{"component": "clause", "props": {"groups": [{"snippet": "The following applies to all contracts for information technology commodities and contractual services. \u201cInformation technology\u201d is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.", "size": 309, "samples": [{"hash": "3UtyLE2Thyu", "uri": "/contracts/3UtyLE2Thyu#information-technology", "label": "Information Technology Staff Augmentation Services Contract", "score": 31.7222690582, "published": true}, {"hash": "7VMgeeRzGdX", "uri": "/contracts/7VMgeeRzGdX#information-technology", "label": "Contract for Information Technology Staff Augmentation Services", "score": 31.5918102264, "published": true}, {"hash": "86QmfZwZHNW", "uri": "/contracts/86QmfZwZHNW#information-technology", "label": "Contract for Tires, Tubes and Services", "score": 30.8007907867, "published": true}], "snippet_links": [{"key": "applies-to", "type": "clause", "offset": [14, 24]}, {"key": "for-information", "type": "clause", "offset": [39, 54]}, {"key": "contractual-services", "type": "definition", "offset": [82, 102]}, {"key": "defined-in-section", "type": "clause", "offset": [132, 150]}, {"key": "same-meaning", "type": "clause", "offset": [182, 194]}], "hash": "c3b910b57731a01e8dfdc4956257460e", "id": 1}, {"snippet": "The Company\u2019s, the Subsidiaries\u2019 information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, \u201cIT Systems\u201d) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company, the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (\u201cPersonal Data\u201d) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except as would not reasonably be expected to have a Material Adverse Effect. The Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices, and are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not reasonably be expected to have a Material Adverse Effect.", "size": 38, "samples": [{"hash": "c2IkIcUPP7I", "uri": "/contracts/c2IkIcUPP7I#information-technology", "label": "Securities Purchase Agreement (CNS Pharmaceuticals, Inc.)", "score": 37.3367538452, "published": true}, {"hash": "JQgmVkyu9X", "uri": "/contracts/JQgmVkyu9X#information-technology", "label": "Securities Purchase Agreement (Scinai Immunotherapeutics Ltd.)", "score": 37.3175888062, "published": true}, {"hash": "27WNS8PeMPI", "uri": "/contracts/27WNS8PeMPI#information-technology", "label": "Securities Purchase Agreement (Tian Ruixiang Holdings LTD)", "score": 37.0958251953, "published": true}], "snippet_links": [{"key": "assets-and-equipment", "type": "clause", "offset": [56, 76]}, {"key": "in-all-material-respects", "type": "definition", "offset": [215, 239]}, {"key": "as-required", "type": "clause", "offset": [240, 251]}, {"key": "in-connection-with", "type": "clause", "offset": [252, 270]}, {"key": "business-of-the-company-and-the-subsidiaries", "type": "clause", "offset": [292, 336]}, {"key": "reasonable-controls", "type": "definition", "offset": [413, 432]}, {"key": "to-maintain", "type": "clause", "offset": [471, 482]}, {"key": "confidential-information-and", "type": "clause", "offset": [510, 538]}, {"key": "continuous-operation", "type": "definition", "offset": [554, 574]}, {"key": "personally-identifiable", "type": "definition", "offset": [636, 659]}, {"key": "regulated-data", "type": "clause", "offset": [688, 702]}, {"key": "knowledge-of-the-company", "type": "clause", "offset": [762, 786]}, {"key": "no-breaches", "type": "clause", "offset": [804, 815]}, {"key": "unauthorized-uses", "type": "clause", "offset": [864, 881]}, {"key": "material-adverse-effect", "type": "clause", "offset": [959, 982]}, {"key": "backup-and-disaster-recovery", "type": "clause", "offset": [1034, 1062]}, {"key": "consistent-with", "type": "clause", "offset": [1074, 1089]}, {"key": "standards-and-practices", "type": "clause", "offset": [1099, 1122]}, {"key": "in-compliance", "type": "definition", "offset": [1142, 1155]}, {"key": "all-applicable-laws", "type": "definition", "offset": [1186, 1205]}, {"key": "rules-and-regulations", "type": "definition", "offset": [1256, 1277]}, {"key": "governmental-or-regulatory-authority", "type": "definition", "offset": [1308, 1344]}, {"key": "internal-policies", "type": "definition", "offset": [1346, 1363]}, {"key": "obligations-relating-to-the", "type": "clause", "offset": [1380, 1407]}, {"key": "it-systems-and-personal-data", "type": "clause", "offset": [1432, 1460]}, {"key": "protection-of", "type": "clause", "offset": [1472, 1485]}], "hash": "02d74d2cee50eb94b19bcb2ffdef8eba", "id": 5}, {"snippet": "21.1 The definitions in this paragraph apply in this agreement.", "size": 20, "samples": [{"hash": "3z5xv6OX89O", "uri": "/contracts/3z5xv6OX89O#information-technology", "label": "Share Purchase Agreement (Global Traffic Network, Inc.)", "score": 19.0, "published": true}, {"hash": "N52lc1u74U", "uri": "/contracts/N52lc1u74U#information-technology", "label": "Share Purchase Agreement (Emrise CORP)", "score": 18.0, "published": true}, {"hash": "93NoUmo3Dg7", "uri": "/contracts/93NoUmo3Dg7#information-technology", "label": "Share Purchase Agreement (Netsol Technologies Inc)", "score": 18.0, "published": true}], "snippet_links": [{"key": "the-definitions", "type": "definition", "offset": [5, 20]}, {"key": "in-this-agreement", "type": "definition", "offset": [45, 62]}], "hash": "0e16e6460729bd90b1173c5052505de6", "id": 7}, {"snippet": "The Company\u2019s and the Subsidiaries\u2019 information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, \u201cIT Systems\u201d) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company and the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (\u201cPersonal Data\u201d) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and the Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.", "size": 93, "samples": [{"hash": "lmZ5WQYEdAX", "uri": "/contracts/lmZ5WQYEdAX#information-technology", "label": "Securities Purchase Agreement (Haoxi Health Technology LTD)", "score": 37.3613963039, "published": true}, {"hash": "krlrlSTqPKZ", "uri": "/contracts/krlrlSTqPKZ#information-technology", "label": "Securities Purchase Agreement (UTime LTD)", "score": 37.3367538452, "published": true}, {"hash": "dByEvKnQ8Qn", "uri": "/contracts/dByEvKnQ8Qn#information-technology", "label": "Securities Purchase Agreement (Turbo Energy, S.A.)", "score": 37.1943855286, "published": true}], "snippet_links": [{"key": "assets-and-equipment", "type": "clause", "offset": [59, 79]}, {"key": "in-all-material-respects", "type": "definition", "offset": [218, 242]}, {"key": "as-required", "type": "clause", "offset": [243, 254]}, {"key": "in-connection-with", "type": "clause", "offset": [255, 273]}, {"key": "business-of-the-company-and-the-subsidiaries", "type": "clause", "offset": [295, 339]}, {"key": "reasonable-controls", "type": "definition", "offset": [419, 438]}, {"key": "to-maintain", "type": "clause", "offset": [477, 488]}, {"key": "confidential-information-and", "type": "clause", "offset": [516, 544]}, {"key": "continuous-operation", "type": "definition", "offset": [560, 580]}, {"key": "personally-identifiable", "type": "definition", "offset": [642, 665]}, {"key": "regulated-data", "type": "clause", "offset": [694, 708]}, {"key": "knowledge-of-the-company", "type": "clause", "offset": [768, 792]}, {"key": "no-breaches", "type": "clause", "offset": [810, 821]}, {"key": "unauthorized-uses", "type": "clause", "offset": [870, 887]}, {"key": "material-cost", "type": "clause", "offset": [961, 974]}, {"key": "duty-to-notify", "type": "definition", "offset": [995, 1009]}, {"key": "any-other-person", "type": "definition", "offset": [1010, 1026]}, {"key": "internal-review", "type": "definition", "offset": [1052, 1067]}, {"key": "in-compliance", "type": "definition", "offset": [1155, 1168]}, {"key": "all-applicable-laws", "type": "definition", "offset": [1199, 1218]}, {"key": "rules-and-regulations", "type": "definition", "offset": [1269, 1290]}, {"key": "governmental-or-regulatory-authority", "type": "definition", "offset": [1321, 1357]}, {"key": "internal-policies", "type": "definition", "offset": [1359, 1376]}, {"key": "obligations-relating-to-the", "type": "clause", "offset": [1393, 1420]}, {"key": "it-systems-and-personal-data", "type": "clause", "offset": [1445, 1473]}, {"key": "protection-of", "type": "clause", "offset": [1485, 1498]}, {"key": "material-adverse-effect", "type": "clause", "offset": [1654, 1677]}], "hash": "75910002720752e4ae3a1274abc9229c", "id": 2}, {"snippet": "All information technology acquisitions shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of Standards and Technology\u2019s website at \u2587\u2587\u2587\u2587://\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587 commensurate with the mission of the subcontract and conducive to the research and development efforts of the ORNL.", "size": 49, "samples": [{"hash": "aMdhTbJSZJJ", "uri": "/contracts/aMdhTbJSZJJ#information-technology", "label": "Purchase Order", "score": 32.1845436096, "published": true}, {"hash": "g81tQ7dO41u", "uri": "/contracts/g81tQ7dO41u#information-technology", "label": "General Terms & Conditions", "score": 27.7322025299, "published": true}, {"hash": "cLYWLWYXl5H", "uri": "/contracts/cLYWLWYXl5H#information-technology", "label": "Purchase Order", "score": 25.9075965881, "published": true}], "snippet_links": [{"key": "all-information", "type": "clause", "offset": [0, 15]}, {"key": "policies-and-requirements", "type": "clause", "offset": [102, 127]}, {"key": "common-security-configurations", "type": "clause", "offset": [146, 176]}, {"key": "national-institute-of-standards-and-technology", "type": "definition", "offset": [196, 242]}, {"key": "the-mission", "type": "clause", "offset": [301, 312]}, {"key": "research-and-development-efforts", "type": "clause", "offset": [353, 385]}], "hash": "e3c4fc8cf684546409767fa2af7e6d44", "id": 3}, {"snippet": "The Company\u2019s, the Subsidiaries\u2019 and, to the knowledge of the Company, the Related Parties\u2019 information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, \u201cIT Systems\u201d) operate and perform in all material respects as required in connection with the operation of the business of the Company, the Subsidiaries and the Related Entities as currently conducted. The Company, the Subsidiaries and, to the knowledge of the Company, the Related Parties maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (\u201cPersonal Data\u201d) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company, the Subsidiaries and, to the knowledge of the Company, the Related Parties are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.", "size": 32, "samples": [{"hash": "5xRJR0YeHBJ", "uri": "/contracts/5xRJR0YeHBJ#information-technology", "label": "Securities Purchase Agreement (Genprex, Inc.)", "score": 36.8247756958, "published": true}, {"hash": "ktCZEwG5mNu", "uri": "/contracts/ktCZEwG5mNu#information-technology", "label": "Securities Purchase Agreement (Genprex, Inc.)", "score": 36.811088562, "published": true}, {"hash": "2GmLde8VrM9", "uri": "/contracts/2GmLde8VrM9#information-technology", "label": "Securities Purchase Agreement (Genprex, Inc.)", "score": 35.2149200439, "published": true}], "snippet_links": [{"key": "the-subsidiaries", "type": "clause", "offset": [15, 31]}, {"key": "knowledge-of-the-company", "type": "clause", "offset": [45, 69]}, {"key": "related-parties", "type": "definition", "offset": [75, 90]}, {"key": "assets-and-equipment", "type": "clause", "offset": [115, 135]}, {"key": "in-all-material-respects", "type": "definition", "offset": [274, 298]}, {"key": "as-required", "type": "clause", "offset": [299, 310]}, {"key": "in-connection-with", "type": "clause", "offset": [311, 329]}, {"key": "operation-of-the-business-of-the-company", "type": "clause", "offset": [334, 374]}, {"key": "related-entities", "type": "clause", "offset": [401, 417]}, {"key": "reasonable-controls", "type": "definition", "offset": [552, 571]}, {"key": "to-maintain", "type": "clause", "offset": [610, 621]}, {"key": "confidential-information-and", "type": "clause", "offset": [649, 677]}, {"key": "continuous-operation", "type": "definition", "offset": [693, 713]}, {"key": "personally-identifiable", "type": "definition", "offset": [775, 798]}, {"key": "regulated-data", "type": "clause", "offset": [827, 841]}, {"key": "no-breaches", "type": "clause", "offset": [943, 954]}, {"key": "unauthorized-uses", "type": "clause", "offset": [1003, 1020]}, {"key": "material-cost", "type": "clause", "offset": [1094, 1107]}, {"key": "duty-to-notify", "type": "definition", "offset": [1128, 1142]}, {"key": "any-other-person", "type": "definition", "offset": [1143, 1159]}, {"key": "internal-review", "type": "definition", "offset": [1185, 1200]}, {"key": "parties-are", "type": "clause", "offset": [1321, 1332]}, {"key": "in-compliance", "type": "definition", "offset": [1343, 1356]}, {"key": "all-applicable-laws", "type": "definition", "offset": [1387, 1406]}, {"key": "rules-and-regulations", "type": "definition", "offset": [1457, 1478]}, {"key": "governmental-or-regulatory-authority", "type": "definition", "offset": [1509, 1545]}, {"key": "internal-policies", "type": "definition", "offset": [1547, 1564]}, {"key": "obligations-relating-to-the", "type": "clause", "offset": [1581, 1608]}, {"key": "it-systems-and-personal-data", "type": "clause", "offset": [1633, 1661]}, {"key": "protection-of", "type": "clause", "offset": [1673, 1686]}, {"key": "material-adverse-effect", "type": "clause", "offset": [1842, 1865]}], "hash": "3eb9bf10dbe75f29e2eb359d4e963579", "id": 6}, {"snippet": "The Company\u2019s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, \u201cIT Systems\u201d) are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, except where such failure to operate and perform would not reasonably be expected to result in a Material Adverse Change, and to the knowledge of the Company are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (\u201cPersonal Data\u201d)) used in connection with their businesses, and except as would not, individually or in the aggregate, result in a Material Adverse Change, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not result in a Material Adverse Change. The disclosures in the Registration Statement and the Prospectus concerning the effects of federal, state, local and all foreign regulation on the Company\u2019s business in the past and as currently contemplated are correct in all material respects and no other such regulations are required to be disclosed in the Registration Statement and the Prospectus which are not so disclosed.", "size": 45, "samples": [{"hash": "8zOiuMi1Abi", "uri": "/contracts/8zOiuMi1Abi#information-technology", "label": "Sales Agreement (LQR House Inc.)", "score": 37.1916503906, "published": true}, {"hash": "cdcz5lRwbGO", "uri": "/contracts/cdcz5lRwbGO#information-technology", "label": "Sales Agreement (Upexi, Inc.)", "score": 37.0930862427, "published": true}, {"hash": "3mPqYzli1xe", "uri": "/contracts/3mPqYzli1xe#information-technology", "label": "Sales Agreement (FingerMotion, Inc.)", "score": 36.8083496094, "published": true}], "snippet_links": [{"key": "assets-and-equipment", "type": "clause", "offset": [37, 57]}, {"key": "in-all-material-respects", "type": "definition", "offset": [218, 242]}, {"key": "as-required", "type": "clause", "offset": [243, 254]}, {"key": "in-connection-with", "type": "clause", "offset": [255, 273]}, {"key": "operation-of-the-business-of-the-company", "type": "clause", "offset": [279, 319]}, {"key": "failure-to-operate", "type": "definition", "offset": [362, 380]}, {"key": "a-material-adverse-change", "type": "clause", "offset": [439, 464]}, {"key": "knowledge-of-the-company", "type": "clause", "offset": [477, 501]}, {"key": "free-and-clear", "type": "definition", "offset": [506, 520]}, {"key": "the-company-has", "type": "clause", "offset": [618, 633]}, {"key": "reasonable-controls", "type": "definition", "offset": [674, 693]}, {"key": "to-maintain", "type": "clause", "offset": [732, 743]}, {"key": "confidential-information-and", "type": "clause", "offset": [771, 799]}, {"key": "continuous-operation", "type": "definition", "offset": [815, 835]}, {"key": "it-systems-and-data", "type": "definition", "offset": [868, 887]}, {"key": "personally-identifiable", "type": "definition", "offset": [913, 936]}, {"key": "regulated-data", "type": "clause", "offset": [965, 979]}, {"key": "in-the-aggregate", "type": "definition", "offset": [1082, 1098]}, {"key": "no-breaches", "type": "clause", "offset": [1153, 1164]}, {"key": "unauthorized-uses", "type": "clause", "offset": [1189, 1206]}, {"key": "material-cost", "type": "clause", "offset": [1280, 1293]}, {"key": "duty-to-notify", "type": "definition", "offset": [1314, 1328]}, {"key": "any-other-person", "type": "definition", "offset": [1329, 1345]}, {"key": "internal-review", "type": "definition", "offset": [1371, 1386]}, {"key": "in-compliance", "type": "definition", "offset": [1452, 1465]}, {"key": "all-applicable-laws", "type": "definition", "offset": [1496, 1515]}, {"key": "rules-and-regulations", "type": "definition", "offset": [1566, 1587]}, {"key": "governmental-or-regulatory-authority", "type": "definition", "offset": [1618, 1654]}, {"key": "internal-policies", "type": "definition", "offset": [1656, 1673]}, {"key": "obligations-relating-to-the", "type": "clause", "offset": [1690, 1717]}, {"key": "it-systems-and-personal-data", "type": "clause", "offset": [1742, 1770]}, {"key": "protection-of", "type": "clause", "offset": [1782, 1795]}, {"key": "registration-statement-and-the-prospectus", "type": "clause", "offset": [2004, 2045]}, {"key": "concerning-the", "type": "clause", "offset": [2046, 2060]}, {"key": "required-to-be-disclosed", "type": "clause", "offset": [2260, 2284]}], "hash": "51c2c09d9ba71a02def62ab2e07b342c", "id": 4}, {"snippet": "L Brands shall cause each Service Recipient, its employees and any subcontractors to: (a) not attempt to obtain access to or use any information technology systems of any Service Provider Party, or any data owned by any Service Provider Party, or any data used or processed by any Service Provider Party (other than any data of any Service Recipient), except to the extent required to receive the Services; (b) maintain reasonable security measures to protect the systems of each Service Provider Party to which it has access pursuant to this Agreement from access by unauthorized third parties, and any \u201cback door\u201d, \u201ctime bomb\u201d, \u201cTrojan Horse\u201d, \u201cworm\u201d, \u201cdrop dead device\u201d, \u201cvirus\u201d or other computer software routine intended or designed to disrupt, disable, harm or otherwise impede in any manner the operation of such systems; (c) not permit access or use of information technology systems of any Service Provider Party by a third party other than as authorized by prior written consent of Service Provider; (d) not disable, damage or erase or disrupt or impair the normal operation of the information technology systems of any Service Provider Party; and (e) comply with the security policies and procedures of each Service Provider Party (to the extent previously provided to each Service Recipient in writing). Each party hereto shall promptly notify the other party in the event it or any of its respective Affiliates becomes aware of or suspects that there has been a breach of security or a loss, theft or unauthorized access, use or disclosure of any information technology systems (collectively, \u201cIT Breach\u201d) of any Service Provider Party or any Service Recipient to the extent such (i) IT Breach could adversely affect the provision or receipt of the Services hereunder or such other party\u2019s data or Confidential Information or (ii) notice is required by Applicable Law.", "size": 16, "samples": [{"hash": "jG7Ablelrak", "uri": "/contracts/jG7Ablelrak#information-technology", "label": "Transition Services Agreement (Victoria's Secret & Co.)", "score": 32.5865859985, "published": true}, {"hash": "2Qr7Aic3zbe", "uri": "/contracts/2Qr7Aic3zbe#information-technology", "label": "Transition Services Agreement (Bath & Body Works, Inc.)", "score": 32.5865859985, "published": true}, {"hash": "c1p2ZXcJgB5", "uri": "/contracts/c1p2ZXcJgB5#information-technology", "label": "Transition Services Agreement (Victoria's Secret & Co.)", "score": 32.4962348938, "published": true}], "snippet_links": [{"key": "l-brands", "type": "definition", "offset": [0, 8]}, {"key": "service-recipient", "type": "definition", "offset": [26, 43]}, {"key": "access-to", "type": "definition", "offset": [112, 121]}, {"key": "service-provider-party", "type": "definition", "offset": [171, 193]}, {"key": "owned-by", "type": "definition", "offset": [207, 215]}, {"key": "except-to-the-extent", "type": "clause", "offset": [352, 372]}, {"key": "to-receive", "type": "definition", "offset": [382, 392]}, {"key": "the-services", "type": "definition", "offset": [393, 405]}, {"key": "measures-to", "type": "clause", "offset": [440, 451]}, {"key": "the-systems", "type": "clause", "offset": [460, 471]}, {"key": "pursuant-to-this-agreement", "type": "clause", "offset": [526, 552]}, {"key": "third-parties", "type": "definition", "offset": [581, 594]}, {"key": "back-door", "type": "definition", "offset": [605, 614]}, {"key": "trojan-horse", "type": "definition", "offset": [631, 643]}, {"key": "computer-software", "type": "clause", "offset": [691, 708]}, {"key": "the-operation", "type": "clause", "offset": [798, 811]}, {"key": "use-of-information-technology-systems", "type": "clause", "offset": [854, 891]}, {"key": "by-a-third-party", "type": "clause", "offset": [922, 938]}, {"key": "authorized-by", "type": "clause", "offset": [953, 966]}, {"key": "consent-of", "type": "clause", "offset": [981, 991]}, {"key": "the-information", "type": "clause", "offset": [1088, 1103]}, {"key": "security-policies-and-procedures", "type": "clause", "offset": [1178, 1210]}, {"key": "in-writing", "type": "clause", "offset": [1303, 1313]}, {"key": "party-hereto", "type": "definition", "offset": [1321, 1333]}, {"key": "notify-the", "type": "clause", "offset": [1349, 1359]}, {"key": "other-party", "type": "definition", "offset": [1360, 1371]}, {"key": "in-the-event", "type": "clause", "offset": [1372, 1384]}, {"key": "respective-affiliates", "type": "definition", "offset": [1402, 1423]}, {"key": "breach-of-security", "type": "clause", "offset": [1475, 1493]}, {"key": "unauthorized-access", "type": "definition", "offset": [1514, 1533]}, {"key": "disclosure-of", "type": "clause", "offset": [1542, 1555]}, {"key": "adversely-affect", "type": "definition", "offset": [1713, 1729]}, {"key": "receipt-of", "type": "clause", "offset": [1747, 1757]}, {"key": "confidential-information", "type": "clause", "offset": [1811, 1835]}, {"key": "required-by", "type": "definition", "offset": [1854, 1865]}, {"key": "applicable-law", "type": "clause", "offset": [1866, 1880]}], "hash": "62ae33e16604a3d22a292227f9cdab00", "id": 9}, {"snippet": "The Parties shall, to the extent possible, endeavour to use electronic means of communication to permit efficient dissemination of information on government procurement, particularly as regards tender opportunities offered by entities, while respecting the principles of transparency and non-discrimination.", "size": 16, "samples": [{"hash": "ezuuUMwaeSh", "uri": "/contracts/ezuuUMwaeSh#information-technology", "label": "Free Trade Agreement", "score": 33.1840248108, "published": true}, {"hash": "fMb9KUWf9hV", "uri": "/contracts/fMb9KUWf9hV#information-technology", "label": "Free Trade Agreement", "score": 26.9233398438, "published": true}, {"hash": "iRbdTBdRZs9", "uri": "/contracts/iRbdTBdRZs9#information-technology", "label": "Free Trade Agreement", "score": 26.8329906464, "published": true}], "snippet_links": [{"key": "the-parties-shall", "type": "clause", "offset": [0, 17]}, {"key": "to-the-extent", "type": "clause", "offset": [19, 32]}, {"key": "communication-to", "type": "clause", "offset": [80, 96]}, {"key": "information-on", "type": "clause", "offset": [131, 145]}, {"key": "government-procurement", "type": "clause", "offset": [146, 168]}, {"key": "offered-by", "type": "definition", "offset": [215, 225]}, {"key": "the-principles", "type": "clause", "offset": [253, 267]}], "hash": "030f79c776e974248eac9bf92dbd0f7a", "id": 8}, {"snippet": "The Adviser maintains data processing, communications and other technology systems sufficient to provide reasonable assurance that (i) transactions are executed in accordance with management\u2019s general or specific authorizations, (ii) access to assets is permitted only in accordance with management\u2019s general or specific authorization, and (iii) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences. The Adviser has adopted policies and procedures reasonably designed to prevent data breaches and other breaches of applicable privacy laws.", "size": 14, "samples": [{"hash": "fkHT5IbmF1V", "uri": "/contracts/fkHT5IbmF1V#information-technology", "label": "Underwriting Agreement (Great Elm Capital Corp.)", "score": 36.6906242371, "published": true}, {"hash": "a5jODWETlol", "uri": "/contracts/a5jODWETlol#information-technology", "label": "Underwriting Agreement (Great Elm Capital Corp.)", "score": 35.6885681152, "published": true}, {"hash": "hnRgG4tVCyL", "uri": "/contracts/hnRgG4tVCyL#information-technology", "label": "Underwriting Agreement (Great Elm Capital Corp.)", "score": 35.1601638794, "published": true}], "snippet_links": [{"key": "the-adviser", "type": "definition", "offset": [0, 11]}, {"key": "data-processing", "type": "definition", "offset": [22, 37]}, {"key": "technology-systems", "type": "definition", "offset": [64, 82]}, {"key": "to-provide", "type": "clause", "offset": [94, 104]}, {"key": "reasonable-assurance", "type": "clause", "offset": [105, 125]}, {"key": "in-accordance-with", "type": "definition", "offset": [161, 179]}, {"key": "specific-authorizations", "type": "clause", "offset": [204, 227]}, {"key": "access-to-assets", "type": "clause", "offset": [234, 250]}, {"key": "existing-assets", "type": "definition", "offset": [406, 421]}, {"key": "appropriate-action", "type": "definition", "offset": [450, 468]}, {"key": "with-respect-to", "type": "clause", "offset": [478, 493]}, {"key": "policies-and-procedures", "type": "clause", "offset": [535, 558]}, {"key": "data-breaches", "type": "definition", "offset": [590, 603]}, {"key": "other-breaches", "type": "clause", "offset": [608, 622]}, {"key": "applicable-privacy-laws", "type": "definition", "offset": [626, 649]}], "hash": "7a2be20b3cd59c9b0c4255a2efffa144", "id": 10}], "next_curs": "Cl8SWWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjsLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2Ih9pbmZvcm1hdGlvbi10ZWNobm9sb2d5IzAwMDAwMDBhDKIBAmVuGAAgAA==", "clause": {"parents": [["representations-and-warranties-of-the-company", "Representations and Warranties of the Company"], ["representations-and-warranties", "Representations and Warranties"], ["intellectual-property", "Intellectual Property"], ["governing-law-and-jurisdiction", "GOVERNING LAW AND JURISDICTION"], ["miscellaneous", "Miscellaneous"]], "size": 2518, "title": "Information Technology", "children": [["survival", "Survival"], ["data-security", "Data Security"], ["data-confidentiality", "Data Confidentiality"], ["limited-access", "Limited Access"], ["compromised-security", "Compromised Security"]], "id": "information-technology", "related": [["information-technology-accessibility-standards", "Information Technology Accessibility Standards", "<strong>Information Technology</strong> Accessibility Standards"], ["information-technology-enterprise-architecture-requirements", "Information Technology Enterprise Architecture Requirements", "<strong>Information Technology</strong> Enterprise Architecture Requirements"], ["accessibility-of-information-technology", "Accessibility of Information Technology", "Accessibility of <strong>Information Technology</strong>"], ["technology", "Technology", "Technology"], ["information-cooperation", "Information/Cooperation", "Information/Cooperation"]], "related_snippets": [], "updated": "2026-05-15T04:24:17+00:00"}, "json": true, "cursor": ""}}