Common use of Cybersecurity Clause in Contracts

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 145 contracts

Sources: Securities Purchase Agreement (U Power LTD), Securities Purchase Agreement (Apimeds Pharmaceuticals US, Inc.), Securities Purchase Agreement (Safe & Green Holdings Corp.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 32 contracts

Sources: Underwriting Agreement (Rezolute, Inc.), Open Market Sale Agreement (Avadel Pharmaceuticals PLC), Open Market Sale Agreement (Vivani Medical, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards reasonably designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 25 contracts

Sources: Equity Purchase Facility Agreement (Fold Holdings, Inc.), Equity Purchase Facility Agreement (New Era Helium Inc.), Equity Purchase Facility Agreement (Classover Holdings, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 24 contracts

Sources: Sales Agreement (CEA Industries Inc.), Sales Agreement (Bitmine Immersion Technologies, Inc.), Securities Purchase Agreement (Gorilla Technology Group Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as disclosed in the Registration Statement, the Pricing Disclosure Package or the Prospectus, there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 17 contracts

Sources: Underwriting Agreement (OFA Group), Underwriting Agreement (OFA Group), Underwriting Agreement (Nano Nuclear Energy Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as disclosed in the Registration Statement, the Pricing Disclosure Package or the Prospectus, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 17 contracts

Sources: Underwriting Agreement, Underwriting Agreement (Innovation Beverage Group LTD), Underwriting Agreement (Innovation Beverage Group LTD)

Cybersecurity. The Company Company’s and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as disclosed in the Registration Statement, the Pricing Disclosure Package or the Prospectus, there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 11 contracts

Sources: Underwriting Agreement (Star Fashion Culture Holdings LTD), Underwriting Agreement (Majestic Ideal Holdings LTD), Underwriting Agreement (Star Fashion Culture Holdings LTD)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,.” used in connection with their businessesbusinesses (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of the Company). “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) personal information under the Personal Information Protection and Electronic Documents Act (“PIPEDA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating access to the same except IT Systems or Personal Data in each case, where such would not, either individually use or in possession of the aggregate, reasonably be expected to result in a Material Adverse EffectCompany. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification modification, except where the failure to be in each case, where such compliance would not, either individually or in the aggregate, reasonably be expected to result in not have a Material Adverse Effect.

Appears in 10 contracts

Sources: Securities Purchase Agreement (Senmiao Technology LTD), Securities Purchase Agreement (Jiuzi Holdings, Inc.), Securities Purchase Agreement (SOS LTD)

Cybersecurity. The To the extent applicable, the Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 8 contracts

Sources: Securities Purchase Agreement (ROBO.AI Inc.), Securities Purchase Agreement (La Rosa Holdings Corp.), Securities Purchase Agreement (Fitell Corp)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are is presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 8 contracts

Sources: Securities Purchase Agreement (ZyVersa Therapeutics, Inc.), Securities Purchase Agreement (ZyVersa Therapeutics, Inc.), Securities Purchase Agreement (ZyVersa Therapeutics, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 8 contracts

Sources: Underwriting Agreement (SurgePays, Inc.), At the Market Offering Agreement (SurgePays, Inc.), Underwriting Agreement (Ocugen, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as disclosed in the Registration Statement, the Time of Sale Prospectus or the Prospectus, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 7 contracts

Sources: Underwriting Agreement (Scilex Holding Co), Underwriting Agreement (Outlook Therapeutics, Inc.), Underwriting Agreement (AzurRx BioPharma, Inc.)

Cybersecurity. The Company and its Subsidiaries’ To the Company’s knowledge, the Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) owned by or utilized by the Company are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and are, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and has or has ensured that its Subsidiaries have relevant affiliate has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means means: (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 6 contracts

Sources: Underwriting Agreement (Bullpen Parlay Acquisition Co), Underwriting Agreement (ShoulderUP Technology Acquisition Corp.), Underwriting Agreement (Bullpen Parlay Acquisition Co)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 6 contracts

Sources: Sales Agreement (Scynexis Inc), Sales Agreement (Rockwell Medical, Inc.), Sales Agreement (Scynexis Inc)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 6 contracts

Sources: Securities Purchase Agreement (Propanc Biopharma, Inc.), Securities Purchase Agreement (Biotricity Inc.), Securities Purchase Agreement (Asset Entities Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail email address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2021, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 6 contracts

Sources: Securities Purchase Agreement (PharmaCyte Biotech, Inc.), Securities Purchase Agreement (MyMD Pharmaceuticals, Inc.), Securities Purchase Agreement (MyMD Pharmaceuticals, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2021, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 6 contracts

Sources: Securities Purchase Agreement (TAO Synergies Inc.), Securities Purchase Agreement (PharmaCyte Biotech, Inc.), Securities Purchase Agreement (Synaptogenix, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases used or owned by, or leased or licensed to, the Company or any of its Subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, conducted free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 5 contracts

Sources: Securities Exchange Agreement (Velo3D, Inc.), Securities Purchase Agreement (Velo3D, Inc.), Securities Purchase Agreement (AMERICAN BATTERY TECHNOLOGY Co)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 5 contracts

Sources: Underwriting Agreement (Volitionrx LTD), Equity Distribution Agreement (Volitionrx LTD), Equity Distribution Agreement (Volitionrx LTD)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businessesbusinesses (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of the Company). “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) personal information under the Personal Information Protection and Electronic Documents Act (“PIPEDA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating access to the same except IT Systems or Personal Data in each case, where such would not, either individually use or in possession of the aggregate, reasonably be expected to result in a Material Adverse EffectCompany. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 5 contracts

Sources: Placement Agency Agreement (Helius Medical Technologies, Inc.), Placement Agency Agreement (Helius Medical Technologies, Inc.), Placement Agency Agreement (Novo Integrated Sciences, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as disclosed in the Registration Statement, the Pricing Disclosure Package or the Prospectus, there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 5 contracts

Sources: Underwriting Agreement (Brag House Holdings, Inc.), Underwriting Agreement (Brag House Holdings, Inc.), Underwriting Agreement (Brag House Holdings, Inc.)

Cybersecurity. The To the extent applicable, the Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businessEffect. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 4 contracts

Sources: Securities Purchase Agreement (Yimutian Inc.), Securities Purchase Agreement (Nocera, Inc.), Securities Purchase Agreement (Fitell Corp)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2022, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 4 contracts

Sources: Securities Purchase Agreement (Sidus Space Inc.), Securities Purchase Agreement (AYRO, Inc.), Securities Purchase Agreement (Petros Pharmaceuticals, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 4 contracts

Sources: Subscription Agreement (Qt Imaging Holdings, Inc.), Subscription Agreement (GigCapital5, Inc.), Securities Purchase Agreement (GigCapital5, Inc.)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means means: (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 4 contracts

Sources: Underwriting Agreement (Athena Technology Acquisition Corp.), Underwriting Agreement (Athena Technology Acquisition Corp.), Underwriting Agreement (Mudrick Capital Acquisition Corp. II)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or other tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as would not, individually or in the aggregate, result in a Material Adverse Change, in the past five years, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 4 contracts

Sources: Sales Agreement (Alx Oncology Holdings Inc), Underwriting Agreement (Alx Oncology Holdings Inc), Underwriting Agreement (Alx Oncology Holdings Inc)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all known material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all Personal Data (as defined below) and all sensitive, confidential or regulated data (Personal Confidential Data,” ”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; , (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; , (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); , (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); , (v) any “personal information” as defined by the California Consumer Privacy Act, as amended by the California Privacy Rights Act of 2020 (collectively, “CCPA”) and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.modification;

Appears in 4 contracts

Sources: Underwriting Agreement (Perpetua Resources Corp.), Underwriting Agreement (Perpetua Resources Corp.), Underwriting Agreement (Perpetua Resources Corp.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchsuch , nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 4 contracts

Sources: Securities Purchase Agreement (Alterola Biotech Inc.), Securities Purchase Agreement (Akerna Corp.), Securities Purchase Agreement (Allarity Therapeutics, Inc.)

Cybersecurity. The Company Transaction Entities’ and its their Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company Transaction Entities and its subsidiaries their Subsidiaries as currently conducted, and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company Transaction Entities and its their Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)Act; and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company Transaction Entities and its their Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 4 contracts

Sources: Underwriting Agreement (Armada Hoffler Properties, Inc.), Atm Equity Offering Sales Agreement (Armada Hoffler Properties, Inc.), Underwriting Agreement (Armada Hoffler Properties, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the Company’s knowledge are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businessmalicious code. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operationavailability, redundancy privacy and security of all the IT Systems and data, including Personal Data,” , used in connection with their businesses. “Personal Data” means (i) a natural person’s persons’ name, street address, telephone number, e-mail email address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) Protected Health Information as defined by HIPAA; (iv) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify a governmental authority or any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectperson. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Sales Agreement (Tonix Pharmaceuticals Holding Corp.), Sales Agreement (Tonix Pharmaceuticals Holding Corp.), Sales Agreement (Praxis Precision Medicines, Inc.)

Cybersecurity. The Except as would not reasonably be expected, individually or in the aggregate, to have a Material Adverse Effect, to the Company’s knowledge, the Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that corruptants. Except as would not reasonably be expected expected, individually or in the aggregate, to have a Material Adverse Effect on Effect, the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used processed by them in connection with their businesses. “Personal Data” means the following data in the Company’s and its Subsidiaries’ possession or control and processed by them in connection with their business (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, individually identifiable bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or individually identifiable sexual orientation. There Except as would not reasonably be expected, individually or in the aggregate, to have a Material Adverse Effect, to the Company’s knowledge, (i) there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, same nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in same; and (ii) the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Underwriting Agreement (Flux Power Holdings, Inc.), Underwriting Agreement (Velo3D, Inc.), Underwriting Agreement (Velo3D, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the Company’s knowledge are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businessmalicious code. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operationavailability, redundancy privacy and security of all the IT Systems and data, including Personal Data,” , used in connection with their businesses. “Personal Data” means (i) a natural person’s persons’ name, street address, telephone number, e-mail email address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) Protected Health Information as defined by HIPAA; (iv) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify a Governmental Authority or any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectperson. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Open Market Sale Agreement (Praxis Precision Medicines, Inc.), Open Market Sale Agreement (Praxis Precision Medicines, Inc.), Open Market Sale Agreement (Praxis Precision Medicines, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses, except in such cases as would not reasonably be expected, individually or in the aggregate, to have a Material Adverse Effect. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; and (iii) “personal data” any information that is regulated by applicable Privacy Laws (as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679herein); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Open Market Sale Agreement (Waitr Holdings Inc.), Open Market Sale Agreement (Waitr Holdings Inc.), Open Market Sale Agreement (Waitr Holdings Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are materially adequate for, and operate and perform in all material respects as required in connection with with, the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor are any such incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Underwriting Agreement (Lucid Diagnostics Inc.), Underwriting Agreement (Lucid Diagnostics Inc.), Placement Agency Agreement (Lucid Diagnostics Inc.)

Cybersecurity. The Company and its Subsidiaries’ Target’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Target as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the CompanyTarget’s business. The Company and its Subsidiaries have Target has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are Target is presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 3 contracts

Sources: Securities Purchase Agreement (ZyVersa Therapeutics, Inc.), Securities Purchase Agreement (ZyVersa Therapeutics, Inc.), Securities Purchase Agreement (Larkspur Health Acquisition Corp.)

Cybersecurity. The To the Company’s knowledge, the Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Underwriting Agreement (Dyadic International Inc), Placement Agency Agreement (Presto Automation Inc.), Underwriting Agreement (Scholar Rock Holding Corp)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to samethe foregoing, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any and there are no incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Open Market Sale Agreement (SQZ Biotechnologies Co), Underwriting Agreement (SQZ Biotechnologies Co), Underwriting Agreement (SQZ Biotechnologies Co)

Cybersecurity. The Company and Company’s, its Subsidiaries’ and the Managed Practice’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company Company, its Subsidiaries and its subsidiaries the Managed Practice as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and Company, its Subsidiaries and the Managed Practice have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and Company, its Subsidiaries and the Managed Practice are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Underwriting Agreement (Progenity, Inc.), Purchase Agreement (Progenity, Inc.), Purchase Agreement (Progenity, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT SystemsSystems and Data”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that corruptants, except as would not reasonably be expected to have a Material Adverse Effect on the Company’s businessChange. The Company and its Subsidiaries subsidiaries have implemented and maintained maintain commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and dataData, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679)Regulation; (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries have been and are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data, including Personal Data and to the protection of such IT Systems and Data and Personal Data from unauthorized use, access, misappropriation or modification modification, except in each case, where such as would not, either individually or in the aggregate, not reasonably be expected to result in have a Material Adverse EffectChange.

Appears in 3 contracts

Sources: Open Market Sale Agreement (Calithera Biosciences, Inc.), Open Market Sale Agreement (Calithera Biosciences, Inc.), Open Market Sale Agreement (Calithera Biosciences, Inc.)

Cybersecurity. The Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, the Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and to the Company’s knowledge, are clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesssystem malfunctions. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards measures to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any material incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Sales Agreement (Evogene Ltd.), Sales Agreement (Evogene Ltd.), Sales Agreement (Evogene Ltd.)

Cybersecurity. The Except as could not reasonably be expected, individually or in the aggregate, to result in a Material Adverse Change, (i) the Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on corruptants; and (ii) the Company’s business. The Company and its Subsidiaries subsidiaries have at all times in the past five years implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and confidential data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data is related to an identified person’s health or sexual orientation. There Except as could not reasonably be expected, individually or in the aggregate, to result in a Material Adverse Change, in the past five years, there have been no breaches, violations, outages or unauthorized uses of or accesses to samesuch IT Systems or confidential data, including Personal Data, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectperson. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, and all of the Company’s and its subsidiaries’ internal policies and contractual obligations obligations, relating to the privacy and security of such IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Open Market Sale Agreement (Cti Biopharma Corp), Open Market Sale Agreement (Cti Biopharma Corp), Open Market Sale Agreement (Cti Biopharma Corp)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same same, except in each case, where such as would not, either individually or in the aggregate, reasonably be expected to aggregate result in a Material Adverse EffectChange. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Underwriting Agreement (Shineco, Inc.), Underwriting Agreement (NRX Pharmaceuticals, Inc.), Underwriting Agreement (NRX Pharmaceuticals, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means means, as applicable, (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Underwriting Agreement (Adicet Bio, Inc.), Underwriting Agreement (Adicet Bio, Inc.), Underwriting Agreement (Adicet Bio, Inc.)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect Change on the Company’s business. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse EffectChange. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse EffectChange.

Appears in 3 contracts

Sources: Sales Agreement (Healthcare Triangle, Inc.), Sales Agreement (Trio Petroleum Corp.), Sales Agreement (ZyVersa Therapeutics, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases used or owned by, or leased or licensed to, the Company or any of its Subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, conducted free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such a natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each casesame. To the knowledge of the Company, where such would notthere have been no breaches, either individually violations, outages or in the aggregate, reasonably be expected unauthorized uses of or accesses to result in a Material Adverse EffectPersonal Data that required statutory notification to individuals or governmental or regulatory authorities. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Securities Purchase Agreement (Prairie Operating Co.), Securities Purchase Agreement (Prairie Operating Co.), Securities Purchase Agreement (Microvision, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businessEffect. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 3 contracts

Sources: Securities Purchase Agreement (Nikola Corp), Securities Purchase Agreement (Nikola Corp), Securities Purchase Agreement (Nikola Corp)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2024, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 3 contracts

Sources: Securities Purchase Agreement (PharmaCyte Biotech, Inc.), Securities Purchase Agreement (TNF Pharmaceuticals, Inc.), Securities Purchase Agreement (AYRO, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Sales Agreement (Lucid Diagnostics Inc.), Sales Agreement (PAVmed Inc.), Sales Agreement (Lucid Diagnostics Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or other tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as would not, individually or in the aggregate, result in a Material Adverse Change, in the past five years there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Sources: Securities Purchase Agreement (Reneo Pharmaceuticals, Inc.), Underwriting Agreement (Reneo Pharmaceuticals, Inc.), Underwriting Agreement (Reneo Pharmaceuticals, Inc.)

Cybersecurity. The To the Company’s knowledge, the Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 3 contracts

Sources: Securities Purchase Agreement (Scorpius Holdings, Inc.), Securities Purchase Agreement (Adamis Pharmaceuticals Corp), Securities Purchase Agreement (Adamis Pharmaceuticals Corp)

Cybersecurity. The Company Company’s and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such case as would not, either individually or in the aggregate, reasonably be expected to result in have a Material Adverse Effect. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Securities Purchase Agreement (Karyopharm Therapeutics Inc.), Open Market Sale Agreement (Karyopharm Therapeutics Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 2 contracts

Sources: Securities Purchase Agreement (Scilex Holding Co), Securities Purchase Agreement (Oramed Pharmaceuticals Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)Act; and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Equity Distribution Agreement (Aptevo Therapeutics Inc.), Equity Distribution Agreement (Aptevo Therapeutics Inc.)

Cybersecurity. The Except as would not reasonably be expected to have a Material Adverse Effect, the Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, to the Company’s Knowledge are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businessmalicious code. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards controls designed to maintain and protect the confidentiality, integrity, availability, privacy and security of all sensitive, confidential or regulated data (“Confidential Data”) used or maintained in connection with their material confidential information businesses and Personal Data, and the integrity, availability continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businessesSystems. “Personal Data” means the following data used in connection with the Company’s and its subsidiaries’ businesses and in their possession or control: (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or other tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Actthat identifies, as amendedrelates to, or may reasonably be used to identify an individual; (iii) “personal data” as defined any information regarding an individual’s medical history, mental or physical condition, or medical treatment or diagnosis by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679)a health care professional; (iv) an individual’s health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individual’s application and claims history; (v) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (vi) any information which would qualify as “personal data,” “personal information” (or similar term) under the Privacy Laws; and (vvii) any other piece of information that alone, or combined with other information, reasonably allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s Knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to samethe IT Systems, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchConfidential Data, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectand Personal Data. The Company and its Subsidiaries are presently presently, and at all times since November 24, 2021 were, in material compliance with all applicable laws or statutes and all judgmentsjudgments and orders binding on the Company, orders, applicable binding rules and regulations of any court or arbitrator or governmental or regulatory authority, and their internal policies and contractual obligations obligations, each relating to the Processing, privacy and security of Personal Data and Confidential Data, the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Convertible Note and Warrant Purchase Agreement (Local Bounti Corporation/De), Securities Purchase Agreement (Local Bounti Corporation/De)

Cybersecurity. The Company and its Subsidiaries’ Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, the Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, applications and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with with, the operation of the business of the Company and its subsidiaries as currently conducted, free and clear clear, to the knowledge of the Company, of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, procedures and safeguards to maintain and protect their its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businessesits businesses (including all data of its employees, vendors, customers, members and any other third-party data maintained by the Company). “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which that would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses To the knowledge of or accesses to samethe Company, except for those that have been remedied without material cost or liability or the duty to notify any other person person, there have been no breaches, violations, outages or suchunauthorized uses of or accesses to the IT Systems or Personal Data (as applicable) involving the Company, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame.

Appears in 2 contracts

Sources: Underwriting Agreement (Coya Therapeutics, Inc.), Underwriting Agreement (Actuate Therapeutics, Inc.)

Cybersecurity. The Company Company’s and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, on-premise and remote systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably adequate for, and operate and perform in all material respects as required in connection with for the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries subsidiaries have implemented and maintained and continue to maintain commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, or bank account information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data,“personal information,” or similar term as defined by the European Union General Data Protection Regulation CCPA (“GDPR”as defined below), CPRA (as defined below), GDPR (as defined below) (EU 2016/679)or any other applicable Privacy Laws; (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that that, either alone or in combination with another piece of information, allows for the identification of such natural person, or his or her familyfamily or household, or a device, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There , and together with all proprietary or confidential information of the Company, “Sensitive Data.” In the past three years, there have been no breaches, violations, outages or unauthorized uses of or accesses to samesuch Sensitive Data or IT Systems, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents governmental authority under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse EffectPrivacy Laws (as defined below).

Appears in 2 contracts

Sources: Preferred Stock Purchase Agreement (Lexicon Pharmaceuticals, Inc.), Preferred Stock Purchase Agreement

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,and sensitive, confidential or regulated data and data used in connection with the operation of their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. The Company and its subsidiaries have used reasonable efforts to establish, and have established, commercially reasonable disaster recovery and security plans, procedures and facilities for the business, including without limitation for the information technology systems and data held or used by or for the Company or any of its subsidiaries. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Underwriting Agreement (Kezar Life Sciences, Inc.), Underwriting Agreement (Kezar Life Sciences, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases used or owned by, or leased or licensed to, the Company or any of its Subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Securities Purchase Agreement (Wejo Group LTD), Securities Purchase Agreement (9 Meters Biopharma, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which that would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which that would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Sales Agreement (Semler Scientific, Inc.), Sales Agreement (Semler Scientific, Inc.)

Cybersecurity. The Except as would not reasonably be expected, individually or in the aggregate, to result in a Material Adverse Change, the Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information “Personal Data” in its possession, and the integrity, continuous operation, redundancy operation and security of all IT Systems and data, including “Personal Data,” data used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as would not reasonably be expected, individually or in the aggregate, to result in a Material Adverse Change, there have been no breaches, violations, outages or unauthorized uses of or accesses to samethe Company’s IT Systems, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchregulator, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Sales Agreement (Orchestra BioMed Holdings, Inc.), Open Market Sale Agreement (Orchestra BioMed Holdings, Inc.)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The To the extent required under all relevant laws and regulations applicable to the Company and its Subsidiaries have business, the Company has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The To the knowledge of the Company, the Company and its Subsidiaries are is presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 2 contracts

Sources: Securities Purchase Agreement (Trio Petroleum Corp.), Securities Purchase Agreement (Trio Petroleum Corp.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the Company’s knowledge are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businessmalicious code. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operationavailability, redundancy privacy and security of all the IT Systems and data, including Personal Data,” , used in connection with their businesses. “Personal Data” means (i) a natural person’s persons' name, street address, telephone number, e-mail email address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) Protected Health Information as defined by HIPAA; (iv) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s 's health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify a Governmental Authority or any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectperson. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Open Market Sale Agreement (Praxis Precision Medicines, Inc.), Open Market Sale Agreement (Praxis Precision Medicines, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect material adverse effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Securities Purchase Agreement (Workhorse Group Inc.), Securities Purchase Agreement (Workhorse Group Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect on the Company’s businessEffect. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses, except were the failure to do any of the foregoing would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Underwriting Agreement (Leap Therapeutics, Inc.), Underwriting Agreement (Leap Therapeutics, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conductedconducted and, to the knowledge of the Company, is free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification modification, except in each case, where such as would not, either individually or in the aggregate, be reasonably be expected to result in have a Material Adverse Effect.

Appears in 2 contracts

Sources: Open Market Sale Agreement (Dave & Buster's Entertainment, Inc.), Underwriting Agreement (Ruths Hospitality Group, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Sales Agreement (Cyclacel Pharmaceuticals, Inc.), Underwriting Agreement (Ur-Energy Inc)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT SystemsSystems and Data”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the knowledge of the Company, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that corruptants, except as would not reasonably be expected to have a Material Adverse Effect on the Company’s businessChange. The Company and its Subsidiaries subsidiaries have implemented and maintained maintain commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and dataData, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iiiii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iviii) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries have been and are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data, including Personal Data and to the protection of such IT Systems and Data and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Underwriting Agreement (ASLAN Pharmaceuticals LTD), Open Market Sale Agreement (ASLAN Pharmaceuticals LTD)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail email address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2022, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 2 contracts

Sources: Securities Purchase Agreement (Blackboxstocks Inc.), Securities Purchase Agreement (XWELL, Inc.)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The To the extent required under all relevant laws and regulations applicable to the Company and its Subsidiaries have business, the Company has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The To the knowledge of the Company, the Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 2 contracts

Sources: Securities Purchase Agreement (AgEagle Aerial Systems Inc.), Securities Purchase Agreement (AgEagle Aerial Systems Inc.)

Cybersecurity. The Except in each case as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (i) the Company and its Subsidiaries’ subsidiary’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (including all data of their respective employees, vendors, customers, members and any other third party data maintained by or on behalf of the Company and its subsidiary) (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries subsidiary as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on corruptants; and (ii) the Company’s business. The Company and its Subsidiaries subsidiary have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame.

Appears in 2 contracts

Sources: Underwriting Agreement (Aziyo Biologics, Inc.), Underwriting Agreement (Aziyo Biologics, Inc.)

Cybersecurity. The Company Company’s and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)Act; and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its their Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Underwriting Agreement (Lument Finance Trust, Inc.), Underwriting Agreement (Lument Finance Trust, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Underwriting Agreement (fuboTV Inc. /FL), Underwriting Agreement (fuboTV Inc. /FL)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear clear, to the Company’s knowledge, of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: At the Market Sales Agreement (Enlivex Therapeutics Ltd.), Sales Agreement (Enlivex Therapeutics Ltd.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the privacy, integrity, continuous operation, redundancy and security of all IT Systems and data, data (including “Personal Data,” sensitive, confidential or regulated data, collectively “Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that identifies or allows the identification of such natural person, or his or her familyfamily or household, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to sameor disclosure of the Data, except for those that have been remedied without material cost or liability or the duty to notify any other person person, governmental or suchregulatory authority or third party, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently presently, and at all prior terms were, in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Underwriting Agreement (Relmada Therapeutics, Inc.), Underwriting Agreement (Relmada Therapeutics, Inc.)

Cybersecurity. The To the Company’s knowledge, the Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2022, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 2 contracts

Sources: Securities Purchase Agreement (PharmaCyte Biotech, Inc.), Securities Purchase Agreement (Femasys Inc)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are (a) in all material respects adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and (b) to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy integrity and security of all IT Systems and data, including all “Personal Data,used in connection with (defined below) and all confidential information and data material to their businessesbusinesses (“Confidential Data”). “Personal Data” means the following information in the possession or control of the Company and its subsidiaries (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended, if applicable; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679), if applicable; (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”), if applicable; and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, person or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, except as disclosed under Form 8-K Current Report dated September 25, 2020 (the “2020 Cyber Security Matter”) there have been no breachesbreaches of the security of, violations, outages or unauthorized uses of or accesses to sameto, IT Systems or Personal Data, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in have a Material Adverse Effect. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Underwriting Agreement (cbdMD, Inc.), Underwriting Agreement (cbdMD, Inc.)

Cybersecurity. The Company and its Subsidiaries’ Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect: (i) the Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on corruptants; (ii) the Company’s business. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. businesses (“Personal Data” means (iA) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (iiB) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iiiC) “personal data” as defined by the European Union General Data Protection Regulation 2016/679; or (“GDPR”) (EU 2016/679); (ivD) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)Act; and (vE) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to including an identified person’s health or sexual orientation. There ); (iii) there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in same; and (iv) the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are is presently in compliance with all applicable laws or statutes statutes, including all applicable state and federal data privacy and security laws and regulations, and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Open Market Sale Agreement (AC Immune SA), Open Market Sale Agreement (AC Immune SA)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) to the extent applicable, any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) if applicable to the Company or any subsidiary, “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); and (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to the same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Sales Agreement (Vince Holding Corp.), Open Market Sale Agreement (Vince Holding Corp.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Controlled Equity Offering Sales Agreement (Verastem, Inc.), Sales Agreement (Verastem, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate in all material respects for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the knowledge of the Company, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used they possess and control, and use in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iviii) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Underwriting Agreement (AFC Gamma, Inc.), Underwriting Agreement (AFC Gamma, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conductedconducted and, to the Company’s knowledge, based on commercially reasonably security and monitoring, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Underwriting Agreement (Viridian Therapeutics, Inc.\DE), Underwriting Agreement (Viridian Therapeutics, Inc.\DE)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since December 31, 2018, to the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor are there any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 2 contracts

Sources: Securities Purchase Agreement (Digital Health Acquisition Corp.), Securities Purchase Agreement (Digital Health Acquisition Corp.)

Cybersecurity. The Company Company’s and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including Personal Data,” , used in connection with their businesses. “Personal Data” means means: (iA) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (iiB) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (ivC) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)Act; and (vD) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to the same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Dealer Manager Agreement (Seaport Entertainment Group Inc.), Dealer Manager Agreement (Seaport Entertainment Group Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businessesbusinesses except in each case, where such could not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 2 contracts

Sources: Securities Purchase Agreement (NewGenIvf Group LTD), Securities Purchase Agreement (NewGenIvf Group LTD)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases used or owned by, or leased or licensed to, the Company or any of its Subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Securities Purchase Agreement (HEXO Corp.), Securities Purchase Agreement (Mohawk Group Holdings, Inc.)

Cybersecurity. The Except as would not, in the aggregate, reasonably be expected to have a Material Adverse Effect, the Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Purchase Agreement (POINT Biopharma Global Inc.), Equity Distribution Agreement (POINT Biopharma Global Inc.)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor to the knowledge of the Company, any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Sources: Underwriting Agreement (Celcuity Inc.), Underwriting Agreement (Celcuity Inc.)

Cybersecurity. The Company Company’s and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that corruptants, except where the failure to do so would not reasonably be expected to have a Material Adverse Effect on the Company’s businessChange. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same and except in each casefor those that would reasonably be expected, where such would not, either individually or in the aggregate, reasonably be expected to result in have a Material Adverse EffectChange. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification modification, except where the failure to be in each case, where such compliance would not, either individually or in the aggregate, not reasonably be expected to result in have a Material Adverse EffectChange.

Appears in 2 contracts

Sources: Open Market Sale Agreement (GameStop Corp.), Open Market Sale Agreement (GameStop Corp.)

Cybersecurity. The To the Company’s knowledge, the Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2025, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 1 contract

Sources: Securities Purchase Agreement (Femasys Inc)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with with, the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that except, in the case of the foregoing, as would not, individually or in the aggregate, reasonably be expected to have result in a Material Adverse Effect on the Company’s businessEffect. The Company and its Subsidiaries subsidiaries have implemented implemented, maintained and maintained do maintain commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards intended to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(as defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businessesbusinesses except, in the case of the foregoing, as would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, or bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) to the extent applicable to the Company, any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vi) any other piece of information that allows the identification of such identifies a natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s including their health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except except, in each casethe case of the foregoing, where such as would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws law or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authorityauthority applicable to the Company, internal policies and contractual obligations of the Company or its Subsidiaries relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data in the Company’s or its Subsidiary’s possession or control, and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except except, in each casethe case of the foregoing, where such as would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 1 contract

Sources: Sales Agreement (Microvast Holdings, Inc.)

Cybersecurity. The Company Company’s and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)Act; and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to the same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Sources: Dealer Manager Agreement (Lument Finance Trust, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases used or owned by, or leased or licensed to, the Company or any of its Subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, . The IT Systems are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws Laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Sources: Transaction Agreement (Tilray Brands, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases used or owned by, or leased or licensed to, the Company or any of its Subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, to the Company’s knowledge free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Sources: Securities Purchase Agreement (Liqtech International Inc)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted. To the Company’s knowledge, the IT Systems that are critical to the operations of the Company’s business are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards that are designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems that are necessary to the Company’s business and data, including “Personal Data,” used in connection with their businessesbusiness. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as would not reasonably be expected to result in a Material Adverse Change, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse EffectPersonal Data. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Sources: Open Market Sale Agreement (Mural Oncology PLC)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, . The IT Systems that are critical to the operation of the Company’s business are free and clear of all material bugs, errors, defects, and, to the knowledge of the Company, are free and clear of all Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, procedures and safeguards to maintain and protect protect: (a) their material confidential information and information; (b) the integrity, continuous operation, redundancy integrity and security of all IT Systems and data, including the continuous operation and redundancy of those IT Systems that are critical to the operation of the Company’s business; and (c) “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679)Regulation, to the extent the Company is required to comply with such regulation; (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no material breaches, violations, outages or unauthorized uses of or accesses to samethe Company’s IT Systems and no material unauthorized uses or accesses to Personal Data, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such that would not, either individually or in the aggregate, reasonably be expected to result in an obligation to notify a person or result in a Material Adverse EffectChange. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgmentsjudgments and orders binding on Company, orders, applicable binding rules and regulations of any court or arbitrator or governmental or regulatory authority, and internal policies and contractual obligations obligations, each relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Sources: Underwriting Agreement (Keros Therapeutics, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number number, national insurance number, or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her familyhousehold, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except that, in each case, where such would not, either individually or in the aggregate, reasonably be expected likely to result in a Material Adverse Effect. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Sources: Sales Agreement (Celldex Therapeutics, Inc.)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Sources: Underwriting Agreement (Celcuity Inc.)

Cybersecurity. The Company Company’s and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, on-premise and remote systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably adequate for, and operate and perform in all material respects as required in connection with for the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, or bank account information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data,“personal information,” or similar term as defined by the European Union General Data Protection Regulation CCPA (“GDPR”as defined below), CPRA (as defined below), GDPR (as defined below) (EU 2016/679)or any other applicable Privacy Laws; (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that that, either alone or in combination with another piece of information, allows for the identification of such natural person, or his or her familyfamily or household, or a device, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There , and together with all proprietary or confidential information of the Company, “Sensitive Data.” In the past three years, there have been no breaches, violations, outages or unauthorized uses of or accesses to samesuch Sensitive Data or IT Systems, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents governmental authority under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse EffectPrivacy Laws (as defined below).

Appears in 1 contract

Sources: Open Market Sale Agreement (Lexicon Pharmaceuticals, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.. (rr) Compliance with Data Privacy Laws. The Company and its Subsidiaries are, and at all prior times were, in compliance with all applicable state and federal data privacy and security laws and regulations, including without limitation HIPAA, and the Company and its Subsidiaries have taken commercially reasonable actions to prepare to

Appears in 1 contract

Sources: Amendment and Exchange Agreement (Nauticus Robotics, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conductedconducted and, to the Company’s knowledge, based on commercially reasonably security and monitoring, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission ActAct of 1914, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, HIPAA (as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”defined below); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Sources: Open Market Sale Agreement (Viridian Therapeutics, Inc.\DE)