Common use of IT Systems and Data Clause in Contracts

IT Systems and Data. There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), except where such security breach, attack or other compromise would not, individually or in the aggregate, have a Material Adverse Effect, and the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any material security breach, attack or compromise to their IT Systems and Data. The Company has implemented, and requires that its third party vendors implement, adequate policies and commercially reasonable security regarding the collection, use, disclosure, retention, processing, transfer, confidentiality, integrity, and availability of personal data, and business proprietary or sensitive information, in its possession, custody, or control, or held or processed on its behalf and The Company and its subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all internal policies and contractual obligations relating to the privacy and security of IT Systems and Data, except where such noncompliance with such laws, statutes, judgment, order, rule or regulations or internal policies or contractual obligations would not, individually or in the aggregate, have a Material Adverse Effect. Any certificate signed by an officer of the Company and delivered to the Underwriter or to counsel for the Underwriter shall be deemed to be a representation and warranty by the Company to the Underwriter as to the matters set forth therein.

Appears in 4 contracts

Samples: Underwriting Agreement (SAG Holdings LTD), Underwriting Agreement (SKK Holdings LTD), Underwriting Agreement (SAG Holdings LTD)

AutoNDA by SimpleDocs

IT Systems and Data. There Except as disclosed in the Prospectus, there has been no security breach or attack or other compromise of or relating to any of the Company’s and or its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, suppliers and vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”), except where such security breach, attack or other compromise as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, and the . The Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any material security breach, attack breach or other compromise to their IT Systems and Data, except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company has implemented, and requires that its third party vendors implement, adequate policies and commercially reasonable security regarding the collection, use, disclosure, retention, processing, transfer, confidentiality, integrity, and availability of personal data, and business proprietary or sensitive information, in its possession, custody, or control, or held or processed on its behalf and The Company and its subsidiaries have complied, and are presently in compliance withwith all applicable laws and statutes, all applicable lawsjudgments, statutes or any judgmentorders, order, rule or regulation rules and regulations of any court or arbitrator or governmental or regulatory authority and authority, all internal policies and all contractual obligations relating to the privacy and security of IT Systems and DataData and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except where such noncompliance with such laws, statutes, judgment, order, rule or regulations or internal policies or contractual obligations as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. Any certificate signed by an officer The Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices. The Company and its subsidiaries have policies and procedures in place designed to ensure the integrity and security of the Company IT Systems and delivered to the Underwriter or to counsel for the Underwriter shall be deemed to be a representation Data and warranty by the Company to the Underwriter as to the matters set forth thereincomply with such policies and procedures in all material respects.

Appears in 3 contracts

Samples: Equity Distribution Agreement (CMS Energy Corp), Equity Distribution Agreement (CMS Energy Corp), Equity Distribution Agreement (CMS Energy Corp)

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.