Common use of Technology Security Systems Clause in Contracts

Technology Security Systems. (i) Each Loan Party and each of its Subsidiaries has implemented and maintains commercially reasonable administrative, physical, and technical security measures and procedures, as applicable, intended to protect the confidentiality, integrity, and security of (A) its computers, computer systems, servers, hardware, software, websites, databases, networks, and all other information technology equipment and systems owned, operated, or controlled by such Loan Party or Subsidiary, including any hosted locations and other outsourced systems and processes (all of the foregoing in this clause (A), “Loan Party Systems”) and (B) Personal Information accessed, collected, used, processed, stored, transferred or disclosed by or on behalf of any Loan Party or any Subsidiary of any Loan Party (all such data and information referred to in this clause (B), “Loan Party Data”), including from theft, destruction, corruption, loss or unauthorized use, access, interruption, deletion, alteration or modification by any Person. All Loan Party Systems are operational and have adequate backups and disaster recovery arrangements that are at least commercially reasonable and consistent with applicable industry standards. Without limiting the generality of the foregoing, each Loan Party and each of its Subsidiaries (x) maintains physical security measures intended to protect applicable equipment and software, (y) utilizes commercially reasonable virus and intrusion checking software and firewalls, and (z) where reasonably necessary, limits access to Loan Party Data to only those employees and agents who need such access for the conduct of the business of the Loan Parties and their Subsidiaries. (ii) No Loan Party or any Subsidiary of any Loan Party, at any time within the last three years, has experienced any (A) material security incidents, data breaches, intrusions or unauthorized access, use or compromise of any of the Loan Party Systems, (B) material unauthorized collection, access, use, processing, loss, compromise, interruption, deletion, modification or disclosure of any Loan Party Data or trade secrets of any Loan Party or any Subsidiary of any Loan Party or (C) material cyber, social engineering, spoofing, phishing, ransom, viral or other attack, theft or intrusion that that has allowed an unauthorized Person to access, copy, encrypt or otherwise use any Loan Party Data (all of the foregoing clauses (A), (B) and (C), “Security Breaches”). Each Loan Party and each of its Subsidiaries is in compliance with all Requirements of Laws regarding the privacy or security of all Loan Party Data except for any failure to be in compliance that would not reasonably be executed to result in a Material Adverse Effect. No Loan Party or any Subsidiary of any Loan Party has received or is aware of any written notice, allegation, complaint or other written communication, and to the knowledge of the Loan Parties there is no pending investigation by any Governmental Authority or other Person regarding any actual or possible violation of any Requirements of Laws regarding the privacy or security of any Loan Party Data that would reasonably be executed to result in a Material Adverse Effect.

Appears in 1 contract

Sources: Financing Agreement (BRC Inc.)

Technology Security Systems. (i) Each Loan Party and each of its Subsidiaries has implemented and maintains commercially reasonable administrative, physical, and technical security measures and procedures, as applicable, intended to protect the confidentiality, integrity, and security of (A) its computers, computer systems, servers, hardware, software, websites, databases, networks, and all other information technology equipment and systems owned, operated, or controlled by such Loan Party or Subsidiary, including any hosted locations and other outsourced systems and processes (all of the foregoing in this clause (A), “Loan Party Systems”) and (B) Personal Information accessed, collected, used, processed, stored, transferred or disclosed by or on behalf of any Loan Party or any Subsidiary of any Loan Party (all such data and information referred to in this clause (B), “Loan Party Data”), including from theft, destruction, corruption, loss or unauthorized use, access, interruption, deletion, alteration or modification by any Person. All Loan Party Systems are operational and have adequate backups and disaster recovery arrangements that are at least commercially reasonable and consistent with applicable industry standards. Without limiting the generality of the foregoing, each Loan Party and each of its Subsidiaries (x) maintains physical security measures intended to protect applicable equipment and software, (y) utilizes commercially reasonable virus and intrusion checking software and firewalls, and (z) where reasonably necessary, limits access to Loan Party Data to only those employees and agents who need such access for the conduct of the business of the Loan Parties and their Subsidiaries. (ii) No Loan Party or any Subsidiary of any Loan Party, at any time within the last three years, has experienced any (A) material security incidents, data breaches, intrusions or unauthorized access, use or compromise of any of the Loan Party Systems, (B) material unauthorized collection, access, use, processing, loss, compromise, interruption, deletion, modification or disclosure of any Loan Party Data or trade secrets of any Loan Party or any Subsidiary of any Loan Party or (C) material cyber, social engineering, spoofing, phishing, ransom▇▇▇▇▇▇, viral or other attack, theft or intrusion that that has allowed an unauthorized Person to access, copy, encrypt or otherwise use any Loan Party Data (all of the foregoing clauses (A), (B) and (C), “Security Breaches”). Each Loan Party and each of its Subsidiaries is in compliance with all Requirements of Laws regarding the privacy or security of all Loan Party Data except for any failure to be in compliance that would not reasonably be executed to result in a Material Adverse Effect. No Loan Party or any Subsidiary of any Loan Party has received or is aware of any written notice, allegation, complaint or other written communication, and to the knowledge of the Loan Parties there is no pending investigation by any Governmental Authority or other Person regarding any actual or possible violation of any Requirements of Laws regarding the privacy or security of any Loan Party Data that would reasonably be executed to result in a Material Adverse Effect.

Appears in 1 contract

Sources: Financing Agreement (BRC Inc.)

Technology Security Systems. (i) Each Loan Party and each of its Subsidiaries has implemented and maintains commercially reasonable adequate administrative, physical, and technical security measures and procedures, as applicable, intended procedures to protect the confidentiality, integrity, and security of of (A) its computers, computer systems, servers, hardware, software, websites, databases, networks, and all other information technology equipment and systems owned, operated, or controlled by such Loan Party or Subsidiarysystems, including any hosted locations and other outsourced systems and processes (all of the foregoing in this clause (A), “Loan Party Systems”) and and (B) Personal Information all individually identifiable information, accessed, collected, used, processed, stored, transferred or disclosed by or on behalf of any Loan Party or any Subsidiary of any Loan Party (all such data and information referred to in this clause (B), “Loan Party Data”), in all cases including from theft, destruction, corruption, loss or unauthorized use, access, interruption, deletion, alteration or modification by any Person. All Loan Party Systems are operational and have adequate backups and disaster recovery arrangements that are at least commercially reasonable and at least consistent with applicable with, as protective as, and no less rigorous than, industry standardsstandards for companies and businesses of similar size in similar industries. Without limiting the generality of the foregoing, each Loan Party and each of its Subsidiaries (x) maintains physical security measures intended to protect applicable equipment and softwaresoftware in physically secure premises, (y) utilizes commercially reasonable industry-accepted virus and intrusion checking software and firewalls, and (z) where reasonably necessary, limits access to Loan Party Data to only those employees and agents who need such access for the conduct of the business of the Loan Parties and their Subsidiaries. (ii) No To the knowledge of the Loan Parties and their Subsidiaries, no Loan Party or any Subsidiary of any Loan PartyParty has experienced, at any time within during the last past three years, has experienced any any (A) material security incidents, data breaches, intrusions or unauthorized access, use or compromise of any of the Loan Party Systems, , (B) material unauthorized collection, access, use, processing, loss, compromise, interruption, deletion, modification or disclosure of any Loan Party Data or trade secrets of any Loan Party or any Subsidiary of any Loan Party or or (C) material cyber, social engineering, spoofing, phishing, ransom▇▇▇▇▇▇, viral or other attack, theft or intrusion that that has allowed an unauthorized Person to access, copy, encrypt or otherwise use any Loan Party Data (all of the foregoing clauses (A), (B) and (C), “Security Breaches”). Each During the past three years, each Loan Party and each of its Subsidiaries is in material compliance with all Requirements of Laws regarding the privacy or security of all Loan Party Data except for any failure to be in compliance that would not reasonably be executed to result in a Material Adverse EffectData. No During the past three years, no Loan Party or any Subsidiary of any Loan Party has received or is aware of any written notice, allegation, complaint or other written communication, and to the knowledge of the Loan Parties there is no pending investigation by any Governmental US-DOCS\156209705.12 Authority or other Person regarding any actual or possible material violation of any Requirements of Laws regarding the privacy or security of any Loan Party Data that would reasonably be executed to result in a Material Adverse EffectData.

Appears in 1 contract

Sources: Financing Agreement (FreightCar America, Inc.)