IT Assets Clause Samples

POPULAR SAMPLE Copied 5 times
IT Assets. Except as could not reasonably be expected to have a Material Adverse Effect, (i) the computers, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company or its Subsidiaries (excluding any public networks) (collectively, the “IT Assets”) operate and perform as is necessary for the operation of the business of the Company and its Subsidiaries as currently conducted and as proposed to be conducted as described in the Registration Statement, the Pricing Disclosure Package and the Prospectus, and (ii) to the knowledge of the Company, such IT Assets are not infected by viruses, disabling code or other harmful code. The Company and its Subsidiaries have at all times implemented and maintained all industry standard controls, policies, procedures, and safeguards to maintain and protect their confidential information and the integrity, continuous operation, redundancy and security of all IT Assets and data (including all Personal Data (defined below) sensitive, confidential or regulated data used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same.
IT Assets. Except as could not reasonably be expected to have a Material Adverse Effect, (i) the computers, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company or its subsidiaries (excluding any public networks) (collectively, the “IT Assets”) operate and perform as is reasonably necessary for the operation of the business of the Company and its subsidiaries as currently conducted and as proposed to be conducted as described in the Registration Statement, the Pricing Disclosure Package and the Prospectus, and (ii) to the Company’s knowledge such IT Assets are not infected by viruses, disabling code or other harmful code.
IT Assets. To the Company’s knowledge, the information technology systems, equipment and software used by the Company or any of its Subsidiaries in their respective businesses (the “IT Assets”) (a) operate and perform in all material respects in accordance with their documentation and functional specifications and otherwise as required by the Company’s and its Subsidiaries’ respective businesses as currently conducted, (b) have not materially malfunctioned or failed since the Company’s inception and (c) are free of any viruses, “back doors,” “Trojan horses,” “time bombs, “worms,” “drop dead devices” or other software or hardware components that are designed to interrupt use of, permit unauthorized access to, or disable, damage or erase, any software material to the business of the Company or any of its Subsidiaries. The Company and its Subsidiaries have implemented commercially reasonable backup and disaster recovery technology processes consistent with industry standard practices. To the Company’s knowledge, no person or entity has gained unauthorized access to any IT Asset since the Company’s inception in a manner that has resulted or could reasonably be expected to result in a Material Adverse Change.
IT Assets. Except as would not reasonably be expected to have, individually or in the aggregate, a Material Adverse Effect on Cigna: (i) the IT Assets are reasonably sufficient for the operation of the business of Cigna and its Subsidiaries as currently conducted; (ii) the IT Assets of Cigna and its Subsidiaries are maintained, operate and perform in accordance with their documentation and functional specifications or otherwise as required by Cigna and its Subsidiaries in connection with Cigna’s business; (iii) there are no development, migration, integration or implementation projects concerning IT Assets currently being conducted by Cigna or its Subsidiaries; (iv) to Cigna’s Knowledge, such IT Assets do not contain any “time bombs,” “Trojan horses,” “back doors,” “trap doors,” “worms,” viruses, bugs, faults, devices or elements that (A) enable or assist any Person to access without authorization such IT Assets or (B) otherwise materially adversely affect the functionality of such IT Assets; (v) Cigna and each of its Subsidiaries have implemented reasonable backup and disaster recovery technology consistent with industry practices; (vi) to the Knowledge of Cigna, no Person has gained unauthorized access to such IT Assets or the data stored or processed by the IT Assets; and (vii) since January 1, 2013, there has been no failure, breakdown or continued substandard performance of any IT Assets that has caused a disruption or interruption in or to the use of such IT Assets or the operation of the business of Cigna or its Subsidiaries.
IT Assets. Except as could not reasonably be expected to have a Material Adverse Effect (i) the computers, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company (excluding any public networks) (collectively, the “IT Assets”) operate and perform as is necessary for the operation of the business of the Company as currently conducted and as proposed to be conducted as described in the Registration Statement, the Pricing Disclosure Package and the Prospectus, and (ii) such IT Assets are not infected by viruses, disabling code or other harmful code. The Company have implemented and maintained all reasonably necessary controls, policies, procedures, and safeguards to maintain and protect their confidential information and the integrity, continuous operation, redundancy and security of all IT Assets and data (including all Personal Data (defined below) that is sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same.
IT Assets. The IT Assets owned by Geely and its Subsidiaries, licensed to Geely and its Subsidiaries, pursuant to valid and enforceable license agreements, or otherwise used for the benefit of Geely and its Subsidiaries (including Geely Software) (collectively, the “Geely IT Systems”) are sufficient for the present operation of the core business of Geely and its Subsidiaries as currently conducted. The Geely IT Systems are free from material bugs or other material defects and, to the knowledge of Geely, do not contain any viruses which, individually or in the aggregate, have a Geely Material Adverse Effect. Geely and its Subsidiaries have implemented reasonable backup, security and disaster recovery measures and technology to protect the confidentiality, integrity and security of such Geely IT Systems (and all information and transactions stored or contained therein or transmitted thereby) against any unauthorized use, access, interruption, modification or corruption, at a level that is substantially equivalent to reputable industry practices. To the knowledge of Geely, (i) there have been no security breaches in the Geely IT Systems owned by Geely or its Subsidiaries and the Geely IT Systems owned by third parties to the extent used by or on behalf of Geely or its Subsidiaries and (ii) there have been no disruptions in any Geely IT Systems that have adversely affected the core business of Geely or its Subsidiaries as currently conducted.
IT Assets. Except as could not reasonably be expected to have a Material Adverse Effect (i) the computers, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company or its subsidiaries (excluding any public networks) (collectively, the “IT Assets”) operate and perform as is necessary for the operation of the business of the Company and its subsidiaries as currently conducted and as proposed to be conducted as described in the Registration Statement, the Pricing Disclosure Package and the Prospectus, and (ii) such IT Assets are not infected by viruses, disabling code or other harmful code. The Company and its subsidiaries have implemented and maintained all reasonably necessary controls, policies, procedures, and safeguards to maintain and protect their confidential information and the integrity, continuous operation, redundancy and security of all IT Assets and data (including all Personal Data (defined below) that is sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same.
IT Assets. The IT Assets owned by or licensed, pursuant to valid and enforceable license agreements, to Company T and its Subsidiaries (including Company T Software) are sufficient for the present operation of the business of Company T and its Subsidiaries. The IT Assets owned by or licensed to Company T or its Subsidiaries are free from material bugs or other defects and, to the knowledge of Company T, do not contain any viruses. Company T and its Subsidiaries have implemented reasonable backup, security and disaster recovery measures and technology at a level that is not below reputable industry practices.
IT Assets. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (i) the computers, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company or its subsidiaries (excluding any public networks) (collectively, the “IT Assets”) operate and perform as is necessary for the operation of the business of the Company and its subsidiaries as currently conducted and as proposed to be conducted as described in the Registration Statement, the Pricing Disclosure Package and the Prospectus, and (ii) such IT Assets are not infected by viruses, disabling code or other harmful code. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards necessary to maintain and protect their confidential information and the integrity, continuous operation, redundancy and security of all IT Assets and data (including all Personal Data (defined below) sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses. Except as disclosed in the Registration Statement, the Pricing Disclosure Package and the Prospectus, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. Except as disclosed in the Registration Statement, the Pricing Disclosure Package and the Prospectus, the Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Confidential Data and to the protection of such IT Assets and Confidential Data from unauthorized use, access, misappropriation or modification. “Personal Data” means “personal data” as defined by GDPR (as defined below).
IT Assets. The IT Assets owned by or licensed, pursuant to valid and enforceable license agreements, to the China Online Companies (including the China Online Software) are adequate for, and operate and perform in all material respects in accordance with their documentation and functional specifications and otherwise as required in connection with, the operation of the China Online Business. To the knowledge of SINA, the IT Assets owned by or licensed to China Online are free from material bugs or other defects and do not contain any viruses. The China Online Companies have implemented reasonable backup, security and disaster recovery measures and technology consistent with industry practices, and, to the knowledge of SINA and except as has not had or would not have a material impact on the China Online Companies or the China Online Business, no Person has gained unauthorized access to any IT Assets owned or licensed by the China Online Companies. CRIC acknowledges that in the event of a conflict between the representations and warranties contained in this Section 3.14 and any other representation or warranty contained in this Agreement with respect to Intellectual Property, including infringement, misappropriation or other violation of Intellectual Property the representations and warranties contained in this this Section 3.14 shall govern.