Common use of IT Systems Clause in Contracts

IT Systems. (i)(x)There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 5 contracts

Samples: Sales Agreement (Dicerna Pharmaceuticals Inc), Common Stock (23andMe Holding Co.), Sales Agreement (DarioHealth Corp.)

AutoNDA by SimpleDocs

IT Systems. (i)(x)There i)(x) To the knowledge of the Company, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective the Company’s customers, employees, suppliers, vendors and any third party data maintained by or on behalf of themthe Company), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have has not been notified of, and have has no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their its IT Systems and Data, (ii) the Company and each of its subsidiaries have compliedhas complied in all material respects, and are is presently in compliance in all material respects with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have has implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 4 contracts

Samples: Sales Agreement (Unity Biotechnology, Inc.), Common Stock (Unity Biotechnology, Inc.), Unity Biotechnology, Inc.

IT Systems. (i)(x)There i)(x) To the Company’s knowledge, there has been no material security breach or breach, attack or other compromise of or relating to any of the Company’s and its subsidiariesSubsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have Subsidiary has complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have Subsidiary has implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 3 contracts

Samples: Sales Agreement (Madrigal Pharmaceuticals, Inc.), Sales Agreement (Madrigal Pharmaceuticals, Inc.), Sales Agreement (Madrigal Pharmaceuticals, Inc.)

IT Systems. (i)(x)There A)(x) There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including any Personal Data or the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (iiB) the Company and each of its subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iiiC) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 3 contracts

Samples: Underwriting Agreement (Aura Biosciences, Inc.), Underwriting Agreement (Aura Biosciences, Inc.), Aura Biosciences, Inc.

IT Systems. (i)(x)There To the Company’s Knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), ) and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 2 contracts

Samples: Underwriting Agreement (Praxis Precision Medicines, Inc.), Underwriting Agreement (Praxis Precision Medicines, Inc.)

IT Systems. (i)(x)There A)(x) There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including any Personal Data or the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (iiB) the Company and each of its subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iiiC) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.. (gg)

Appears in 1 contract

Samples: Underwriting Agreement (Aura Biosciences, Inc.)

IT Systems. (i)(x)There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation misappropriation, or modification and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Sales Agreement (G1 Therapeutics, Inc.)

IT Systems. (i)(x)There has been no material security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any material security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have complied, and are presently in compliance with, all applicable material laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Sales Agreement (Sage Therapeutics, Inc.)

IT Systems. (i)(x)There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Sales Agreement (G1 Therapeutics, Inc.)

IT Systems. (i)(x)There i)(x) There has been no material security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Common Stock (Adverum Biotechnologies, Inc.)

AutoNDA by SimpleDocs

IT Systems. (i)(x)There i)(x) There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), ) and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in in, any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have complied, and are presently in compliance compliance, with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification modification, and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practicepractices, except, in each case with respect to clauses (i) through (iii) hereof, as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

Appears in 1 contract

Samples: Sales Agreement (Rocket Pharmaceuticals, Inc.)

IT Systems. (i)(x)There i)(x) There has been no material security breach or attack or other compromise of or relating to any of the Company’s and its subsidiariesSubsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries Subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Securities Purchase Agreement (Adverum Biotechnologies, Inc.)

IT Systems. (i)(x)There There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Underwriting Agreement (Spero Therapeutics, Inc.)

IT Systems. (i)(x)There i)(x) There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have complied, and are presently in compliance with, in all material respects, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Underwriting Agreement (X4 Pharmaceuticals, Inc)

IT Systems. (i)(x)There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiariesSubsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries Subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Sales Agreement (Bionano Genomics, Inc)

IT Systems. (i)(x)There i)(x) There has been no security breach or attack or other compromise of or relating to any of the Company’s and or any of its subsidiariesSubsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries Subsidiaries have complied, and are presently in compliance withcompliance, with all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Sales Agreement (Five Prime Therapeutics, Inc.)

Time is Money Join Law Insider Premium to draft better contracts faster.