Cyber Security Sample Clauses

Cyber Security. Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »
AutoNDA by SimpleDocs
Cyber Security. Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.
Cyber Security. Except as may be included or incorporated by reference in the Registration Statement and the Prospectus, (x) to the Company’s knowledge, there has been no material security breach or other material compromise of or relating to any of the Company’s information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company has not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any material security breach or other material compromise to their IT Systems and Data; (ii) the Company is presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, result in a Material Adverse Effect; and (iii) the Company has implemented backup and disaster recovery technology consistent with industry standards and practices. Any certificate signed by an officer of the Company and delivered to the Agents or to counsel for the Agents pursuant to or in connection with this Agreement shall be deemed to be a representation and warranty by the Company, as applicable, to the Agents as to the matters set forth therein.
Cyber Security. The Service Provider shall ensure that any system on which the Service Provider holds any Purchaser Data, including back-up data, is a secure system that complies with the Security Plan detailed in (Schedule 11). The service provider’s systems, policies and procedures should comply with the National Cyber Security Centre’s Cloud Security Principles and the cloud security requirements of the Specification & Service Levels (Schedule 1). The Service Provider must, where appropriate, review and update systems, policies and procedures regularly to ensure continued compliance with the NCSC Cloud Security Principles. SECTION D
Cyber Security. Except as may be included or incorporated by reference in the Registration Statement and the Prospectus, (x) to the Company’s knowledge, there has been no material security breach or other material compromise of or relating to any of the Company’s information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) and none that would result in a legal or contractual obligation of the Company to notify any other person about such occurrence; and (y) the Company has not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any material security breach or other material compromise to their IT Systems and Data; (ii) the Company is presently in compliance with all material applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, result in a Material Adverse Effect; and (iii) the Company has implemented backup and disaster recovery technology consistent with the requirements set forth in the Company’s insurance policies. Any certificate signed by an officer of the Company and delivered to the Agent or to counsel for the Agent pursuant to or in connection with this Agreement shall be deemed to be a representation and warranty by the Company, as applicable, to the Agent as to the matters set forth therein.
Cyber Security. Except as may be included or incorporated by reference in the Registration Statement and the Prospectus, (x) to the Company’s knowledge, there has been no material security breach or other material compromise of or relating to any of the Company’s information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company has not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any material security breach or other material compromise to their IT Systems and Data; (ii) the Company is presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, result in a Material Adverse Effect; and (iii) the Company has implemented backup and disaster recovery technology consistent with industry standards and practices.
Cyber Security. The PERFORMER shall provide adequate security for all USSOCOM information on PERFORMER information systems. To provide adequate security, the PERFORMER shall implement, at a minimum, the following information security protections:
AutoNDA by SimpleDocs
Cyber Security b. Critical Infrastructure Asset Identification and Configuration Management Databases c. Information Assurance of Critical Infrastructure
Cyber Security. Except for matters which, individually or in the aggregate, have not had and would not reasonably be expected to have a Material Adverse Effect, (A) there has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company or its subsidiaries information technology and computer systems, networks, hardware, software, data and databases (including the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its subsidiaries), equipment or technology (collectively, “IT Systems and Data”); and (B) neither the Company nor its subsidiaries have been notified of, and the Company has no knowledge of any event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data. The Company and its subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification.
Cyber Security. Supplier will safeguard Buyer, Government and/or Covered Defense Information (CDI) that resides in or transits through covered contractor information systems by applying specified network security controls in accordance with NIST Special Publication 800-171, Protecting Controlled Unclassified Information in NonFederal Information Systems and Organizations (xxxx://xxxx.xxxx.xxx/publications/details/sp/800-171/rev_1/Final). Data covered by the Purchase Orders must be maintained within the fifty states of the US. Upon identification, the supplier shall report cyber incidents, within 72 hours of discovery directly to Seller’s Buyer and Department of Defense (DoD) at xxxxx://xxxxxx.xxx.xxx/portal/intranet. The Seller shall include the incident report number automatically assigned by DoD to to Buyer in writing and report that result in an actual or potentially “adverse effect” on Buyer, Government and/or CDI and shall follow all applicable FAR and DFARS clauses in regards to safeguarding and reporting requirements around cyber security and cloud computing. Additional information regarding Cyber Security is located at xxxxx://xxxx.xxx/our_company/small_business_partners/cybersecurity_our_suppliers.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!