18.2 To the extent that any of the data, materials and documents referred to in this Clause 18 (Intellectual Property Rights) are generated by or maintained on a computer or similar system, hubco shall:
18.2.1 use all reasonable endeavours to procure for the benefit of each Participant, at no charge or at the lowest reasonable fee, the grant of a licence or sub-licence for any relevant software to enable each Participant or its nominee to access and otherwise use (subject to the payment by the relevant Participant of the relevant fee, if any) such data for the Approved Purposes. As an alternative, hubco may provide such data, materials or documents in a format which may be read by software generally available in the market at the relevant time or in hard copy format; and
18.2.2 enter into the NCC's then current multi-licence escrow deposit agreement or standard single licence escrow deposit agreement as appropriate in each case.
18.3 hubco shall ensure the back-up and storage in safe custody of the data, materials and documents referred to in Clause 18.2 in accordance with Good Industry Practice. Without prejudice to this obligation, hubco shall submit to the Participants for approval its proposals for the back-up and storage in safe custody of such data, materials and documents and any Participant shall be entitled to object if the same is not in accordance with Good Industry Practice. hubco shall comply, and shall cause all hubco Parties to comply, with all procedures to which the Participants have given their approval. hubco may vary its procedures for such back-up and storage subject to submitting its proposals for change to the Participants, who shall be entitled to object on the basis set out above.
_______________________________________________________________________________________________________________
4 If any party is to be given access to any of the other party's computer systems, as a matter of good practice and also to clarify potential liability for unauthorised access to those systems under the Computer Misuse Act 1990, the scope of each party's authorisation to access each other's computer systems will need to be defined clearly. The terms of such authorisation will be project specific.