IT Systems and Data definition
Examples of IT Systems and Data in a sentence
The Transaction Entities and their respective subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards, except where the failure to do so would not result, singly or in the aggregate, in a Material Adverse Effect.
Neither the Manager nor its subsidiaries have been notified of, and each of them have no knowledge of any event or condition that could result in, any material security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data.
The Manager and its subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards, except where the failure to do so would not result, singly or in the aggregate, in a Manager Material Adverse Effect.
The Transaction Entities and their respective subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any Governmental Entity, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification.
The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification.