Information Technology Systems and Data Sample Clauses

Information Technology Systems and Data. Except to the extent it would not be reasonably expected to have a Material Adverse Effect, the information technology assets, equipment, computers, systems, networks, hardware, software, internet websites, applications, data and databases (including the Personal Data, the data of their respective customers, employees, suppliers, vendors and any other third party data maintained, processed or transmitted by or on behalf of the Company and the Company Subsidiaries) used by or on behalf of the Company and Company Subsidiaries (collectively, “IT Systems and Data”) are reasonably adequate for, and operate and perform as required in connection with, the operation of the businesses of the Company and the Company Subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and each Company Subsidiary take and have taken all reasonable technical and organizational measures necessary to protect the IT Systems and Data. Without limiting the foregoing, the Company and the Company Subsidiaries have used commercially reasonable efforts to establish and maintain, and have established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans, consistent with industry standards and practices, that are designed to protect against and prevent the breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or any other compromise or misuse, in each case, of or relating to any IT Systems and Data (“Breach”). There has been no Breach, and the Company and the Company Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any Breach except as would not be reasonably expected to have a Material Adverse Effect.
AutoNDA by SimpleDocs
Information Technology Systems and Data. Center Equipment Prior to the date hereof, the Company has disclosed to Parent all hardware (including computers, servers, peripheral devices and telecommunications devices) and software whether owned, leased or used by the Company or any of its Subsidiaries that is material to the performance of or providing of any services to the customers of the Company or any of its Subsidiaries (“Information Technology”). To the Knowledge of the Company, all Information Technology presently used in delivering services to customers is in good working order and condition in all material respects and is sufficient for the purposes for which it is used in the business of the Company and its Subsidiaries. No material capital expenditures (including lease expenditures) are currently planned or are necessary to such Information Technology in the business of the Company and its Subsidiaries as currently conducted, other than capital expenditures and lease commitments in the ordinary course of business consistent with past practice and on average not materially greater than those annual expenditures disclosed in the annual audited financial statements of the Company. All commitments by the Company and its Subsidiaries to customers to modify, upgrade or buildout such Information Technology (whether in service level agreements, other customer Contracts, or otherwise) in the Company’s and its Subsidiaries’ fiscal year 2012 or fiscal year 2013 (based on projected customer volumes) have been identified to Parent in the Company’s existing fiscal year 2012 Capital Budget. The Company and/or its Subsidiaries have obtained an unqualified SSAE16 SOC II report dated January 27, 2012 for the period June 1, 2011 through December 31, 2011, which is true and accurate in all material respects, and have provided a copy of the report to the Parent. The Company has also disclosed to Parent all material co-location agreements and material outsourcing agreements.

Related to Information Technology Systems and Data

  • Information Technology The Company’s and the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company, and the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and the Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.

  • Information Systems (a) The MA Organization must:

  • INFORMATION AND DATA 21.1 At all times during the subsistence of this Agreement the duly authorized representatives of each Participant shall, at its and their sole risk and expense and at reasonable intervals and times, have access to the Property and to all technical records and other factual engineering data and information relating to the Property which is in the possession of the Operator.

  • Technology For purposes of this Agreement, “Technology” means all Software, information, designs, formulae, algorithms, procedures, methods, techniques, ideas, know-how, research and development, technical data, programs, subroutines, tools, materials, specifications, processes, inventions (whether or not patentable and whether or not reduced to practice), apparatus, creations, improvements and other similar materials, and all recordings, graphs, drawings, reports, analyses, and other writings, and other embodiments of any of the foregoing, in any form or media whether or not specifically listed herein. Further, for purposes of this Agreement, “Software” means any and all computer programs, whether in source code or object code; databases and compilations, whether machine readable or otherwise; descriptions, flow-charts and other work product used to design, plan, organize and develop any of the foregoing; and all documentation, including user manuals and other training documentation, related to any of the foregoing.

  • Intellectual Property and Information Technology (a) Section 5.20(a) of the Company Disclosure Schedule contains a true and complete list, as of the date of this Agreement, of all Company Products.

  • Proprietary Materials Money Manager shall provide to RIMCo the following Proprietary Materials as requested: • Photographs of Portfolio Manager(s)—please provide a professionally taken color (business) headshot in portrait format. This can be provided as a 5x7 print or 300ppi resolution (or higher) Mac or PC electronic file. • Background/Biographical—please include an approved three to four sentence description of your firm, as well as a 100 word or less biography of each portfolio manager that works on a Xxxxxxx portfolio. Please make sure to identify the lead portfolio manager for each portfolio. • Logos (Trademarks)—please provide us with a 300ppi resolution (or higher) electronic Mac or PC file, preferably an .eps or in its original format—Adobe Photoshop, Freehand, or Illustrator. Include any footnote information and identity guidelines you would like included when we make use of your trademark. Please send these materials along with the appropriate marketing contact information such as their name, email address and phone number to: Xx. Xxxxxxx Xxxxxxx c/x Xxxxxxx Design Group Xxxxxxx Investment Group P.O. Box 1616 Tacoma, WA 98401-1616 U.S.A. Email Address: xxxxxxxx@xxxxxxx.xxx

  • Technical Information Methods, processes, formulae, compositions, systems, techniques, inventions, machines, computer programs and research projects, unpatented inventions, designs, know-how, trade secrets, technical information and data, specifications, blueprints, transparencies, test data, and additions, modifications, and improvements thereon which are revealed to Employee.

  • Information Sources The Custodian may rely upon information received from issuers of Investments or agents of such issuers, information received from Subcustodians and from other commercially reasonable sources such as commercial data bases and the like, but shall not be responsible for specific inaccuracies in such information, provided that the Custodian has relied upon such information in good faith, or for the failure of any commercially reasonable information provider.

  • Information/Cooperation Executive shall, upon reasonable notice, furnish such information and assistance to the Bank as may be reasonably required by the Bank, in connection with any litigation in which it or any of its subsidiaries or affiliates is, or may become, a party; provided, however, that Executive shall not be required to provide information or assistance with respect to any litigation between Executive and the Bank or any other subsidiaries or affiliates.

  • Information Services The Custodian may rely upon information received from issuers of Securities or agents of such issuers, information received from Subcustodians or depositories, information from data reporting services that provide detail on corporate actions and other securities information, and other commercially reasonable industry sources; and, provided the Custodian has acted in accordance with the standard of care set forth in Section 6 (a), the Custodian shall have no liability as a result of relying upon such information sources, including but not limited to errors in any such information.

Time is Money Join Law Insider Premium to draft better contracts faster.