Company IT Systems; Cybersecurity Sample Clauses

Company IT Systems; Cybersecurity. The Company and its subsidiaries own or have a valid right to access and use all computer systems, networks, hardware, software, databases, websites, and equipment used to process, store, maintain and operate data, information, and functions used in connection with the business of the Company and its subsidiaries (the “Company IT Systems”), except as would not, individually or in the aggregate, have a Material Adverse Effect. The Company IT Systems are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company and its subsidiaries as currently conducted, except as would not, individually or in the aggregate, have a Material Adverse Effect. The Company and its subsidiaries have implemented commercially reasonable backup, security and disaster recovery technology consistent in all material respects with applicable regulatory standards and customary industry practices. Except as would not reasonably be expected to have a Material Adverse Effect, (a) there has been no security breach or other compromise of or relating to the Company IT Systems; (b) the Company has not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any such security breach or other compromise of the Company IT Systems; (c) the Company and its subsidiaries have implemented policies and procedures with respect to the Company IT Systems that are reasonably consistent with industry standards and practices, or as required by applicable regulatory standards; and (d) the Company and its subsidiaries are presently in material compliance with all applicable laws or statutes, judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority and contractual obligations relating to the privacy and security of the Company IT Systems and to the protection of the Company IT Systems from unauthorized use, access, misappropriation or modification.