Technology Security Systems. (i) Each Loan Party and each of its Subsidiaries has implemented and maintains administrative, physical, and technical security measures and procedures (consistent with industry standards for companies and businesses of similar size in similar industries) to protect the confidentiality, integrity, and security of (A) its computers, computer systems, servers, hardware, software, websites, databases, networks, and all other information technology equipment and systems, including any hosted locations and other outsourced systems and processes (all of the foregoing in this clause (A), “Loan Party Systems”) and (B) all individually identifiable information, including protected health information and other sensitive and confidential information, accessed, collected, used, processed, stored, transferred or disclosed by or on behalf of any Loan Party or any Subsidiary of any Loan Party (all such data and information referred to in this clause (B), “Loan Party Data”), in all cases including from theft, destruction, corruption, loss or unauthorized use, access, interruption, deletion, alteration or modification by any Person. All Loan Party Systems are operational in all material respects and have adequate backups and disaster recovery arrangements that are at least reasonable and at least consistent with, as protective as, and no less rigorous than, industry standards for companies and businesses of similar size in similar industries. Without limiting the generality of the foregoing, each Loan Party and each of its Subsidiaries (x) maintains applicable equipment and software that is material to its business in physically secure premises, (y) utilizes industry-accepted virus and intrusion checking software and firewalls, and (z) limits access to Loan Party Data to only those employees and agents who need such access for the conduct of the business of the Loan Parties and their Subsidiaries. (ii) No Loan Party or any Subsidiary of any Loan Party has experienced any (A) material security incidents, data breaches, intrusions or unauthorized access, use or compromise of any of the Loan Party Systems, (B) material unauthorized collection, access, use, processing, loss, compromise, interruption, deletion, modification or disclosure of any Loan Party Data or trade secrets of any Loan Party or any Subsidiary of any Loan Party or (C) material cyber, social engineering, spoofing, phishing, ▇▇▇▇▇▇, viral or other attack, theft or intrusion that that has allowed an unauthorized Person to access, copy, encrypt or otherwise use any Loan Party Data (all of the foregoing clauses (A), (B) and (C), “Security Breaches”). Each Loan Party and each of its Subsidiaries is in material compliance with all Requirements of Laws regarding the privacy or security of all Loan Party Data. No Loan Party or any Subsidiary of any Loan Party has received or is aware of any notice, allegation, complaint or other communication, and to the knowledge of the Loan Parties there is no pending investigation by any Governmental Authority regarding any actual or possible material violation of any Requirements of Laws regarding the privacy or security of any Loan Party Data.
Appears in 2 contracts
Sources: Financing Agreement (Comscore, Inc.), Financing Agreement (Comscore, Inc.)