IT Systems definition
Examples of IT Systems in a sentence
To the knowledge of the Company, (x) there have been no security breaches or other compromises of or relating to IT Systems and Data and (y) the Company and the Subsidiaries have not been notified of, and have no knowledge of, any event or condition that would reasonably be expected to result in any such security breach or other compromise of their IT Systems and Data, except as would not reasonably be expected, individually or in the aggregate, to have a Material Adverse Effect.
The Cornerstone Entities take and in the past three (3) years have taken commercially reasonable measures consistent in all material respects with all applicable Privacy and Data Security Laws, including by maintaining administrative, technical and physical safeguards, to protect the integrity, security and confidentiality of the IT Systems, including all data contained therein, and all Personal Information in the possession or under the control of the Cornerstone Entities.
The IT Systems are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company and its subsidiaries as currently conducted, and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants.
To the knowledge of the Company the IT Systems are free and clear of all material bugs, malware, viruses, malicious code, “worms,” “Trojan horses,” “back doors,” or other vulnerabilities, or unauthorized tools or scripts that could reasonably be expected to materially adversely impact the confidentiality, integrity or availability of any IT Systems.
The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification.