Information Technology; Security and Privacy Sample Clauses

Information Technology; Security and Privacy. Except as has not had, or would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect, (a) since January 1, 2010, (i) there have been, to the Knowledge of the Company, no security breaches in the Company’s or any of the Company Subsidiariesinformation technology systems, and (ii) there have been no disruptions in any of the Company’s or the Company Subsidiaries’ information technology systems that adversely affected the Company’s or any of the Company Subsidiaries’ business or operations; and (b) the Company has established and is in compliance with a written information security program or programs covering the Company and the Company Subsidiaries that (i) includes safeguards for the security, confidentiality, and integrity of transactions and confidential or proprietary Company Data and (ii) is designed to protect against unauthorized access to the Company IT Systems, Company Data, and the systems of any Third Party service providers that have access to (A) Company Data or (B) Company IT Systems.
AutoNDA by SimpleDocs
Information Technology; Security and Privacy. Except as has not had, or would not reasonably be expected to have, individually or in the aggregate, a Parent Material Adverse Effect, (a) since January 1, 2010, (i) there have been, to the Knowledge of Parent, no security breaches in Parent’s or any of the Parent Subsidiariesinformation technology systems, and (ii) there have been no disruptions in any of Parent or the Parent Subsidiaries’ information technology systems that adversely affected Parent’s or any of the Parent Subsidiaries’ business or operations; and (b) Parent has established and is in compliance with a written information security program or programs covering Parent and the Parent Subsidiaries that (i) includes safeguards for the security, confidentiality, and integrity of transactions and confidential or proprietary Parent Data and (ii) is designed to protect against unauthorized access to the Parent IT Systems, Parent Data, and the systems of any Third Party service providers that have access to (A) Parent Data or (B) Parent IT Systems.
Information Technology; Security and Privacy. To the Company’s and the Stockholder’s knowledge, all information technology and computer systems (including software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, used in or necessary in the conduct of the business of the Company and its Subsidiaries (collectively, “Company IT Systems”) have been properly maintained by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the industry. As of the Closing Date, to Company’s and the Stockholder’s knowledge, the Company IT Systems are in good working condition to effectively perform all information technology operations of the Business as conducted by the Company immediately prior to the Closing.
Information Technology; Security and Privacy. (a) The Company and the Company Subsidiaries own, lease or license all Technology, including all information technology and computer systems relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information whether or not in electronic format, used in or necessary for the conduct of the business of the Company and the Company Subsidiaries (collectively, “Company IT Systems”). To the Knowledge of the Company, all material Company IT Systems have been maintained, in all material respects, by technically competent personnel. To the Knowledge of the Company, the Company IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct the business of the Company and the Company Subsidiaries in all material respects. The Company and the Company Subsidiaries have in place a commercially reasonable disaster recovery program, including providing for the regular back-up and prompt recovery of the data and information necessary for the conduct of the business of the Company and the Company Subsidiaries (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of the business of the Company and the Company Subsidiaries.
Information Technology; Security and Privacy. (a) To the Knowledge of the Contributors, all information technology and computer systems, including Software, hardware, networks, interfaces, and related systems, relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, material to the conduct of the business of the Contributed Companies, their Subsidiaries and the Contributed Businesses (collectively, “Contributed Company IT Systems”) are in good working condition to effectively perform all information technology operations necessary to conduct the business of the Contributed Companies, their Subsidiaries and the Contributed Businesses in all material respects. The Contributed Companies and Subsidiaries thereof have in place a commercially reasonable disaster recovery program consistent with commercially reasonable protection disaster recovery program customarily used in the same industry as the business of the Contributed Companies, their Subsidiaries and the Contributed Businesses.
Information Technology; Security and Privacy. (a) All information technology and computer systems relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information whether or not in electronic format, necessary to the conduct of the business of the Company and its Subsidiaries (collectively, “Company IT Systems”) have been maintained, in all material respects, in accordance with reasonable and commercial standards suggested by the manufacturer of third-party-owned systems or in accordance with standards reasonably prudent in the entertainment industry and the electronic commerce industry, that are designed to encourage proper operation, monitoring and use. The Company IT Systems are currently in good working condition with respect to the performance of information technology operations necessary to conduct the business of the Company and its Subsidiaries in all material respects. The Company and its Subsidiaries have in place a commercially reasonable disaster recovery program that provides for the regular back-up of, and addresses recovery of, the data and information necessary to the conduct of the business of the Company and its Subsidiaries (including such data and information that is stored on magnetic or optical media in the ordinary course), and as of the date hereof, such disaster recovery program operates under normal circumstances without material disruption to, or material interruption in, the conduct of the business of the Company and its Subsidiaries.
Information Technology; Security and Privacy. Except as has not had, or would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect, (a) since January 1, 2008, (i) there have been, to the Knowledge of the Company, no security breaches in the Company’s or any of the Company Subsidiariesinformation technology systems, and (ii) there have been no disruptions in any of the Company’s or the Company Subsidiaries’ information technology systems that adversely affected the Company’s or any of the Company Subsidiaries’ business or operations; (b) no material capital expenditures are necessary with respect to the Company’s or the Company Subsidiaries’ information technology systems with respect to their businesses as currently conducted, other than capital expenditures in the Ordinary Course of Business that are consistent with the past practice of the Company or the Company Subsidiaries; and (c) the Company has established and is in compliance with a written information security program or programs covering the Company and the Company Subsidiaries that (i) includes safeguards for the security, confidentiality, and integrity of transactions and confidential or proprietary Company Data and (ii) is designed to protect against unauthorized access to the Company IT Systems, Company Data, and the systems of any third party service providers that have access to (A) Company Data or (B) Company IT Systems.
AutoNDA by SimpleDocs
Information Technology; Security and Privacy. 1.10.1 The Company and the Company Subsidiaries own, lease or license-in all Company IT Systems used in or necessary for the conduct of the business of the Company and the Company Subsidiaries as currently conducted. All Company IT Systems have been properly maintained, in all material respects, by technically competent personnel, in accordance with standards set by the manufacturers, to ensure proper operation, monitoring and use. The Company IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct the business of the Company and the Company Subsidiaries in all material respects. The Company and the Company Subsidiaries have in place a commercially reasonable disaster recovery program, including providing for the regular back-up and prompt recovery of the 60 data and information necessary for the conduct of the business of the Company and the Company Subsidiaries as currently conducted (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of the business of the Company and the Company Subsidiaries. 1.10.2 All right, title and interest in and to the data included in the Company Intellectual Property that is material to the business of the Company and the Company Subsidiaries and contained in any database used or maintained by the Company or the Company Subsidiaries (collectively, the “Company Data”) is owned or under a right to use by the Company or a Company Subsidiary, free and clear of all liens. Except as set forth in Schedule 1.10.2, the Company IT Systems have not failed in the three (3) years preceding the Effective Date in any manner or been compromised to any extent other than such failures or compromises that, individually or in the aggregate, are immaterial, and the Company Data has not been corrupted or, to the Company’s Knowledge, accessed by any unauthorized Person. 1.10.3 The Company has established and is in compliance in all material respects with a written information security program or programs covering the Company and the Company Subsidiaries that (i) includes safeguards for the security, confidentiality and integrity of transactions and confidential or proprietary Company Data and (ii) is designed to protect against unauthorized access to the Company IT Systems, Company Data and the systems of any third party service providers that have access to (...
Information Technology; Security and Privacy. (a) (i) All material information technology and computer systems, including Software, hardware, networks, interfaces, and related systems, relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, used in or necessary to the conduct of the Business (collectively, “Company IT Systems”) have been maintained in accordance with standards set by the manufacturers or otherwise in accordance with prudent industry standards, to ensure operation, monitoring and use in the Ordinary Course and (ii) the Company IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct the Business in all material respects in the Ordinary Course. The Company has in place a commercially reasonable disaster recovery program, including providing for the regular back-up and prompt recovery of the data and information necessary to the conduct of the Business as conducted by the Company prior to the date hereof (including such data and information that is stored on magnetic or optical media) without material disruption to, or material interruption in, the conduct of the Business prior to the date hereof.
Information Technology; Security and Privacy. To Company’s knowledge, all information technology and computer systems (including software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, used in or necessary in the conduct of the Business (collectively, “Company IT Systems”) have been properly maintained by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the industry. As of the Closing Date, to Company’s knowledge, the Company IT Systems are in good working condition to effectively perform all information technology operations of the Business as conducted by Company immediately prior to the Closing.
Time is Money Join Law Insider Premium to draft better contracts faster.