems or data that they are not authorized to access,<br />

Seller may require such personnel to execute agreements or otherwise confirm their agreement to<br />

comply with the limits of their authorization as a condition of their right to obtain such access.<br />

(c) While Services are being provided hereunder, each Party shall take commercially<br />

reasonable measures to ensure that, in connection with the provision of any Services, no virus or<br />

similar items are coded or introduced into either Buyer’s or any Seller Party’s computer<br />

networks or databases. If, in connection with the provision of any Services, a virus is found to<br />

have been introduced into such computer networks or databases, the Parties shall cooperate and<br />

diligently work together with Seller to eliminate the effects of such virus. Each Party shall<br />

exercise commercially reasonable care to prevent unauthorized users from accessing the Services<br />

or the computer and technology systems or networks of any of the Parties.<br />

C2-5<br />

Exhibit C-2<br />

Form of Initial Closing TSA - Seller

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!