IT Asset definition
Examples of IT Asset in a sentence
To the Company’s knowledge, no person or entity has gained unauthorized access to any IT Asset since the Company’s inception in a manner that has resulted or could reasonably be expected to result in a Material Adverse Change.
Except as would not reasonably be expected to have a Material Adverse Effect, (i) to the Company’s knowledge, the Company has not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data and (ii) to the Company’s knowledge, there has been no unauthorized or illegal use of, or access to, any Company IT Asset or Sensitive Company Data by any unauthorized third party.
No Public Software has been used by Company T or any of its Subsidiaries in connection with any Company T Software or any IT Asset of Company T or any of its Subsidiaries in a manner that requires the licensing, disclosure or distribution of any source code (other than source code that is a part of such Public Software) or limits the receipt of consideration in connection with the use, licensing or distribution of such Company T Software or Asset of Company T or any of its Subsidiaries.
The Company and its Subsidiaries have not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data, except where such breaches, compromises or incidents would not reasonably be expected to, individually or in the aggregate, result in a Material Adverse Effect; and there has been no unauthorized or illegal use of or access to any Company IT Asset or Sensitive Company Data by any unauthorized third party.
The Company and its subsidiaries have not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data, except where such breaches, compromises or incidents would not, individually or in the aggregate, be material to the Company or any of its subsidiaries; and there has been no unauthorized or illegal use of or access to any Company IT Asset or Sensitive Company Data by any unauthorized third party.