IT Systems and Data Sample Clauses

IT Systems and Data. (A) There has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company’s and each of its respective subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (including the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and each of its subsidiaries, and any such data processed or stored by third parties on behalf of the Company and each of its subsidiaries), equipment or technology (collectively, “IT Systems and Data”), except for those that have been remedied without material cost or liability or the duty to notify any governmental or regulatory authority; (B) neither the Company nor its subsidiaries have been notified of, and each of them has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data; (C) the Company and each of its subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards that, to the Company’s knowledge, are adequate to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards; and (D) the Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification except as would not reasonably be expected to result in a Material Adverse Effect.
AutoNDA by SimpleDocs
IT Systems and Data. With such exceptions as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect: (i) there has been no security breach or other compromise of or relating to any of the Operating Partnership’s, the Company’s or their subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective tenants, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) and (ii) the Operating Partnership, the Company and their subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data.
IT Systems and Data. There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), except where such security breach, attack or other compromise would not, individually or in the aggregate, have a Material Adverse Effect, and the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any material security breach, attack or compromise to their IT Systems and Data. The Company has implemented, and requires that its third party vendors implement, adequate policies and commercially reasonable security regarding the collection, use, disclosure, retention, processing, transfer, confidentiality, integrity, and availability of personal data, and business proprietary or sensitive information, in its possession, custody, or control, or held or processed on its behalf and The Company and its subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all internal policies and contractual obligations relating to the privacy and security of IT Systems and Data, except where such noncompliance with such laws, statutes, judgment, order, rule or regulations or internal policies or contractual obligations would not, individually or in the aggregate, have a Material Adverse Effect. Any certificate signed by an officer of the Company and delivered to the Underwriter or to counsel for the Underwriter shall be deemed to be a representation and warranty by the Company to the Underwriter as to the matters set forth therein.
IT Systems and Data. Except as would not reasonably be expected, individually or in the aggregate, to have a Material Adverse Effect, since November 1, 2015, to the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology.
IT Systems and Data. (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any of its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) that would, individually or in the aggregate, have a Material Adverse Effect and (y) neither the Company nor any of its subsidiaries has been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and each of its subsidiaries is presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, be reasonably expected to have a Material Adverse Effect; and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices. Any certificate signed by an officer of the Company and delivered to the Agent or to counsel for the Agent pursuant to or in connection with this Agreement shall be deemed to be a representation and warranty by the Company, as applicable, to the Agent as to the matters set forth therein. The Company has a reasonable basis for making each of the representations set forth in this Section 6. The Company acknowledges that the Agent and, for purposes of the opinions to be delivered pursuant to Section 7 hereof, counsel to the Company and counsel to the Agent, will rely upon the accuracy and truthfulness of the foregoing representations and hereby consents to such reliance.
IT Systems and Data. Except as would not reasonably be expected to result in a Material Adverse Effect, (a) there has been no security breach or other material compromise of any of the Company’s information technology and computer systems, networks, hardware, software, sensitive data (including the sensitive or proprietary data of its customers, employees, suppliers, and vendors maintained by or on behalf of the Company), equipment or technology (collectively, “IT Systems and Data”) and (b) the Company has not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other material compromise to its IT Systems and Data;
IT Systems and Data. (i) There has been no security breach or attack or other compromise of or relating to any of the Company’s or its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective tenants, employees, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”) and the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach, attack or compromise to their IT Systems and Data, except in each case that would not reasonably be expected to have a Material Adverse Effect, (ii) the Company and its subsidiaries have complied, and are presently in compliance, with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except in each case that would not reasonably be expected to have a Material Adverse Effect and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.
AutoNDA by SimpleDocs
IT Systems and Data. The Adviser has reasonably designed cybersecurity measures and disaster recovery technology consistent in all material respects with industry standards and practice implemented backup and disaster recovery technology consistent in all material respects with industry standards and practices.
IT Systems and Data. Except as disclosed in the Registration Statement and the Prospectus, (i)(x) to the Company’s knowledge, there has been no security breach or other compromise of or relating to any of the Company’s or its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data; (ii) the Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of clauses (i) and (ii), individually or in the aggregate, have a Material Adverse Effect; and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.
IT Systems and Data. Except as would not, singly or in the aggregate, result in a Material Adverse Effect, (i) the Company and its subsidiaries own or have a valid right to access and use all information technology assets and computers, systems, networks, hardware, software, websites, applications, data and databases (including the Protected Data and other data and information of their respective users, customers, employees, suppliers, vendors and any third party data maintained, stored or otherwise processed by the Company and its subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its subsidiaries), equipment and technology used in their respective businesses (collectively, “IT Systems and Data”); (ii) the IT Systems and Data (A) are adequate for, and operate and perform as required in connection with, the operation of the business of the Company and its subsidiaries as currently conducted and as proposed to be conducted in the Registration Statement, the General Disclosure Package and the Prospectus, (B) have not malfunctioned or failed in a manner that has not been fully remediated prior to the date hereof, and (C) are free and clear of all bugs, errors, defects, Trojan horses, time bombs, back doors, drop dead devices, malware and other corruptants, including software or hardware components that are designed to interrupt use of, permit unauthorized access to or disable, damage or erase the IT Systems and Data. To the Company’s knowledge, in the past three years there has been no notice of, and no knowledge of any event or condition that could result in, a material security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company, any of its subsidiaries or any of the IT Systems and Data, and neither the Company nor its subsidiaries have been notified of, and each of them have no knowledge of any event or condition that would be reasonably expected to result in, any security breach or incident, unauthorized access or disclosure or other compromise to the IT Systems and Data. The Company and its subsidiaries have established, implemented and maintained controls, policies, procedures, and technological safeguards designed to maintain and protect their confidential information and the integrity, continuous operation, redundancy and security of the IT Systems and Data according to commercially reasonable standards and practices and in compliance with all applicable laws and regulatory...
Time is Money Join Law Insider Premium to draft better contracts faster.