51.4 To the extent that any of the data, materials and documents referred to in this Clause are generated by or maintained on a computer or similar system, Project Co shall:
(a) use all reasonable endeavours to procure for the benefit of the Board, at no charge or at the lowest reasonable fee, the grant of a licence or sublicence for any relevant software to enable the Board or its nominee to access and otherwise use (subject to the payment by the Board of the relevant fee, if any) such data for the Approved Purposes. As an alternative, Project Co may provide such data, materials or documents in a format which may be read by software generally available in the market at the relevant time or in hard copy format; and
(b) enter into the NCC's then current multilicence escrow deposit agreement or standard single licence escrow deposit agreement as appropriate in each case.
51.5 Project Co shall ensure the backup and storage in safe custody of the data, materials and documents referred to in Clause 51.4 in accordance with Good Industry Practice. Without prejudice to this obligation, Project Co shall submit to the Board's Representative for approval its proposals for the backup and storage in safe custody of such data, materials and documents and the Board shall be entitled to object if the same is not in accordance with Good Industry Practice. Project Co shall comply, and shall cause all Project Co Parties to comply, with all procedures to which the Board's Representative has given its approval. Project Co may vary its procedures for such back-up and storage subject to submitting its proposals for change to the Board's Representative, who shall be entitled to object on the basis set out above.
___________________________________________________________________
152 If either party is to be given access to any of the other party's computer systems, as a matter of good practice and also to clarify potential liability for unauthorised access to those systems under the Computer Misuse Act 1990, the scope of each party's authorisation to access each other's computer systems will need to be defined clearly. The terms of such authorisation will be project specific.