Common use of Cybersecurity Clause in Contracts

Cybersecurity. (A) (i) The Company and each of its Subsidiaries have materially complied and are presently in material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effect.

Appears in 7 contracts

Samples: Underwriting Agreement (Abacus Life, Inc.), Underwriting Agreement (Abacus Life, Inc.), Equity Distribution Agreement (PennyMac Mortgage Investment Trust)

AutoNDA by SimpleDocs

Cybersecurity. (A) To the knowledge of the Transaction Entities, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Transaction Entities’ or any of their respective subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (iincluding but not limited to the personally identifiable information, confidential or regulated data of their respective tenants, employees, suppliers, vendors and any third party data, maintained, processed or stored by the Transaction Entities or any of their respective subsidiaries, and any such data processed or stored by third parties on behalf of the Transaction Entities or any of their respective subsidiaries), equipment or technology (collectively, “IT Systems and Data”), (B) neither the Transaction Entities nor any of their respective subsidiaries have been notified of, and have knowledge of any event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data and (C) the Transaction Entities and their respective subsidiaries have implemented appropriate controls, policies, procedures and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards, except in cases of (A) and (B), for such breaches, incidents, access, disclosures, compromises, notifications, events or conditions that would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company Transaction Entities and each of its Subsidiaries have materially complied and their respective subsidiaries are presently in compliance in all material compliance respects with all internal applicable laws or statutes and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, all judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, company policies (internal and any other legal obligations, in each case, posted) and contractual obligations relating to the collection, use, transfer, import, export, storage, protection, disposal privacy and disclosure by the Company or any security of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“IT Systems and Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge protection of the Company, threatened alleging non-compliance with any such IT Systems and Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, from unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effect.

Appears in 6 contracts

Samples: Underwriting Agreement (Postal Realty Trust, Inc.), Underwriting Agreement (Postal Realty Trust, Inc.), Underwriting Agreement (Postal Realty Trust, Inc.)

Cybersecurity. (A) Except as would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect, (i) The the Company’s and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform as required in connection with the operation of the business of the Company as currently conducted, to the Company’s knowledge, free and clear of all material Trojan horses, time bombs, malware and other malicious code; (ii) there has been no security breach or incident resulting in unauthorized access to or disclosure of, or other compromise of the Company’s or its Subsidiaries’ IT Systems and data and databases (including the data and information of their respective customers, employees, suppliers, vendors and any other third parties maintained, processed or stored by or on behalf of the Company and its Subsidiaries), equipment or technology (collectively, “IT Systems and Data”) (each a “Security Breach”); (iii) neither the Company nor its subsidiaries have been notified of a Security Breach, and the Company and its Subsidiaries have materially complied implemented appropriate controls, policies, procedures, and are presently technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices for similarly situated companies, or as required by applicable regulatory standards. Except as would not, individually or in material the aggregate, reasonably be expected to result in a Material Adverse Effect, the Company and its Subsidiaries are, and at all prior times have been, in compliance with all internal applicable laws or statutes and external privacy policies, contractual obligations, industry standards, all applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, and any other legal obligations, in each caseall policies and contractual obligations of the Company and its Subsidiaries, relating to the collection, privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, transferaccess, import, export, storage, protection, disposal and disclosure by the Company misappropriation or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effectmodification. (B) The Company and its Subsidiaries have used reasonable efforts to establish implemented backup and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery technology consistent with industry standards and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effectpractices for similarly situated companies.

Appears in 5 contracts

Samples: Underwriting Agreement (MDNA Life Sciences, Inc.), Underwriting Agreement (MDNA Life Sciences, Inc.), Underwriting Agreement (MDNA Life Sciences, Inc.)

Cybersecurity. (A) (i) The Company and each of its Subsidiaries have materially complied and are presently in material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the CompanyCompany and its subsidiary, there has been no such Breach that wouldsecurity breach or incident, singly unauthorized access or in disclosure, or other compromise of or relating to the aggregateCompany’s or its subsidiary’s information technology and computer systems, result in a Material Adverse Effectnetworks, hardware, software, data and databases (including, without limitation, the data and information of their respective customers, employees, suppliers and vendors and any third party data maintained, processed or stored by the Company and its Subsidiaries have not subsidiary, and any such data processed or stored by third parties on behalf of the Company and its subsidiary), equipment or technology (collectively, “IT Systems and Data”); neither the Company nor its subsidiary has been notified of and have no of, or has knowledge of any event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data; the Company and its subsidiary have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards; and the Company and its subsidiary are presently in material compliance with all applicable laws or statutes and all judgments, orders, Securities Act Regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification. The Company and its board of directors have taken all necessary action, if any, in order to render inapplicable any control share acquisition, business combination, poison pill (including any distribution under a rights agreement) or other similar anti-takeover provision under the Company's articles of incorporation or by-laws, the Canada Business Corporations Act or other applicable Canadian laws that is or could reasonably be expected to become applicable to the Agent as a result inof the Agent and the Company fulfilling their obligations or exercising their rights under the Agreement, any such Breach that wouldincluding, singly or in without limitation, the aggregate, result in a Material Adverse EffectCompany's issuance of the Shares and the Agent’s ownership of the Shares.

Appears in 4 contracts

Samples: Equity Distribution Agreement (IMV Inc.), Equity Distribution Agreement (IMV Inc.), Equity Distribution Agreement (IMV Inc.)

Cybersecurity. (A) To the knowledge of the Company, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of the Company’s or its subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (iincluding the data and information of their respective tenants, customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its subsidiaries), equipment or technology (collectively, “IT Systems and Data”), (B) neither the Company nor its subsidiaries have been notified of, and have no knowledge of any event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data and (C) the Company and its subsidiaries have implemented controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards, except with respect to clauses (A) and (B), for any such security breach or incident, unauthorized access or disclosure, or other compromises, as would not, individually or in the aggregate, have a Material Adverse Effect, or with respect to clause (C), where the failure to do so would not, individually or in the aggregate, have a Material Adverse Effect. The Company and each of its Subsidiaries have materially complied and subsidiaries are presently in material compliance with all internal applicable laws and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, statutes and all judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, internal policies and any other legal obligations, in each case, contractual obligations relating to the collection, use, transfer, import, export, storage, protection, disposal privacy and disclosure by the Company or any security of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“IT Systems and Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge protection of the Company, threatened alleging non-compliance with any such IT Systems and Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, from unauthorized distribution, use, access, disablement, misappropriation or modification, . Any certificate signed by any officer of the Company or other compromise the Operating Partnership and delivered to the Representatives or misuse to counsel for the Underwriters after the date of this Agreement and prior to or relating to any information technology system on the Closing Date or Data used in connection with the operation delivery and sale of the Company’s Securities shall be deemed a joint and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, several representation and warranty by the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected the Operating Partnership to result in, any such Breach that would, singly or in each Underwriter as to the aggregate, result in a Material Adverse Effectmatters covered thereby.

Appears in 4 contracts

Samples: Underwriting Agreement (Kilroy Realty, L.P.), Underwriting Agreement (Kilroy Realty, L.P.), Underwriting Agreement (Kilroy Realty, L.P.)

Cybersecurity. (A) There has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to any of the Company’s or its Subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (iincluding the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its Subsidiaries, and, to the knowledge of the Company, any such data processed or stored by third parties on behalf of the Company and its Subsidiaries, equipment or technology (collectively, “IT Systems and Data”), that would, singly or in the aggregate, reasonably be expected to have a Material Adverse Effect; (B) neither the Company nor its Subsidiaries have been notified of, and each of them have no knowledge of any event or condition that would result in any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data that would, singly or in the aggregate, reasonably be expected to have a Material Adverse Effect; and (C) the Company and its Subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards, except as would not, singly or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company and each of its Subsidiaries have materially complied and are presently in compliance in all material compliance respects with all internal applicable laws or statutes and external privacy policies, contractual obligations, industry standards, all applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, internal policies and any other legal obligations, in each case, contractual obligations relating to the collection, use, transfer, import, export, storage, protection, disposal privacy and disclosure by the Company or any security of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“IT Systems and Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge protection of the Company, threatened alleging non-compliance with any such IT Systems and Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, from unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effect.

Appears in 3 contracts

Samples: Underwriting Agreement (Independent Bank Group, Inc.), Underwriting Agreement (Veritex Holdings, Inc.), Underwriting Agreement (Veritex Holdings, Inc.)

Cybersecurity. (A) (i) The Company and each of its Subsidiaries have materially complied and are presently in material compliance with all internal and external privacy policiesThere has been no security breach or incident, contractual obligationsunauthorized access or disclosure, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental compromise of or regulatory authority and any other legal obligations, in each case, relating to the collectionCompany’s or its subsidiaries’ information technology and computer systems, usenetworks, transferhardware, importsoftware, exportwebsites, storageapplications, protection, disposal and disclosure by the Company or any of its Subsidiaries of data (including all personal, personally identifiable, household, sensitive, confidential or regulated data (including protected health information) (Data Security ObligationsPersonal Data)) and databases (including, without limitation, the data and information of their respective customers, employees, suppliers and vendors, and any third party data maintained, processed or stored by the Company and its subsidiaries, and any such datadata processed or stored by third parties on behalf of the Company and its subsidiaries), equipment or technology (collectively, “IT Systems and Data”); (iiB) the IT Systems and Data of the Company and its subsidiaries are adequate for, and operate and perform in all material respects as required in connection with operation of the business of the Company and its subsidiaries free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants; (C) neither the Company nor its subsidiaries have been notified of, and have no knowledge of any event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data; and (D) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and policies, procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, accessassess, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system their IT Systems and Data and to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, as required by applicable regulatory standards and the Company and its Subsidiaries have not been notified of subsidiaries are presently in material compliance with all applicable laws or statutes and have no knowledge all judgments, orders, rules and regulations of any event court or condition that would reasonably be expected arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to result inthe privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, any such Breach that wouldaccess, singly misappropriation or in the aggregate, result in a Material Adverse Effectmodification.

Appears in 3 contracts

Samples: Underwriting Agreement (DENNY'S Corp), Underwriting Agreement (Palmer Square Capital BDC Inc.), Underwriting Agreement (Applied Genetic Technologies Corp)

Cybersecurity. (Ai)(x) (i) The Company and each of its Subsidiaries have materially complied and are presently in material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries There has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is been no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, breach or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its Subsidiaries’ businesses respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, BreachIT Systems and Data). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, ) and (y) the Company and its the Subsidiaries have not been notified of of, and have has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such Breach that wouldIT Systems and Data from unauthorized use, singly access, misappropriation or modification, except as would not, individually or in the aggregate, result in have a Material Adverse EffectChange; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with commercially reasonable industry standards and practices. Any certificate signed by an officer of the Company and delivered to the Sales Agent or to counsel for the Sales Agent pursuant to or in connection with this Agreement shall be deemed to be a representation and warranty by the Company to the Sales Agent as to the matters set forth therein. The Company acknowledges that the Sales Agent and, for purposes of the opinions to be delivered pursuant to Section 7 hereof, counsel to the Company and counsel to the Sales Agent, will rely upon the accuracy and truthfulness of the foregoing representations and hereby consents to such reliance.

Appears in 3 contracts

Samples: Common Stock (Precipio, Inc.), Common Stock (Precipio, Inc.), Sales Agreement (HeartBeam, Inc.)

Cybersecurity. (A) (i) The Company and each To the knowledge of its Subsidiaries have materially complied and are presently in material compliance with all internal and external privacy policiesthe Company, contractual obligationsthere has been no security breach or incident, industry standardsunauthorized access or disclosure, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental compromise (each, a “Cybersecurity Breach”) of or regulatory authority and any other legal obligations, in each case, relating to the collectionCompany’s or its subsidiaries’ information technology and computer systems, usenetworks, transferhardware, importsoftware, exportwebsites, storageapplications, protection, disposal and disclosure by the Company or any of its Subsidiaries of data (including all personal, personally identifiable, household, sensitive, confidential or regulated data (including protected health information) (Data Security Obligations”, and such data, “Personal Data”)) and databases (including, without limitation, the data and information of their respective customers, employees, suppliers and vendors, and any third party data maintained, processed or stored by the Company and its subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its subsidiaries), equipment or technology (collectively, “IT Systems and Data”) except for any such Cybersecurity Breach that would not reasonably be expected to result in a Material Adverse Effect; (iiB) the IT Systems and Data of the Company or any and its subsidiaries are adequate for, and operate and perform in all material respects as required in connection with operation of the business of the Company and its Subsidiaries has not received any notification subsidiaries free and clear of or complaint regarding all material bugs, errors, defects, Trojan horses, time bombs, malware and is unaware other corruptants; (C) neither the Company nor its subsidiaries have been notified of, and have no knowledge of any event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other facts thatcompromise to their IT Systems and Data except for any such security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data that would not, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, be expected to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. ; and (BD) The the Company and its Subsidiaries subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and policies, procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, accessassess, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system their IT Systems and Data and to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, as required by applicable regulatory standards and the Company and its Subsidiaries have not been notified of subsidiaries are presently in material compliance with all applicable laws or statutes and have no knowledge all judgments, orders, rules and regulations of any event court or condition that arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except where the failure to be so in compliance would not reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in have a Material Adverse Effect.

Appears in 2 contracts

Samples: Underwriting Agreement (Applied Genetic Technologies Corp), Underwriting Agreement (Applied Genetic Technologies Corp)

Cybersecurity. (i) Other than as disclosed in the Prospectus, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company’s information technology and computer systems, networks, hardware, software, data and databases (including the data and information of its customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company, and any such data processed or stored by third parties on behalf of the Company), equipment or technology (collectively, “IT Systems and Data”), except for those that (A) have been remedied without material cost or liability or the duty to notify any other person and (iB) would not, individually or in the aggregate, result in a Material Adverse Effect; (ii) the Company has not been notified of, and has no knowledge of any event or condition that could result in, any security breach or incident, unauthorized access or disclosure or other compromise to its IT Systems and Data; and (iii) the Company has implemented commercially reasonable controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of its IT Systems and Data consistent with industry standards and practices, or as required by applicable regulatory standards. The Company and each of its Subsidiaries have materially complied and are is presently in material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, internal policies and any other legal contractual obligations, in each case, case relating to the collection, privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, transferaccess, import, export, storage, protection, disposal and disclosure by the Company misappropriation or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there modification. There is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened action, suit or proceeding by or before any court, arbitrator or governmental or regulatory authority alleging non-compliance with the foregoing. Any certificate signed by any Data Security Obligation that would, singly or in officer of the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts delivered to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation the Agent or modification, or other compromise or misuse of or relating to any information technology system or Data used counsel for the Agent in connection with the operation offering of the Company’s Shares pursuant to this Agreement shall be deemed a representation and its Subsidiaries’ businesses (“Breach”)warranty by the Company to the Agent as to the matters covered thereby on the date of such certificate. To The Company acknowledges that the knowledge Agent and, for purposes of the Companyopinions to be delivered pursuant to Section 4(o) hereof, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and counsel to the Company and its Subsidiaries have not been notified counsel to the Agent, will rely upon the accuracy and truthfulness of the foregoing representations and have no knowledge of any event or condition that would reasonably be expected hereby consents to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effectreliance.

Appears in 2 contracts

Samples: Open Market Sale (BioXcel Therapeutics, Inc.), Open Market Sale (BioXcel Therapeutics, Inc.)

Cybersecurity. Except as disclosed in the SEC Reports, (Aa) to the knowledge of the Company, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company or its Subsidiaries information technology and computer systems, networks, hardware, software, data and databases (iincluding the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its Subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its Subsidiaries), equipment or technology (collectively, “IT Systems and Data”) that, individually or in the aggregate, would reasonably be expected to have a Material Adverse Effect, (b) neither the Company nor its Subsidiaries have been notified in writing of, and, to the Company’s knowledge, there is no presently existing event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data that, individually or in the aggregate, would reasonably be expected to have a Material Adverse Effect and (c) the Company and its Subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards reasonably designed to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data as required by applicable law. The Company and each of its Subsidiaries have materially complied and are presently in compliance in all material compliance respects with all internal applicable laws or statutes and external privacy policies, contractual obligations, industry standards, all applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, internal policies and any other legal obligations, in each case, applicable contractual obligations relating to the collection, privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, transferaccess, importmisappropriation or modification, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and except for such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts thatnoncompliance as would not, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in have a Material Adverse Effect.

Appears in 2 contracts

Samples: Exchange Agreement (Teligent, Inc.), Exchange Agreement (Teligent, Inc.)

Cybersecurity. (Ai)(x) (i) The Company and each of its Subsidiaries have materially complied and are presently in material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries There has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is been no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, breach or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s or any Material Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its Subsidiaries’ businesses respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, BreachIT Systems and Data). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, ) and (y) the Company and its the Material Subsidiaries have not been notified of of, and have has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Material Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such Breach that wouldIT Systems and Data from unauthorized use, singly access, misappropriation or modification, except as would not, individually or in the aggregate, result in have a Material Adverse Effect; (iii) the Company and the Material Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices. In this Agreement, a reference to “knowledge” of the Company means the knowledge of the directors or officers of the Company or any officer who may be responsible for the subject matter at issue, in each case, after reasonable inquiry. Any certificate signed by any officer on behalf of the Company or any of the Material Subsidiaries and delivered to the Representative or the Underwriters or counsel for the Underwriters in connection with the offering of the Units shall be deemed to be a representation and warranty by the Company or Material Subsidiaries, as the case may be, as to matters covered thereby, to each Underwriter. The Company acknowledges that the Underwriters and, for purposes of the opinions to be delivered pursuant to Section 6 hereof, counsel to the Company and counsel to the Underwriters will rely upon the accuracy and truthfulness of the foregoing representations and hereby consents to such reliance.

Appears in 1 contract

Samples: Underwriting Agreement (Vista Gold Corp)

Cybersecurity. (A) To the knowledge of the Company and its subsidiaries, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of the Company or its subsidiaries’ information technology and computer systems, networks, hardware, software, websites, applications, data and databases (iincluding the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its subsidiaries), equipment or technology (collectively, “IT Systems and Data”) other than those that were resolved without material cost or liability or the duty to notify any person: (B) neither the Company nor its subsidiaries have been notified of, and each of them have no knowledge of any event or condition that reasonably could result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data and (C) the Company and its subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards, except with respect to clauses (A) and (B), for any such security breach or incident, unauthorized access or disclosure, or other compromises, as would not, individually or in the aggregate, have a Material Adverse Effect, or with respect to clause (C), where the failure to do so would not, individually or in the aggregate, have a Material Adverse Effect. The Company and each of its Subsidiaries have materially complied and subsidiaries are presently in material compliance with all internal currently applicable laws or statutes and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, all judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, internal policies and any other legal obligations, in each case, contractual obligations relating to the collection, use, transfer, import, export, storage, protection, disposal privacy and disclosure by the Company or any security of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“IT Systems and Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge protection of the Company, threatened alleging non-compliance with any such IT Systems and Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, from unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effect.

Appears in 1 contract

Samples: Underwriting Agreement (Adobe Inc.)

Cybersecurity. (A1) There has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company or its subsidiaries information technology and computer systems, networks, hardware, software, data and databases (iincluding the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its subsidiaries), equipment or technology (collectively, “IT Systems and Data”), (2) neither the Company nor its subsidiaries have been notified of, and each of them has no knowledge of any event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data and (3) the Company and its subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards. The Company and each of its Subsidiaries have materially complied and subsidiaries are presently in material compliance with all internal applicable laws or statutes and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, all judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, internal policies and any other legal obligations, in each case, contractual obligations relating to the collection, privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, transferaccess, import, export, storage, protection, disposal and disclosure misappropriation or modification. Any certificate signed by any officer of the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, subsidiaries and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating delivered to any information technology system Underwriter or Data used to counsel for the Underwriters in connection with the operation offering, or the purchase and sale, of the Company’s Offered Shares shall be deemed a representation and its Subsidiaries’ businesses (“Breach”)warranty by the Company to each Underwriter as to the matters covered thereby. To the knowledge The Company has a reasonable basis for making each of the Companyrepresentations set forth in this Section 1. The Company acknowledges that the Underwriters and, there has been no such Breach that wouldfor purposes of the opinions to be delivered pursuant to Section 6 hereof, singly or in the aggregate, result in a Material Adverse Effect, and counsel to the Company and its Subsidiaries have not been notified counsel to the Underwriters, will rely upon the accuracy and truthfulness of the foregoing representations and have no knowledge of any event or condition that would reasonably be expected hereby consents to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effectreliance.

Appears in 1 contract

Samples: Underwriting Agreement (Acadia Pharmaceuticals Inc)

Cybersecurity. Except as disclosed in the Registration Statement and the Prospectus, (Aa) to the knowledge of the Company, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of the Company’s or its Subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (iincluding the data and information of their respective borrowers, customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its Subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its Subsidiaries), equipment or technology (collectively, “IT Systems and Data”), (b) neither the Company nor its Subsidiaries have been notified of, and have no knowledge of any event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data and (c) the Company and its Subsidiaries have implemented controls, policies, procedures, and technological safeguards to maintain and protect, in all material respects, the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards, except with respect to clauses (a) and (b), for any such security breach or incident, unauthorized access or disclosure, or other compromises, as would not, individually or in the aggregate, result in a Material Adverse Effect, or with respect to clause (c), where the failure to do so would not, individually or in the aggregate, result in a Material Adverse Effect. The Company and each of its Subsidiaries have materially complied and are presently in material compliance with all internal applicable laws and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, statutes and all judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, internal policies and any other legal obligations, in each case, contractual obligations relating to the collection, use, transfer, import, export, storage, protection, disposal privacy and disclosure by the Company or any security of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“IT Systems and Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge protection of the Company, threatened alleging non-compliance with any such IT Systems and Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, from unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effect.

Appears in 1 contract

Samples: Equity Distribution Agreement (Ready Capital Corp)

Cybersecurity. (A) (i) The Company and each of its Subsidiaries have materially complied and are presently in To the Company’s best knowledge, after due inquiry, there has been no material compliance with all internal and external privacy policiessecurity breach or incident, contractual obligationsmaterial unauthorized access or disclosure, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental material compromise of the Company’s or regulatory authority its Significant Subsidiaries information technology and computer systems, networks, hardware, software, data and databases (including the data and information of their respective customers, employees, suppliers, vendors and any other legal obligationsthird party data maintained, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure processed or stored by the Company or any of and its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”Significant Subsidiaries, and any such datadata processed or stored by third parties on behalf of the Company and its Significant Subsidiaries), equipment or technology (collectively, “IT Systems and Data”); (iiB) neither the Company or any of nor its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Significant Subsidiaries have used reasonable efforts to establish and maintainbeen notified in writing of, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse each of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and them have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data and (C) the Company and its Significant Subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards designed to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data that are commercially reasonable, or as required by applicable law or statute, in each case covered by clauses (A)-(B) such Breach that wouldas would not, singly individually or in the aggregate, result in have a Material Adverse Effect. Except as would not, individually or in the aggregate, have a Material Adverse Effect, the Company and its Significant Subsidiaries are presently in material compliance with (i) all applicable laws or statutes, (ii) all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, (iii) the internal policies of the Company and any of its Significant Subsidiaries, as applicable, and (iv) applicable contractual obligations of the Company or any of its Significant Subsidiaries, as applicable, in each case of (i)-(iv), relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification.

Appears in 1 contract

Samples: Ads Deposit Agreement (CPFL Energy INC)

Cybersecurity. Except as could not be expected, individually or in the aggregate, to have a Material Adverse Effect, (A) there has been no security breach or incident, unauthorized access or disclosure, or other compromise relating to the Company’s or its Subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (iincluding the personal data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its Subsidiaries), equipment or technology (collectively, “IT Systems and Data”); (B) neither the Company nor its Subsidiaries have actual knowledge of any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data or to any data processed or stored by third parties on behalf of the Company and its Subsidiaries and (C) the Company and its Subsidiaries have implemented commercially reasonable controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data. The Company and each of its Subsidiaries have materially complied and are presently in material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, all judgments and orders specifically directed to the Company or its Subsidiaries and all rules and regulations of any court or arbitrator or other governmental or regulatory authority having jurisdiction over the Company or its Subsidiaries, and any other legal obligations, in each case, internal policies relating to the collectionprivacy and security of IT Systems and Data. Any certificate signed by any officer of the Company, usethe Operating Partnership or any of the Company’s Subsidiaries and delivered to any Underwriter or to counsel for the Underwriters in connection with the offering, transferor the purchase and sale, import, export, storage, protection, disposal of the Offered Shares shall be deemed a representation and disclosure warranty by the Company or any of its Subsidiaries of personalthe Operating Partnership, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending oras applicable, to each Underwriter as to the knowledge matters covered thereby. Each of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified the Operating Partnership acknowledges that the Underwriters and, for purposes of the opinions to be delivered pursuant to Section 6 hereof, counsel to the Company and have no knowledge the Operating Partnership and counsel to the Underwriters, will rely upon the accuracy and truthfulness of any event or condition that would reasonably be expected the foregoing representations and hereby consents to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effectreliance.

Appears in 1 contract

Samples: Underwriting Agreement (Gladstone Commercial Corp)

AutoNDA by SimpleDocs

Cybersecurity. Except as disclosed in the Registration Statement and the Prospectus, (A) to the knowledge of the Company or the Operating Partnership, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of the Company’s, the Operating Partnership’s or the Subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (iincluding the data and information of their respective tenants, customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company, the Operating Partnership and the Subsidiaries, and any such data processed or stored by third parties on behalf of the Company, the Operating Partnership and the Subsidiaries), equipment or technology (collectively, “IT Systems and Data”); (B) The Company none of the Company, the Operating Partnership or the Subsidiaries has been notified of, and each has no knowledge of its any event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data; and (C) the Company, the Operating Partnership and the Subsidiaries have materially complied implemented controls, policies, procedures, and technological safeguards to maintain and protect, in all material respects, the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, except with respect to clauses (A) and (B), for any such security breach or incident, unauthorized access or disclosure, or other compromises, as would not have a Material Adverse Effect on the Company, the Operating Partnership and the Subsidiaries, taken as a whole, or with respect to clause (C), where the failure to do so would not, individually or in the aggregate, have a Material Adverse Effect. Except as would not have a Material Adverse Effect on the Company, the Operating Partnership and the Subsidiaries, taken as a whole, the Company, the Operating Partnership and the Subsidiaries are presently in material compliance with all internal applicable laws or statutes and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, all judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, internal policies and any other legal obligations, in each case, contractual obligations relating to the collection, use, transfer, import, export, storage, protection, disposal privacy and disclosure by the Company or any security of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“IT Systems and Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge protection of the Company, threatened alleging non-compliance with any such IT Systems and Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, from unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effect.

Appears in 1 contract

Samples: Equity Distribution Agreement (Urban Edge Properties)

Cybersecurity. (A) (i) The Company and each of its Subsidiaries have materially complied and are presently Except where failure to be so in material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating would not reasonably be expected to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, (A) there has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company or its subsidiary’s information technology and computer systems, networks, hardware, software, data and databases (including the data and information of their respective customers, employees, vendors and any third party data maintained, processed or stored by the Company or its subsidiary, and any such data processed or stored by third parties on behalf of the Company or its subsidiary), equipment or technology (collectively, “IT Systems and Data”); (B) the Company and its Subsidiaries subsidiary have not been notified of of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data; (C) the Company and its subsidiary have implemented commercially reasonable controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards; and (D) the Company and its subsidiary are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such Breach IT Systems and Data from unauthorized use, access, misappropriation or modification. Any certificate signed by any officer or representative of the Company or its subsidiary and delivered to the Manager or counsel for the Manager in connection with this Agreement or any Terms Agreement shall be deemed a representation and warranty by the Company or such subsidiary of the Company, as applicable, to the Manager as to the matters set forth therein. The Company acknowledges that wouldthe Manager and, singly or in for purposes of the aggregateopinions to be delivered pursuant to Section 4 hereof, result in a Material Adverse Effectcounsel for the Company and counsel for the Manager, will rely upon the accuracy and truthfulness of the foregoing representations and hereby consents to such reliance.

Appears in 1 contract

Samples: Terms Agreement (Senseonics Holdings, Inc.)

Cybersecurity. (A) (i) The Company Except as may be included or incorporated by reference in the Registration Statement, the Time of Sale Prospectus and each of its Subsidiaries have materially complied and are presently in the Prospectus, (x) to the Company’s knowledge, there has been no material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator security breach or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s information technology and its Subsidiaries’ businesses computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, BreachIT Systems and Data). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, ) and (y) the Company and its Subsidiaries have has not been notified of of, and have no knowledge of any event or condition that would reasonably be expected to result in, any material security breach or other material compromise to their IT Systems and Data; (ii) the Company is presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such Breach that wouldIT Systems and Data from unauthorized use, singly access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, result in a Material Adverse Effect; and (iii) the Company has implemented backup and disaster recovery technology consistent with industry standards and practices. Any certificate signed by any officer of the Company or any of its subsidiaries and delivered to any Underwriter or to counsel for the Underwriters in connection with the offering, or the purchase and sale, of the Offered Shares shall be deemed a representation and warranty by the Company to each Underwriter as to the matters covered thereby. The Company has a reasonable basis for making each of the representations set forth in this Section 1. The Company acknowledges that the Underwriters and, for purposes of the opinions to be delivered pursuant to Section 6, counsel to the Company and counsel to the Underwriters, will rely upon the accuracy and truthfulness of the foregoing representations and hereby consents to such reliance.

Appears in 1 contract

Samples: Underwriting Agreement (Cellular Biomedicine Group, Inc.)

Cybersecurity. (A) To the knowledge of the Operating Partnership and the Company, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company, the Operating Partnership or any of their respective subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (iincluding the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company, the Operating Partnership and their respective subsidiaries, and any such data processed or stored by third parties on behalf of the Company, the Operating Partnership and their respective subsidiaries), equipment or technology (collectively, “IT Systems and Data”); (B) the Company, the Operating Partnership, and their respective subsidiaries have no knowledge of any event or condition that would result in, a security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data; and (C) the Company, the Operating Partnership and their respective subsidiaries have implemented commercially reasonable controls, policies, procedures and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data; except with respect to clauses (A) and (B), for any such security breach or incident, unauthorized access or disclosure, or other compromises, as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect or with respect to clause (C), where the failure to do so would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company Company, the Operating Partnership and each of its Subsidiaries have materially complied and their respective subsidiaries are presently in material compliance with all internal applicable laws or statutes and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, all judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, internal policies and any other legal obligations, in each case, contractual obligations relating to the collection, privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, transferaccess, importmisappropriation or modification, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts thatexcept where failure to be so in compliance would not, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in have a Material Adverse Effect.

Appears in 1 contract

Samples: Underwriting Agreement (Retail Opportunity Investments Partnership, LP)

Cybersecurity. (A) To the knowledge of the Company and except as described in the Registration Statement, the Pricing Disclosure Package and the Prospectus, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of the Company’s or its subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (iincluding the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its subsidiaries), equipment or technology (collectively, “IT Systems and Data”), except for any such security breach or incident, unauthorized access or disclosure, or other compromise of the Company’s or its subsidiaries’ IT Systems and Data that would not, individually or in the aggregate, have a Material Adverse Effect; (B) to the knowledge of the Company, neither the Company nor its subsidiaries have been notified of, and have no knowledge of any event or condition that would result in, any material security breach or incident, unauthorized access or disclosure or other compromise of the Company’s or its subsidiaries’ IT Systems and Data and (C) the Company and its subsidiaries have implemented commercially reasonable controls, policies, procedures and technological safeguards to maintain and protect the integrity, operation, redundancy and security of their IT Systems and Data to be used in connection with the Company’s method of operation set forth in the Registration Statement, the General Disclosure Package and the Final Prospectus, except where failure to do so would not, individually or in the aggregate, have a Material Adverse Effect. The Company and each of its Subsidiaries have materially complied and subsidiaries are presently in material compliance with all internal applicable laws and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, statutes and all judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, internal policies and any other legal obligations, in each case, contractual obligations relating to the collection, privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, transferaccess, importmisappropriation or modification, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts thatexcept where failure to be so in compliance would not, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effect.

Appears in 1 contract

Samples: Underwriting Agreement (Athenex, Inc.)

Cybersecurity. Except as disclosed in the Registration Statement and the Prospectus, (Aa) (i) The Company and each of its Subsidiaries have materially complied and are presently in there has been no security breach or other material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations compromise of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s information technology and computer systems, networks, hardware, software, sensitive data (including the sensitive or proprietary data of its Subsidiaries’ businesses (“Breach”). To the knowledge customers, employees, suppliers, and vendors maintained by or on behalf of the Company), there has been no such Breach that wouldequipment or technology (collectively, singly or in the aggregate, result in a Material Adverse Effect, “IT Systems and Data”) and (b) the Company and its Subsidiaries have has not been notified of of, and have has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other material compromise to its IT Systems and Data. Neither the Company, nor any of their respective officers, directors and employees, nor any of their respective agents, contractors or licensees (if any), nor any of their respective business operations, is in violation of any applicable privacy or cybersecurity laws. The Company has complied and is presently in compliance with all internal policies and contractual obligations relating to (a) the privacy and security of IT Systems and Data and (b) the implementation of commercially reasonable measures to protect such Breach that wouldIT Systems and Data from unauthorized use, singly access, misappropriation or modification, except as would not, in the case of this clause, individually or in the aggregate, result in have a Material Adverse Effect. The Company has implemented backup and disaster recovery technology consistent with industry standards and practices. The Company has also operated its business in a manner compliant with all other privacy, data security and data protection laws, regulations, and industry standards applicable to the Company’s collection, use, transfer, protection, disposal, disclosure, handling, storage and analysis of its personal data. The Company has implemented an information security program that (a) identifies internal and external risks to the security of the IT Systems and Data, including any personally identifiable information; (b) implements, monitors and improves adequate and effective administrative, electronic and physical safeguards to control those risks and safeguard the security, confidentiality, integrity and availability of IT Systems and Data; (c) protects against unauthorized access to Company systems and IT Systems and Data (including on the systems of third parties with access to such Company systems or IT Systems and Data); (d) maintains notification procedures in the case of any breach of security compromising data containing personally identifiable information; and (e) prohibits any unauthorized access of any non-Company systems.

Appears in 1 contract

Samples: Sales Agreement (BICYCLE THERAPEUTICS PLC)

Cybersecurity. (A) (i) The Company Transaction Entities and each of its the Subsidiaries have materially complied and are presently in material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company Transaction Entities or any of its the Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) none of the Company Transaction Entities or any of its the Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the CompanyTransaction Entities, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company Transaction Entities and its the Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s Transaction Entities’ and its the Subsidiaries’ businesses (“Breach”). To the knowledge of the CompanyTransaction Entities, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company Transaction Entities and its the Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effect.

Appears in 1 contract

Samples: Management Agreement (PennyMac Mortgage Investment Trust)

Cybersecurity. (A) To the knowledge of the Company, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of the Company’s or its Subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (iincluding the data and information of their respective tenants, customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its Subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its Subsidiaries), equipment or technology (collectively, “IT Systems and Data”), except for any such security breach or incident, unauthorized access or disclosure, or other compromise of the Company’s or its Subsidiaries’ IT Systems and Data that would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect: (B) the knowledge of the Company, neither the Company nor its Subsidiaries have been notified in writing of, and have no knowledge of any event or condition that would result in, any material security breach or incident, unauthorized access or disclosure or other compromise of the Company’s or its Subsidiaries’ IT Systems and Data and (C) the Company and its Subsidiaries have implemented commercially reasonable controls, policies, procedures, and technological safeguards to maintain and protect the integrity, operation, redundancy and security of their IT Systems and Data used in connection with the business of the Company and its Subsidiaries as currently conducted. The Company and each of its Subsidiaries have materially complied and are presently in material compliance with all internal applicable laws and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, statutes and all judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, contractual obligations relating to the collection, privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, transferaccess, importmisappropriation or modification, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has except where failure to be so in compliance would not received any notification of or complaint regarding and is unaware of any other facts thatbe expected, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effect.

Appears in 1 contract

Samples: Sales Agreement (National Storage Affiliates Trust)

Cybersecurity. To the knowledge of the Company, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company or its Subsidiaries information technology and computer systems, networks, hardware, software, data and databases (Aincluding the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its Subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its Subsidiaries), equipment or technology (collectively, “IT Systems and Data”) (i) that, individually or in the aggregate, would reasonably be expected to have a Material Adverse Effect. Neither the Company nor its Subsidiaries have been notified in writing of, and, to the Company’s knowledge, there is no presently existing event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data that, individually or in the aggregate, would reasonably be expected to have a Material Adverse Effect. The Company and each of its Subsidiaries have materially complied implemented appropriate controls, policies, procedures, and technological safeguards reasonably designed to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data in compliance in all material respects with applicable law. The Company and its Subsidiaries are presently in compliance in all material compliance respects with all internal applicable laws or statutes and external privacy policies, contractual obligations, industry standards, all applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority authority, internal policies and any other legal obligations, in each case, applicable contractual obligations relating to the collection, privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, transferaccess, importmisappropriation or modification, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and except for such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts thatnoncompliance as would not, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach that would, singly or in the aggregate, result in have a Material Adverse Effect.

Appears in 1 contract

Samples: Exchange Agreement (Teligent, Inc.)

Cybersecurity. Except as could not be expected, individually or in the aggregate, to have a Material Adverse Effect, (A) there has been no security breach or incident, unauthorized access or disclosure, or other compromise relating to the Company’s or its Subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (iincluding the personal data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its Subsidiaries), equipment or technology (collectively, “IT Systems and Data”); (B) neither the Company nor its Subsidiaries have actual knowledge of any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data or to any data processed or stored by third parties on behalf of the Company and its Subsidiaries and (C) the Company and its Subsidiaries have implemented commercially reasonable controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data. The Company and each of its Subsidiaries have materially complied and are presently in material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, all judgments and orders specifically directed to the Company or its Subsidiaries and all rules and regulations of any court or arbitrator or other governmental or regulatory authority having jurisdiction over the Company or its Subsidiaries, and any other legal obligations, in each case, internal policies relating to the collectionprivacy and security of IT Systems and Data. Any certificate signed by any officer of the Company, usethe Operating Partnership or any of the Company’s Subsidiaries and delivered to any Underwriter or to counsel for the Underwriters in connection with the offering, transferor the purchase and sale, import, export, storage, protection, disposal of the Shares shall be deemed a representation and disclosure warranty by the Company or any of its Subsidiaries of personalthe Operating Partnership, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending oras applicable, to each Underwriter as to the knowledge matters covered thereby. Each of the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the knowledge of the Company, there has been no such Breach that would, singly or in the aggregate, result in a Material Adverse Effect, and the Company and its Subsidiaries have not been notified the Operating Partnership acknowledges that the Underwriters and, for purposes of the opinions to be delivered pursuant to Section 6 hereof, counsel to the Company and have no knowledge the Operating Partnership and counsel to the Underwriters, will rely upon the accuracy and truthfulness of any event or condition that would reasonably be expected the foregoing representations and hereby consents to result in, any such Breach that would, singly or in the aggregate, result in a Material Adverse Effectreliance.

Appears in 1 contract

Samples: Underwriting Agreement (Gladstone Commercial Corp)

Cybersecurity. (AA)(I) (i) The Company and each of its Subsidiaries have materially complied and are presently in material compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company or any of its Subsidiaries has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate material non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of To the Company, threatened alleging non-compliance with any Data Security Obligation that would, singly ’s knowledge there has been no material security breach or in the aggregate, result in a Material Adverse Effect. (B) The Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, lossincident, unauthorized distribution, use, access, disablement, misappropriation access or modificationdisclosure, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and its Subsidiariessubsidiariesbusinesses information technology assets and computer systems, networks, hardware, software, data and databases (“Breach”). To including the knowledge data and information of the Companytheir respective customers, there has been no such Breach that wouldemployees, singly suppliers, vendors and any third party data maintained, processed or in the aggregate, result in a Material Adverse Effect, and stored by the Company and its Subsidiaries subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its subsidiaries) (collectively, “IT Systems and Data”) and (II) the Company and its subsidiaries have not been notified of of, and have no knowledge of any event or condition that would reasonably be expected to result in, any material security breach or incident, unauthorized access or disclosure or other compromise to or of their IT Systems and Data; (B) to the Company’s knowledge, the Company and its subsidiaries are presently in material compliance with all applicable laws, statutes and regulations (including, if applicable, the European Union General Data Protection Regulation) and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such Breach IT Systems and Data from unauthorized use, access, misappropriation or modification to the extent that would, singly or in any noncompliance with any of the aggregate, foregoing would not result in a Material Adverse EffectChange to the business of the Company and its subsidiaries; and (C) the Company and its subsidiaries have implemented reasonable controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with applicable regulatory standards. Any certificate signed by an officer of the Company and delivered to the Underwriters or to counsel for the Underwriters shall be deemed to be a representation and warranty by the Company to each Underwriter as to the matters set forth therein.

Appears in 1 contract

Samples: Underwriting Agreement (PGT Innovations, Inc.)

Time is Money Join Law Insider Premium to draft better contracts faster.