Common use of Cybersecurity Clause in Contracts

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 57 contracts

Samples: Securities Purchase Agreement (OneMedNet Corp), Securities Purchase Agreement (SMX (Security Matters) Public LTD Co), Securities Purchase Agreement (Windtree Therapeutics Inc /De/)

AutoNDA by SimpleDocs

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 27 contracts

Samples: Underwriting Agreement (Rezolute, Inc.), Underwriting Agreement (Green Plains Inc.), Open Market Sale (Hertz Corp)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 20 contracts

Samples: Underwriting Agreement (Terawulf Inc.), Sales Agreement (Ocugen, Inc.), Sales Agreement (Eton Pharmaceuticals, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as disclosed in the Registration Statement, the Pricing Disclosure Package or the Prospectus, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 15 contracts

Samples: Underwriting Agreement (Genius Group LTD), Underwriting Agreement (Genius Group LTD), Underwriting Agreement (CytoMed Therapeutics LTD)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as disclosed in the Registration Statement, the Pricing Disclosure Package or the Prospectus, there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 10 contracts

Samples: Underwriting Agreement (Nano Nuclear Energy Inc.), Underwriting Agreement (Sacks Parente Golf, Inc.), Underwriting Agreement (Sacks Parente Golf, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 9 contracts

Samples: Securities Purchase Agreement (Ecoark Holdings, Inc.), Share Exchange Agreement (Ecoark Holdings, Inc.), Securities Purchase Agreement (Ault Alliance, Inc.)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are is presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 7 contracts

Samples: Securities Purchase Agreement (ZyVersa Therapeutics, Inc.), Securities Purchase Agreement (ZyVersa Therapeutics, Inc.), Securities Purchase Agreement (ZyVersa Therapeutics, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as disclosed in the Registration Statement, the Time of Sale Prospectus or the Prospectus, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 7 contracts

Samples: Underwriting Agreement (NanoVibronix, Inc.), Underwriting Agreement (Outlook Therapeutics, Inc.), Underwriting Agreement (Ekso Bionics Holdings, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,.” used in connection with their businessesbusinesses (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of the Company). “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) personal information under the Personal Information Protection and Electronic Documents Act (“PIPEDA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating access to the same except IT Systems or Personal Data in each case, where such would not, either individually use or in possession of the aggregate, reasonably be expected to result in a Material Adverse EffectCompany. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification modification, except where the failure to be in each case, where such compliance would not, either individually or in the aggregate, reasonably be expected to result in not have a Material Adverse Effect.

Appears in 6 contracts

Samples: Securities Purchase Agreement (Siyata Mobile Inc.), Securities Purchase Agreement (Siyata Mobile Inc.), Securities Purchase Agreement (SOS LTD)

Cybersecurity. The Company and its Subsidiaries’ To the Company’s knowledge, the Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) owned by or utilized by the Company are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and are, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and has or has ensured that its Subsidiaries have relevant affiliate has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means means: (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 6 contracts

Samples: Underwriting Agreement (Bullpen Parlay Acquisition Co), Underwriting Agreement (Bullpen Parlay Acquisition Co), Underwriting Agreement (Bullpen Parlay Acquisition Co)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 6 contracts

Samples: Underwriting Agreement (Advaxis, Inc.), Underwriting Agreement (Ocugen, Inc.), Underwriting Agreement (Flora Growth Corp.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 5 contracts

Samples: Equity Distribution Agreement (Volitionrx LTD), Equity Distribution Agreement (Volitionrx LTD), Underwriting Agreement (Volitionrx LTD)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 5 contracts

Samples: Sales Agreement (Rockwell Medical, Inc.), Sales Agreement (Scynexis Inc), Sales Agreement (Scynexis Inc)

Cybersecurity. The Company Transaction Entities’ and its their Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company Transaction Entities and its subsidiaries their Subsidiaries as currently conducted, and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company Transaction Entities and its their Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)Act; and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company Transaction Entities and its their Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 4 contracts

Samples: Equity Offering Sales Agreement (Armada Hoffler Properties, Inc.), Underwriting Agreement (Armada Hoffler Properties, Inc.), Underwriting Agreement (Armada Hoffler Properties, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businessesbusinesses (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of the Company). “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) personal information under the Personal Information Protection and Electronic Documents Act (“PIPEDA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating access to the same except IT Systems or Personal Data in each case, where such would not, either individually use or in possession of the aggregate, reasonably be expected to result in a Material Adverse EffectCompany. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 4 contracts

Samples: Placement Agency Agreement (Helius Medical Technologies, Inc.), Securities Purchase Agreement (Novo Integrated Sciences, Inc.), Placement Agency Agreement (Novo Integrated Sciences, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 4 contracts

Samples: Securities Purchase Agreement (GigCapital5, Inc.), Subscription Agreement (GigCapital5, Inc.), Subscription Agreement (Qt Imaging Holdings, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases used or owned by, or leased or licensed to, the Company or any of its Subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, conducted free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 4 contracts

Samples: Voting Agreement (Velo3D, Inc.), Voting Agreement (Velo3D, Inc.), Securities Purchase Agreement (AMERICAN BATTERY TECHNOLOGY Co)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2022, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 4 contracts

Samples: Securities Purchase Agreement (Petros Pharmaceuticals, Inc.), Securities Purchase Agreement (AYRO, Inc.), Securities Purchase Agreement (Sidus Space Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or other tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as would not, individually or in the aggregate, result in a Material Adverse Change, in the past five years, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 4 contracts

Samples: Sales Agreement (Alx Oncology Holdings Inc), Underwriting Agreement (Alx Oncology Holdings Inc), Underwriting Agreement (Alx Oncology Holdings Inc)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to samethe foregoing, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any and there are no incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Samples: Underwriting Agreement (SQZ Biotechnologies Co), Underwriting Agreement (SQZ Biotechnologies Co), SQZ Biotechnologies Co

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses, except in such cases as would not reasonably be expected, individually or in the aggregate, to have a Material Adverse Effect. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; and (iii) “personal data” any information that is regulated by applicable Privacy Laws (as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679herein); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Samples: Waitr Holdings Inc., Waitr Holdings Inc., Waitr Holdings Inc.

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Samples: Sales Agreement (Rubicon Technologies, Inc.), Sales Agreement (Rubicon Technologies, Inc.), Mind Medicine (MindMed) Inc.

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT SystemsSystems and Data”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that corruptants, except as would not reasonably be expected to have a Material Adverse Effect on the Company’s businessChange. The Company and its Subsidiaries subsidiaries have implemented and maintained maintain commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and dataData, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679)Regulation; (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries have been and are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data, including Personal Data and to the protection of such IT Systems and Data and Personal Data from unauthorized use, access, misappropriation or modification modification, except in each case, where such as would not, either individually or in the aggregate, not reasonably be expected to result in have a Material Adverse EffectChange.

Appears in 3 contracts

Samples: Open Market Sale Agreement (Calithera Biosciences, Inc.), Open Market Sale Agreement (Calithera Biosciences, Inc.), Open Market Sale Agreement (Calithera Biosciences, Inc.)

Cybersecurity. The Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, the Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and to the Company’s knowledge, are clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesssystem malfunctions. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards measures to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any material incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Samples: Evogene Ltd., Evogene Ltd., Evogene Ltd.

Cybersecurity. The Except as could not reasonably be expected, individually or in the aggregate, to result in a Material Adverse Change, (i) the Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on corruptants; and (ii) the Company’s business. The Company and its Subsidiaries subsidiaries have at all times in the past five years implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and confidential data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data is related to an identified person’s health or sexual orientation. There Except as could not reasonably be expected, individually or in the aggregate, to result in a Material Adverse Change, in the past five years, there have been no breaches, violations, outages or unauthorized uses of or accesses to samesuch IT Systems or confidential data, including Personal Data, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectperson. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, and all of the Company’s and its subsidiaries’ internal policies and contractual obligations obligations, relating to the privacy and security of such IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Samples: Cti Biopharma Corp, Cti Biopharma Corp, Cti Biopharma Corp

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail email address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2021, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 3 contracts

Samples: Securities Purchase Agreement (Wrap Technologies, Inc.), Securities Purchase Agreement (Tritium DCFC LTD), Securities Purchase Agreement (MyMD Pharmaceuticals, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or other tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as would not, individually or in the aggregate, result in a Material Adverse Change, in the past five years there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 3 contracts

Samples: Underwriting Agreement (Reneo Pharmaceuticals, Inc.), Securities Purchase Agreement (Reneo Pharmaceuticals, Inc.), Underwriting Agreement (Reneo Pharmaceuticals, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchsuch , nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 3 contracts

Samples: Securities Purchase Agreement (Akerna Corp.), Securities Purchase Agreement (Allarity Therapeutics, Inc.), Securities Purchase Agreement (Akerna Corp.)

Cybersecurity. The Company and its Subsidiaries’ Target’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Target as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the CompanyTarget’s business. The Company and its Subsidiaries have Target has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are Target is presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 3 contracts

Samples: Securities Purchase Agreement (ZyVersa Therapeutics, Inc.), Securities Purchase Agreement (Larkspur Health Acquisition Corp.), Securities Purchase Agreement (ZyVersa Therapeutics, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 3 contracts

Samples: Securities Purchase Agreement (Biotricity Inc.), Securities Purchase Agreement (Jet.AI Inc.), Securities Purchase Agreement (Biotricity Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and and, to the knowledge of the Company, operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Sales Agreement (Agile Therapeutics Inc), Agile Therapeutics Inc

Cybersecurity. The Except in each case as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (i) the Company and its Subsidiaries’ subsidiary’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (including all data of their respective employees, vendors, customers, members and any other third party data maintained by or on behalf of the Company and its subsidiary) (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries subsidiary as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on corruptants; and (ii) the Company’s business. The Company and its Subsidiaries subsidiary have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame.

Appears in 2 contracts

Samples: Underwriting Agreement (Aziyo Biologics, Inc.), Underwriting Agreement (Aziyo Biologics, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are (a) in all material respects adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and (b) to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy integrity and security of all IT Systems and data, including all “Personal Data,used in connection with (defined below) and all confidential information and data material to their businessesbusinesses (“Confidential Data”). “Personal Data” means the following information in the possession or control of the Company and its subsidiaries (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended, if applicable; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679), if applicable; (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”), if applicable; and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, person or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, except as disclosed under Form 8-K Current Report dated September 25, 2020 (the “2020 Cyber Security Matter”) there have been no breachesbreaches of the security of, violations, outages or unauthorized uses of or accesses to sameto, IT Systems or Personal Data, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in have a Material Adverse Effect. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Underwriting Agreement (cbdMD, Inc.), Underwriting Agreement (cbdMD, Inc.)

Cybersecurity. The Company and its Subsidiaries’ each Subsidiary’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all Personal Data (as defined below) and all sensitive, confidential or regulated data (Personal Confidential Data,” ”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any material incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame.

Appears in 2 contracts

Samples: Sales Agreement (Lineage Cell Therapeutics, Inc.), Sales Agreement (Lineage Cell Therapeutics, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means means, as applicable, (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Underwriting Agreement (Adicet Bio, Inc.), Underwriting Agreement (Adicet Bio, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (EU 2016/679) (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Riot Platforms, Inc., Riot Blockchain, Inc.

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2021, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 2 contracts

Samples: Securities Purchase Agreement (Synaptogenix, Inc.), Securities Purchase Agreement (Smith Micro Software, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)Act; and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Equity Distribution Agreement (Aptevo Therapeutics Inc.), Equity Distribution Agreement (Aptevo Therapeutics Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Open Market Sale (Arrowhead Pharmaceuticals, Inc.), Underwriting Agreement (Arrowhead Pharmaceuticals, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases used or owned by, or leased or licensed to, the Company or any of its Subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Securities Purchase Agreement (Mohawk Group Holdings, Inc.), Securities Purchase Agreement (HEXO Corp.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect material adverse effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Securities Purchase Agreement (Workhorse Group Inc.), Security Agreement (Workhorse Group Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conductedconducted and, to the knowledge of the Company, is free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification modification, except in each case, where such as would not, either individually or in the aggregate, be reasonably be expected to result in have a Material Adverse Effect.

Appears in 2 contracts

Samples: Open Market Sale (Dave & Buster's Entertainment, Inc.), Underwriting Agreement (Ruths Hospitality Group, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Sales Agreement (Cyclacel Pharmaceuticals, Inc.), Ur-Energy Inc

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the Company’s knowledge are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businessmalicious code. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operationavailability, redundancy privacy and security of all the IT Systems and data, including Personal Data,” , used in connection with their businesses. “Personal Data” means (i) a natural person’s persons’ name, street address, telephone number, e-mail email address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) Protected Health Information as defined by HIPAA; (iv) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify a Governmental Authority or any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectperson. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Open Market Sale (Praxis Precision Medicines, Inc.), Open Market Sale (Praxis Precision Medicines, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate in all material respects for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the knowledge of the Company, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used they possess and control, and use in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iviii) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Underwriting Agreement (AFC Gamma, Inc.), Underwriting Agreement (AFC Gamma, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Opiant Pharmaceuticals, Inc., CRISPR Therapeutics AG

Cybersecurity. The Except as would not, in the aggregate, reasonably be expected to have a Material Adverse Effect, the Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Purchase Agreement (POINT Biopharma Global Inc.), Equity Distribution Agreement (POINT Biopharma Global Inc.)

Cybersecurity. The To the Company’s knowledge, the Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Placement Agency Agreement (Presto Automation Inc.), Scholar Rock Holding Corp

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,and sensitive, confidential or regulated data and data used in connection with the operation of their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. The Company and its subsidiaries have used reasonable efforts to establish, and have established, commercially reasonable disaster recovery and security plans, procedures and facilities for the business, including without limitation for the information technology systems and data held or used by or for the Company or any of its subsidiaries. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Underwriting Agreement (Kezar Life Sciences, Inc.), Underwriting Agreement (Kezar Life Sciences, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) to the extent applicable, any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) if applicable to the Company or any subsidiary, “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); and (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to the same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Sales Agreement (Vince Holding Corp.), Vince Holding Corp.

Cybersecurity. The Company and its the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT SystemsSystems and Data”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries the Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that corruptants, except as would not reasonably be expected to have a Material Adverse Effect on the Company’s businessEffect. The Company and its the Subsidiaries have implemented and maintained maintain commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and dataData, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679)Regulation; (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)Act; and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its the Subsidiaries have been and are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authorityApplicable Law, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data, including Personal Data Data, and to the protection of such IT Systems and Data, including Personal Data Data, from unauthorized use, access, misappropriation or modification modification, except in each caseas would not reasonably be expected to, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse EffectChange.

Appears in 2 contracts

Samples: Sales Agreement (Tilray Brands, Inc.), Equity Distribution Agreement (Aphria Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, and, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as disclosed in the Registration Statement, the Pricing Disclosure Package or the Prospectus, there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Underwriting Agreement (Nyiax, Inc.), Underwriting Agreement (Nyiax, Inc.)

Cybersecurity. The To the Company’s knowledge, the Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2022, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 2 contracts

Samples: Securities Purchase Agreement (Femasys Inc), Securities Purchase Agreement (PharmaCyte Biotech, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Equity Distribution Agreement (Codexis, Inc.), Chimerix Inc

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Underwriting Agreement (fuboTV Inc. /FL), Underwriting Agreement (fuboTV Inc. /FL)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the privacy, integrity, continuous operation, redundancy and security of all IT Systems and data, data (including “Personal Data,” sensitive, confidential or regulated data, collectively “Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that identifies or allows the identification of such natural person, or his or her familyfamily or household, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to sameor disclosure of the Data, except for those that have been remedied without material cost or liability or the duty to notify any other person person, governmental or suchregulatory authority or third party, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently presently, and at all prior terms were, in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 2 contracts

Samples: Underwriting Agreement (Relmada Therapeutics, Inc.), Underwriting Agreement (Relmada Therapeutics, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the Company’s knowledge the IT Systems are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Company Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Company Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Company Material Adverse Effect.

Appears in 2 contracts

Samples: Securities Purchase Agreement (ARYA Sciences Acquisition Corp IV), Securities Purchase Agreement (ARYA Sciences Acquisition Corp IV)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since December 31, 2018, to the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor are there any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 2 contracts

Samples: Securities Purchase Agreement (Digital Health Acquisition Corp.), Securities Purchase Agreement (Digital Health Acquisition Corp.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There During the past five (5) years, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Open Market Sale (Vuzix Corp)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy operation and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have have, to the knowledge of the Company, been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Open Market Sale Agreement (Vascular Biogenics Ltd.)

Cybersecurity. The Except as would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect, the Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards that are designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as constitutes personally identifying personal information,“personal data,” or other similar term under the Federal Trade Commission Act, as amendedPrivacy Laws; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information subject to Privacy Laws and/or Company Policies and that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case(collectively, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.“Privacy Laws”). ACTIVE/111313883.4

Appears in 1 contract

Samples: Surface Oncology, Inc.

AutoNDA by SimpleDocs

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential sensitive, confidential, or regulated information (“Confidential Data”), including all “Personal Data” (defined below) and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); or (vi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, approved and implemented internal policies policies, and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Clearside Biomedical, Inc.

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (EU 2016/679) (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Sales Agreement (Riot Blockchain, Inc.)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Equity Distribution Agreement (Miromatrix Medical Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including Personal Data,” Data (as defined below), used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)Act; and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries at all prior times have been and are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules rules, and regulations of any court or arbitrator or governmental or regulatory authority, internal policies policies, and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except modification. The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in each caseany policies and procedures relating to data privacy and security and the collection, where such would notstorage, either individually use, disclosure, handling, and analysis of Personal Data have been inaccurate or in the aggregate, reasonably be expected to result violation of any applicable laws and regulatory rules or requirements in a Material Adverse Effectany material respect.

Appears in 1 contract

Samples: Sales Agreement (Nyxoah SA)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businessesits business. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Everspin Technologies Inc

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business(collectively, “IT Threats”). The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businessesbusinesses and identify IT Threats. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Arrowhead Pharmaceuticals, Inc.

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate in all material respects for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and, to the knowledge of the Company, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used they possess and control, and use in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iviii) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: AFC Gamma, Inc.

Cybersecurity. The Company and its Subsidiaries’ Except as would not reasonably be expected, individually or in the aggregate, to result in a Material Adverse Effect, the Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear clear, to the Company’s knowledge, of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Underwriting Agreement (Synlogic, Inc.)

Cybersecurity. The Except as would not reasonably be expected to have a Material Adverse Effect, the Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, technology systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented subsidiaries implement and maintained maintain commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards designed to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, since January 1, 2017, there have been no breaches, violations, outages or unauthorized uses of of, or accesses to sameto, the Company’s IT Systems, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectperson. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification modification, except in each case, where such as would not, either not individually or in the aggregate, aggregate reasonably be expected to result in have a Material Adverse Effect.

Appears in 1 contract

Samples: Underwriting Agreement (Establishment Labs Holdings Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted. To the knowledge of the Company, free and clear the IT Systems that are critical to the operation of all the Company’s business contain no material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards controls designed to maintain and protect (a) their material confidential information and information; (b) the integrity, continuous operation, redundancy integrity and security of all IT Systems and data, including the continuous operation and redundancy of those IT Systems that are critical to the operation of the Company’s business; and (c) “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as would not reasonably be expected to result an obligation to notify a person or result in a Material Adverse Change, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without the Company’s IT Systems and no material cost unauthorized uses or liability or the duty accesses to notify any other person or suchPersonal Data, nor any incidents under internal review or investigations relating to the same except in each case, where such that would not, either individually or in the aggregate, reasonably be expected to result in an obligation to notify a person or result in a Material Adverse EffectChange. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgmentsjudgments and orders binding on the Company, orders, applicable binding rules and regulations of any court or arbitrator or governmental or regulatory authority, and internal policies and contractual obligations obligations, each relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Underwriting Agreement (Oncorus, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate in all material respects for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the knowledge of the Company are, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Sales Agreement (Inspira Technologies OXY B.H.N. LTD)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases used or owned by, or leased or licensed to, the Company or any of its Subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, . The IT Systems are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws Laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Transaction Agreement (Tilray Brands, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each caseand neither the Company nor any of its subsidiaries have been notified of, where such nor do they have any knowledge of, any event or condition that would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectin, any security breach or other compromise to the IT Systems and Personal Data. The Company and its Subsidiaries subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification modification, except in each case, where such as would not, either individually or in the aggregate, reasonably be expected to result in have a Material Adverse Effect.

Appears in 1 contract

Samples: Equity Distribution Agreement (Casa Systems Inc)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Sales Agreement (Verastem, Inc.)

Cybersecurity. The Company Company’s and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, on-premise and remote systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably adequate for, and operate and perform in all material respects as required in connection with for the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, or bank account information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data,“personal information,” or similar term as defined by the European Union General Data Protection Regulation CCPA (“GDPR”as defined below), CPRA (as defined below), GDPR (as defined below) (EU 2016/679)or any other applicable Privacy Laws; (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that that, either alone or in combination with another piece of information, allows for the identification of such natural person, or his or her familyfamily or household, or a device, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There , and together with all proprietary or confidential information of the Company, “Sensitive Data.” In the past three years, there have been no breaches, violations, outages or unauthorized uses of or accesses to samesuch Sensitive Data or IT Systems, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents governmental authority under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse EffectPrivacy Laws (as defined below).

Appears in 1 contract

Samples: Lexicon Pharmaceuticals, Inc.

Cybersecurity. The Company Company’s and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that corruptants, except where the failure to do so would not reasonably be expected to have a Material Adverse Effect on the Company’s businessChange. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same and except in each casefor those that would reasonably be expected, where such would not, either individually or in the aggregate, reasonably be expected to result in have a Material Adverse EffectChange. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification modification, except where the failure to be in each case, where such compliance would not, either individually or in the aggregate, not reasonably be expected to result in have a Material Adverse EffectChange.

Appears in 1 contract

Samples: GameStop Corp.

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their its businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes laws, rules and regulations and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authorityGovernmental Authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Underwriting Agreement (Miromatrix Medical Inc.)

Cybersecurity. The Except as would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect, the Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Purchase Agreement (Digi International Inc)

Cybersecurity. The Company and its Subsidiaries’ Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect: (i) the Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with with, the operation of the business of the Company and its subsidiaries as currently conducted, to the Company’s knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on corruptants; (ii) the Company’s business. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including Personal Data,” Data (as defined hereinafter) used in connection with their businesses. businesses (“Personal Data” means (iA) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (iiB) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iiiC) “personal data” as defined by the European Union General Data Protection Regulation 2016/679; or (“GDPR”) (EU 2016/679); (ivD) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”Act); and (viii) any other piece of information that allows to the identification of such natural personCompany’s knowledge, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in same; and (iv) the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are is presently in compliance with all applicable laws or statutes statutes, including all applicable state and federal data privacy and security laws and regulations, and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Underwriting Agreement (AC Immune SA)

Cybersecurity. The To the Company’s knowledge, the Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)Act; and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2020, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 1 contract

Samples: Stock Purchase Agreement (Trinity Place Holdings Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Since January 1, 2022, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 1 contract

Samples: Securities Purchase Agreement (Hagerty, Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conductedconducted and, to the Company’s knowledge, based on commercially reasonably security and monitoring, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission ActAct of 1914, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”)HIPPA; and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Viridian Therapeutics, Inc.\DE

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with with, the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which that would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which that would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (viv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as disclosed in the Prospectus, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Tyme Technologies, Inc.

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail email address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Purchase Agreement (Repro Med Systems Inc)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Underwriting Agreement (Celcuity Inc.)

Cybersecurity. The Company Company’s and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business businesses of the Company and each of its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (EU 2016/679) (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification modification, except in each case, where such as would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 1 contract

Samples: Sales Agreement (Schmitt Industries Inc)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Purchase Agreement (Neuronetics, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 1 contract

Samples: Securities Purchase Agreement (Data Knights Acquisition Corp.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the Company’s knowledge are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There The Company and its Subsidiaries have been no not experienced any material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor are any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Underwriting Agreement (Novan, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Sales Agreement (Applied Genetic Technologies Corp)

Cybersecurity. The Company Company’s and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or such, nor any incidents under internal review or investigations relating to the same except in each case, where such case as would not, either individually or in the aggregate, reasonably be expected to result in have a Material Adverse Effect. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Karyopharm Therapeutics Inc.

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Underwriting Agreement (Aytu Biopharma, Inc)

Cybersecurity. The Company Company’s and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There Except as would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Change, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any material data incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Equity Offeringsm Sales Agreement (Aerovate Therapeutics, Inc.)

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Cef Purchase Agreement (Lucid Diagnostics Inc.)

Cybersecurity. The Company Company’s and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that corruptants, except where the failure to do so would not reasonably be expected to have a Material Adverse Effect on the Company’s businessChange. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and take commercially reasonable steps to protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation GDPR (“GDPR”) (EU 2016/679as defined below); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification modification, except where the failure to be in each case, where such compliance would not, either individually or in the aggregate, not reasonably be expected to result in have a Material Adverse EffectChange.

Appears in 1 contract

Samples: INFINERA Corp

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, applications and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Open Market Sale (TFF Pharmaceuticals, Inc.)

Cybersecurity. The Company and its Subsidiaries’ Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries have has implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data,(defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); (v) any “personal information” as defined by the California Consumer Privacy Act (“CCPA”); and (vvi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries are is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems Systems, Confidential Data, and Personal Data and to the protection of such IT Systems Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Sales Agreement (Biovie Inc.)

Cybersecurity. The Company and its Subsidiariessubsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s businesscorruptants. The Company and its Subsidiaries subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the privacy, integrity, continuous operation, redundancy and security of all IT Systems and data, data (including “Personal Data,” sensitive, confidential or regulated data, collectively “Data”) used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that identifies or allows the identification of such natural person, or his or her familyfamily or household, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There have been no breaches, violations, outages or unauthorized uses of or accesses to sameor disclosure of the Data, except for those that would not result in a Material Adverse Change or have been remedied without material cost or liability or the duty to notify any other person person, governmental or suchregulatory authority or third party, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectsame. The Company and its Subsidiaries subsidiaries are presently presently, and at all prior terms were, in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effectmodification.

Appears in 1 contract

Samples: Relmada Therapeutics, Inc.

Cybersecurity. The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants that would reasonably be expected to have a Material Adverse Effect on the Company’s business. The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses. “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) “personal data” as defined by the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); (iv) any information which would qualify as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (v) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. There To the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person or suchperson, nor any incidents under internal review or investigations relating to the same except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect.

Appears in 1 contract

Samples: Securities Purchase Agreement (Heart Test Laboratories, Inc.)

Time is Money Join Law Insider Premium to draft better contracts faster.