Common use of IT Systems and Data Clause in Contracts

IT Systems and Data. The Company and its Subsidiaries own or have full right to access and use all computer systems, networks, hardware, software, data and databases (including the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its Subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its Subsidiaries), equipment or technology, websites and functions used in connection with the business of the Company and the Subsidiaries (collectively, “IT Systems and Data”). The IT Systems and Data are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company and the Subsidiaries as a whole as currently conducted, except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company and the Subsidiaries have implemented commercially reasonable backup, security and disaster recovery technology consistent in all material respects with applicable regulatory standards and customary industry practices. There has been no material security breach or incident, unauthorized access or disclosure, or other compromise relating to the Company’s or its Subsidiaries’ IT Systems and Data. Neither the Company nor its Subsidiaries have been notified of, and have no knowledge of, any event or condition that would result in, any material security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data. The Company and its Subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards. The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification.

Appears in 8 contracts

Sources: Underwriting Agreement (Ai Assets LTD), Underwriting Agreement (WORK Medical Technology Group LTD), Underwriting Agreement (WORK Medical Technology Group LTD)