Common use of Cybersecurity; Data Protection Clause in Contracts

Cybersecurity; Data Protection. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all of the Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) and all data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses and there have been no breaches, violations, outages or unauthorized uses of or accesses to same that would cause or would reasonably be expected to cause a Material Adverse Effect. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, the Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Appears in 9 contracts

Samples: Underwriting Agreement (SVB Financial Group), Underwriting Agreement (SVB Financial Group), Underwriting Agreement (SVB Financial Group)

AutoNDA by SimpleDocs

Cybersecurity; Data Protection. The Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (i) the Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all of the Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, (ii) the Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same that would cause or would reasonably be expected to cause a Material Adverse Effect. Except as would notsame, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, and (iii) the Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Appears in 4 contracts

Samples: Underwriting Agreement (Madison Square Garden Entertainment Corp.), Underwriting Agreement (Madison Square Garden Entertainment Corp.), Madison Square Garden Entertainment Corp.

Cybersecurity; Data Protection. The Except as would not reasonably be expected, individually or in the aggregate, to result in a Material Adverse Change: (i) the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, (ii) the Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all of the Company’s IT Systems and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) and all data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same that would cause same, nor any incidents under internal review or would reasonably be expected investigations relating to cause a Material Adverse Effect. Except as would notthe same, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, and (iii) the Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Appears in 4 contracts

Samples: Common Stock (Seres Therapeutics, Inc.), Common Stock (Seres Therapeutics, Inc.), Sales Agreement (Seres Therapeutics, Inc.)

Cybersecurity; Data Protection. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all of To the Company’s and its subsidiaries’ knowledge, the Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used material respects as required in connection with their businesses the operation of the business of the Company as currently conducted, and to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same its IT Systems, except for those that would cause have been remedied without material cost or would reasonably be expected liability or the duty to cause a Material Adverse Effectnotify any other person, nor any incidents under internal review or investigations relating to the same. Except as would not, individually or in To the aggregate, reasonably be expected to have a Material Adverse EffectCompany’s knowledge, the Company and its subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Appears in 3 contracts

Samples: Underwriting Agreement (JOFF Fintech Acquisition Corp.), Underwriting Agreement (JOFF Fintech Acquisition Corp.), Underwriting Agreement (JOFF Fintech Acquisition Corp.)

Cybersecurity; Data Protection. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all of To the Company’s and its subsidiaries’ knowledge, the Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases databases, if any (collectively, “IT Systems”) are adequate for, and operate and perform in all data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used material respects as required in connection with their businesses the operation of the business of the Company as currently conducted, and to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same its IT Systems, except for those that would cause have been remedied without material cost or would reasonably be expected liability or the duty to cause a Material Adverse Effectnotify any other person, nor any incidents under internal review or investigations relating to the same. Except as would not, individually or in To the aggregate, reasonably be expected to have a Material Adverse EffectCompany’s knowledge, the Company and its subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Appears in 3 contracts

Samples: Underwriting Agreement (Aequi Acquisition Corp.), Aequi Acquisition Corp., Aequi Acquisition Corp.

AutoNDA by SimpleDocs

Cybersecurity; Data Protection. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all of the Company’s Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) and all data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses and there have been no breaches, violations, outages or unauthorized uses of or accesses to same that would cause or would reasonably be expected to cause a Material Adverse Effect. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, the Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Appears in 2 contracts

Samples: Underwriting Agreement (SVB Financial Group), Underwriting Agreement (SVB Financial Group)

Cybersecurity; Data Protection. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all of the Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) and all data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses businesses, and to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same same, except for those that would cause have been remedied without material cost or would reasonably be expected liability or the duty to cause a Material Adverse Effectnotify any other person, nor any material incidents under internal review or investigations relating to the same. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, the The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification. Any certificate signed by any officer on behalf of the Company and delivered to the Representatives or counsel for the Underwriters in connection with the offering of the Securities shall be deemed a representation and warranty by the Company as to matters covered thereby to each Underwriter.

Appears in 1 contract

Samples: Hubbell Inc

Time is Money Join Law Insider Premium to draft better contracts faster.