IT Systems definition
Examples of IT Systems in a sentence
The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data” (defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses.
The Company IT Systems are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company and each of its Subsidiaries as currently conducted, except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.
The Company and its subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data” (defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses.
The Company and its Subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including “Personal Data,” used in connection with their businesses.
The Company and its Subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems, Confidential Data, and Personal Data and to the protection of such IT Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification.