Information Technology and Data Matters Sample Clauses

Information Technology and Data Matters. (a) Except as has not had and would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect, the IT Assets owned, used, or held for use by the Company or any of its Subsidiaries (i) are sufficient for the current needs of the businesses of the Company and its Subsidiaries; (ii) have not experienced any material failures, breakdowns, outages, or unavailability within the past three (3) years; and (iii) to the knowledge of the Company, are free from any “back door,” virus, malware, Trojan horse or similar malicious code and material bugs.
AutoNDA by SimpleDocs
Information Technology and Data Matters. (a) Except as is not and would not reasonably be expected to be, individually or in the aggregate, material to the Business, to the extent applicable to the operations of the Contributed Business Assets in the operation or conduct of the Business, (i) all Computer Systems are in good operating condition and operate in accordance with their applicable documentation in all material respects, and (ii) to the knowledge of Amber GT Parent, none of the Computer Systems contains any Disabling Code. The Amber Entities and their Affiliates (to the extent applicable to their ownership of the Contributed Business Assets in the operation or conduct of the Business) employ commercially reasonable protection and security measures (including commercially reasonable physical, organizational and technological measures) designed to protect the confidentiality, integrity and security of the Computer Systems and designed to detect and safeguard against Disabling Code. The Amber Entities and their Affiliates have in place business continuity and disaster recovery plans that are designed to minimize and mitigate the occurrence, duration and effect of any unscheduled unavailability of the Computer Systems to the extent related to the operation or conduct of the Business. Except as is not and would not reasonably be expected to be, individually or in the aggregate, material to the Business, to the knowledge of Amber GT Parent, to the extent related to the operation or conduct of the Business, there have been no (i) successful unauthorized intrusions or breaches of the security of the Computer Systems, (ii) prolonged periods of unscheduled unavailability of the Computer Systems, or (iii) failures, breakdowns or continued substandard performance of the Computer Systems, in each case that have caused any substantial disruption or interruption in or to the use of the Computer Systems, taken as a whole.
Information Technology and Data Matters. 21 3.13 Litigation ........................................................................................................................... 22 3.14 Brokerage .......................................................................................................................... 22 3.15 Insurance ........................................................................................................................... 22 3.16
Information Technology and Data Matters. (a) Each of the CD Group Companies maintains, and is and has been in compliance in all material respects with, (i) a written information security program that includes commercially reasonable administrative, physical, technical and organizational measures and safeguards to protect the confidentiality, integrity and security of Confidential Information and/or Protected Data, and (ii) written privacy policies that comply with all Data Security Requirements. Each of the CD Group Companies is, and has been, in compliance in all material respects with all Data Security Requirements. Except as set forth in Section 3.12(a) of the Seller Disclosure Schedule, there have not been any Actions conducted or claims asserted by any Person, or notices sent (or required to be sent) or received to or from any Person, regarding Data Treatment by any Person in connection with the Business or any violation of applicable Data Security Requirements, and no such Action is pending or, to the Knowledge of Sellers, threatened and there is no reasonable basis for the same. Neither: (A) the execution and delivery of this Agreement, (B) the consummation of the Closing, nor (C) any transfers of Protected Data to Buyers pursuant to this Agreement (as part of the Purchased Assets or otherwise) will, in any case, result in a breach or violation of, or constitute a default under, any Data Security Requirement. The CD Group Companies maintain valid legal bases to transfer all Protected Data to Buyers pursuant to this Agreement. (b) The CD Group Companies use commercially reasonable efforts to protect the confidentiality, integrity and security of the Business Systems and all information stored or contained therein or transmitted thereby from any unauthorized use, access, interruption or modification by third parties. The CD Group Companies subject to Data Treatment only such customer data (including Protected Data) as they are authorized to subject to Data Treatment by Law or other Data Security Requirement. To the Knowledge of Sellers, there are no material bugs, viruses or material defects, material design or documentation errors, corruption or malicious computer code or programs that can cause harm to any Business System. The CD Group Companies have taken all reasonable precautions to ensure that all Software owned by the CD Group Companies and Business Systems (i) are fully functional and operate and run in a reasonable and efficient business manner, (ii) conform in all material respects...
Information Technology and Data Matters. (a) Except as set forth on Schedule 4.17(a), all Computer Systems are in good operating condition and operate in accordance with their applicable documentation in all material respects. To the knowledge of the Company, none of the Computer Systems contains any Disabling Code. The Company Group employs commercially reasonable protection and security measures (including commercially reasonable physical, organizational and technological measures) designed to protect the confidentiality, integrity and security of the Computer Systems and designed to detect and safeguard against Disabling Code affecting the Company Group’s Business operations. To the knowledge of the Company, there have been no (i) successful unauthorized intrusions or breaches of the security of the Computer Systems, (ii) prolonged periods of unscheduled unavailability of the Computer Systems, or (iii) failures, breakdowns or continued substandard performance of the Computer Systems, in each case that have caused any substantial disruption or interruption in or use of the Computer Systems as a whole or with respect to any portion thereof.
Information Technology and Data Matters. (a) The Relevant Entities own, lease, license, or otherwise have the legal right to use all Business Systems. The Business Systems owned or controlled by the Relevant Entities are in all material respects operational, fulfill the purposes for which they were acquired or developed, and have security, back-up, and disaster recovery arrangements in place and hardware and software capacity, support and maintenance that are sufficient in all material respects for the business of the Relevant Entities as it is currently conducted. Since the Reference Date, the Relevant Entities have maintained in the ordinary course of business all required licenses and service Contracts, including the purchase of a sufficient number of license seats for all Software, with respect to the Business Systems owned or controlled by the Relevant Entities. Since the Reference Date, there has not been any material failure or outage with respect to any of the Business Systems owned or controlled by the Relevant Entities that has not been remedied or replaced, as appropriate, in all material respects.
Information Technology and Data Matters. (a) All Computer Systems are in good operating condition, operate in accordance with their applicable documentation in all material respects. To the knowledge of the Company, none of the Computer Systems contains any Disabling Code. The Company Group employs commercially reasonable protection and security measures (including commercially reasonable physical, organizational and technological measures) designed to protect the confidentiality, integrity and security of the Computer Systems and designed to detect and safeguard against Disabling Code affecting the Company Group’s Business operations. The Company Group has in place business continuity and disaster recovery plans that are designed to minimize and mitigate the occurrence, duration and effect of any unscheduled unavailability of the Computer Systems. To the knowledge of the Company, there have been no (i) successful unauthorized intrusions or breaches of the security of the Computer Systems, (ii) prolonged periods of unscheduled unavailability of the Computer Systems, or (iii) failures, breakdowns or continued substandard performance of the Computer Systems, in each case that have caused any substantial disruption or interruption in or use of the Computer Systems as a whole or with respect to any portion thereof.
AutoNDA by SimpleDocs

Related to Information Technology and Data Matters

  • Information Technology The Company’s and the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company, and the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and the Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.

  • INFORMATION AND DATA 21.1 At all times during the subsistence of this Agreement the duly authorized representatives of each Participant shall, at its and their sole risk and expense and at reasonable intervals and times, have access to the Property and to all technical records and other factual engineering data and information relating to the Property which is in the possession of the Operator.

  • Intellectual Property and Information Technology (a) Section 5.20(a) of the Company Disclosure Schedule contains a true and complete list, as of the date of this Agreement, of all Company Products.

  • Information and Cooperation Each Party that has responsibility for filing and prosecuting any Patent Rights under this Section 7.4 (a “Filing Party”) shall (a) regularly provide the other Party (the “Non-Filing Party”) with copies of all patent applications filed hereunder and other material submissions and correspondence with the patent offices, in sufficient time to allow for review and comment by the Non-Filing Party; and (b) provide the Non-Filing Party and its patent counsel with an opportunity to consult with the Filing Party and its patent counsel regarding the filing and contents of any such application, amendment, submission or response. The advice and suggestions of the Non-Filing Party and its patent counsel shall be taken into consideration in good faith by such Filing Party and its patent counsel in connection with such filing. Each Filing Party shall pursue in good faith all reasonable claims and take such other reasonable actions, as may be requested by the Non-Filing Party in the prosecution of any Patent Rights covering any Program Technology under this Section 7.4; provided, however, if the Filing Party incurs any additional expense as a result of any such request, the Non-Filing Party shall be responsible for the cost and expenses of pursuing any such additional claim or taking such other actions. In addition, Company agrees that if Licensor claims any action taken under Section 7.4(d)(i) would be detrimental to Patent Rights covering Licensor Technology, Licensor shall provide written notice to Company and the Patent Coordinators shall, as promptly as possible thereafter, meet to discuss and resolve such matter and, if they are unable to resolve such matter, the Parties shall refer such matter to a mutually agreeable outside patent counsel for resolution.

  • Technology and Intellectual Property (a) Schedule 2.22(a) sets forth a complete and correct list of all (i) registered trademarks, service marks, domain names, copyrights and patents; (ii) applications for registration or grant of any of the foregoing; (iii) unregistered trademarks, service marks, trade names, logos and assumed names; and (iv) licenses for any of the foregoing, in each case, owned by or for the benefit of the Company or a Company Subsidiary, or used in or necessary to conduct the Company’s or a Company Subsidiary’s business as presently conducted. The items on Schedule 2.22(a), together with all other trademarks, service marks, trade names, logos, assumed names, patents, copyrights, trade secrets, computer software, licenses, formulae, customer lists or other databases, business application designs and inventions currently used in or necessary to conduct the businesses of the Company or of a Company Subsidiary, constitute the “Intellectual Property.”

  • OWNERSHIP AND PROTECTION OF INTELLECTUAL PROPERTY AND CONFIDENTIAL INFORMATION 4.1 All information, ideas, concepts, improvements, discoveries, works of authorship, and inventions, whether patentable or copyrightable or not, which are conceived, reduced to practice, authored, made, developed or acquired by Employee, individually or in conjunction with others, in the scope of Employee's employment by Employer or any of its affiliates, and/or during the term of Employee’s employment (whether during business hours or otherwise and whether on Employer's premises or otherwise) which relate to the business, products or services of Employer or its affiliates (including, without limitation, all such information relating to any corporate opportunities, research, financial and sales data, pricing and trading terms, evaluations, opinions, interpretations, acquisition prospects, the identity of customers or their requirements, the identity of key contacts within the customer's organizations or within the organization of acquisition prospects, or marketing and merchandising techniques, prospective names, and marks), and all documents, things, writings and items of any type or in any media embodying any of the foregoing (collectively, “Developments”), and any and all proprietary rights of any kind thereto, including without limitation all rights relating to patents, copyrights, trade secrets, and trademarks, shall be the sole and exclusive property of Employer or its affiliates, as the case may be. Employee hereby assigns to Employer any and all rights Employee might otherwise have in and to any such Developments, and any and all proprietary rights of any kind thereto, including without limitation all rights relating to patents, copyrights, trade secrets, and trademarks.

  • Intellectual Property Rights and Confidentiality Clauses 3.1 Party A shall have exclusive and proprietary ownership, rights and interests in any and all intellectual properties arising out of or created during the performance of this Agreement, including but not limited to copyrights, patents, patent applications, software, technical secrets, trade secrets and others. Party B shall execute all appropriate documents, take all appropriate actions, submit all filings and/or applications, render all appropriate assistance and otherwise conduct whatever is necessary as deemed by Party A at its sole discretion for the purposes of vesting any ownership, right or interest of any such intellectual property rights in Party A, and/or perfecting the protections for any such intellectual property rights in Party A.

  • Proprietary Matters The Executive expressly understands and agrees that any and all improvements, inventions, discoveries, processes, know-how or intellectual property that are generated or conceived by the Executive during the term of this Agreement, whether generated or conceived during the Executive’s regular working hours or otherwise, will be the sole and exclusive property of the Company. Whenever requested by the Company (either during the term of this Agreement or thereafter), the Executive will assign or execute any and all applications, assignments and or other instruments and do all things which the Company deems necessary or appropriate in order to permit the Company to: (a) assign and convey or otherwise make available to the Company the sole and exclusive right, title, and interest in and to said improvements, inventions, discoveries, processes, know-how, applications, patents, copyrights, trade names or trademarks; or (b) apply for, obtain, maintain, enforce and defend patents, copyrights, trade names, or trademarks of the United States or of foreign countries for said improvements, inventions, discoveries, processes or know-how. However, the improvements, inventions, discoveries, processes or know-how generated or conceived by the Executive and referred to above (except as they may be included in the patents, copyrights or registered trade names or trademarks of the Company, or corporations, partnerships or other entities which may be affiliated with the Company) shall not be exclusive property of the Company at any time after having been disclosed or revealed or have otherwise become available to the public or to a third party on a non-confidential basis other than by a breach of this Agreement, or after they have been independently developed or discussed without a breach of this Agreement by a third party who has no obligation to the Company or its affiliates. The foregoing will not prohibit any activities which are expressly permitted by the last sentence of paragraph 3 of this Agreement during the term of this Agreement.

  • Confidential Information and Intellectual Property (a) Other than in the performance of the Executive’s duties hereunder, the Executive agrees not to use in any manner or disclose, distribute, publish, communicate or in any way cause to be used, disclosed, distributed, published, or communicated in any way or at any time, either while in the Company's employ or at any time thereafter, to any person not employed by the Company, or not engaged to render services to the Company, any Confidential Information (as defined below) obtained while in the employ of the Company.

  • Information/Cooperation Executive shall, upon reasonable notice, furnish such information and assistance to the Bank as may be reasonably required by the Bank, in connection with any litigation in which it or any of its subsidiaries or affiliates is, or may become, a party; provided, however, that Executive shall not be required to provide information or assistance with respect to any litigation between Executive and the Bank or any other subsidiaries or affiliates.

Time is Money Join Law Insider Premium to draft better contracts faster.