IT Systems and Data Clause Samples

The IT Systems and Data clause governs the use, management, and protection of information technology systems and data within the scope of an agreement. It typically outlines the responsibilities of each party regarding access to IT infrastructure, data security measures, and compliance with relevant data protection laws. For example, it may specify protocols for handling confidential information, requirements for cybersecurity, or procedures for reporting data breaches. The core function of this clause is to ensure that both parties understand their obligations related to IT systems and data, thereby reducing the risk of data loss, unauthorized access, or legal non-compliance.
POPULAR SAMPLE Copied 2 times
IT Systems and Data. There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), except where such security breach, attack or other compromise would not, individually or in the aggregate, have a Material Adverse Effect, and the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any material security breach, attack or compromise to their IT Systems and Data. The Company has implemented, and requires that its third party vendors implement, adequate policies and commercially reasonable security regarding the collection, use, disclosure, retention, processing, transfer, confidentiality, integrity, and availability of personal data, and business proprietary or sensitive information, in its possession, custody, or control, or held or processed on its behalf and The Company and its subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all internal policies and contractual obligations relating to the privacy and security of IT Systems and Data, except where such noncompliance with such laws, statutes, judgment, order, rule or regulations or internal policies or contractual obligations would not, individually or in the aggregate, have a Material Adverse Effect. Any certificate signed by an officer of the Company and delivered to the Underwriter or to counsel for the Underwriter shall be deemed to be a representation and warranty by the Company to the Underwriter as to the matters set forth therein.
IT Systems and Data. AHR, the Issuer and the Issuer Subsidiaries own or have a valid right to access and use all information technology and computer systems, networks, hardware, software, databases, websites and equipment used to process, store, maintain and operate data, information and functions used in connection with the business of AHR, the Issuer and the Issuer Subsidiaries, including the data of AHR’s, the Issuer’s and the Issuer Subsidiaries’ respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them (collectively with such data, the “IT Systems and Data”). (i) Except as disclosed in both the Pricing Prospectus and the Prospectus, the Issuer and AHR are not aware of any security breach or other compromise of or relating to the IT Systems and Data; (ii) AHR, the Issuer and the Issuer Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data; (iii) AHR, the Issuer and the Issuer Subsidiaries believe they have implemented commercially reasonable backup and disaster recovery technology, including with respect to enabling AHR, the Issuer and the Issuer Subsidiaries to fulfill relevant contractual obligations; (iv) the IT Systems and Data are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of AHR, the Issuer and the Issuer Subsidiaries as currently conducted; and (v) AHR, the Issuer and the Issuer Subsidiaries believe they are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of each of clauses (i)-(v) above, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.
IT Systems and Data. The Company and its Subsidiaries own or have full right to access and use all computer systems, networks, hardware, software, data and databases (including the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its Subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its Subsidiaries), equipment or technology, websites and functions used in connection with the business of the Company and the Subsidiaries (collectively, “IT Systems and Data”). The IT Systems and Data are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company and the Subsidiaries as a whole as currently conducted, except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company and the Subsidiaries have implemented commercially reasonable backup, security and disaster recovery technology consistent in all material respects with applicable regulatory standards and customary industry practices. There has been no material security breach or incident, unauthorized access or disclosure, or other compromise relating to the Company’s or its Subsidiaries’ IT Systems and Data. Neither the Company nor its Subsidiaries have been notified of, and have no knowledge of, any event or condition that would result in, any material security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data. The Company and its Subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification.
IT Systems and Data. With such exceptions as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect: (i) there has been no security breach or other compromise of or relating to any of the Operating Partnership’s, the Company’s or their subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective tenants, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) and (ii) the Operating Partnership, the Company and their subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data.
IT Systems and Data. (i) The Company or its Subsidiaries' information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, "IT Systems and Data") are adequate for, and operate and perform in all respects as required in connection with the operation of the business of the Company and its Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not reasonably be expected to have a Material Adverse Effect; (ii) the Company and its Subsidiaries have implemented and maintain commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability, and there are no material incidents under internal review or investigations relating to the same; (iii) the Company and its Subsidiaries presently comply, and have complied at all times, with all applicable laws, statutes, and industry standards, and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority (including, but not limited to, the European Union General Data Protection Regulation, the Canadian Personal Information Protection and Electronic Documents Act, and the Payment Card Industry Data Security Standard, where applicable), and internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification; and (iv) the Company and its Subsidiaries have entered into data processing agreements compliant in all material respects with all applicable laws relating to the privacy and security of IT Systems and Data with each of its customers, and to the Company's knowledge there is no material non-compliance with the terms of such data processing agreements by such customers.
IT Systems and Data. (i)(x) To the Company’s knowledge, there has been no security breach, attack or other compromise of or relating to any of the Company’s or any of its Subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and its Subsidiaries have not been notified in writing of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data, except as would not, in the case of this clause (i), individually or in the aggregate, have a Material Adverse Effect; (ii) to the Company’s knowledge, the Company and its Subsidiaries have been in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to (x) the privacy and security of IT Systems and Data, (y) the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (z) the collection, use, transfer, storage, disposal and disclosure by the Company and its Subsidiaries of personally identifiable information and/or any other information collected from or provided by third parties, except as would not, in the case of this clause (ii), individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and its Subsidiaries have implemented commercially reasonable backup and disaster recovery and security plans, procedures and facilities for their respective businesses consistent with industry standards and practices; and (iv) the Company and its Subsidiaries have taken commercially reasonable steps to protect the IT Systems and Data.
IT Systems and Data. (i) The Issuer and its subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of the Issuer’s or any subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect, (ii) the Issuer and its subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data, and (iii) the Issuer and its subsidiaries have implemented backup and disaster recovery technology consistent with commercially reasonable industry standards and practices.
IT Systems and Data. Except as would not reasonably be expected, individually or in the aggregate, to have a Material Adverse Effect, since November 1, 2015, to the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology.
IT Systems and Data. The Company and its subsidiariesinformation technology and computer systems, assets, networks, hardware, software, websites, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses. Except as would not reasonably be expected, individually or in the aggregate, to have a Material Adverse Effect, since November 1, 2015, to the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ IT Systems. The Company and its subsidiaries are presently in material compliance with all applicable laws or statues and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
IT Systems and Data. Except as would not reasonably be expected to result in a Material Adverse Effect, (a) there has been no security breach or other material compromise of any of the Company’s information technology and computer systems, networks, hardware, software, sensitive data (including the sensitive or proprietary data of its customers, employees, suppliers, and vendors maintained by or on behalf of the Company), equipment or technology (collectively, “IT Systems and Data”) and (b) the Company has not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other material compromise to its IT Systems and Data;