Computer and Technology Security Sample Clauses

Computer and Technology Security. Company has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of Company, including the implementation of procedures to minimize the risk that such information technology systems have any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any back door, virus, malicious code or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to Company’s knowledge, to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
AutoNDA by SimpleDocs
Computer and Technology Security. The Company and the Subsidiaries have taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of the Company and the Subsidiaries consistent with the guidance of its Regulatory Authorities, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Computer and Technology Security. Target has taken reasonable steps to safeguard the information technology systems utilized in the operation of the business of Target, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to the Knowledge of Sellers, to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems except as listed on Schedule 3(cc) of the Disclosure Schedules.
Computer and Technology Security. Seller has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the Business, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of such information technology systems.
Computer and Technology Security. Sellers have taken commercially reasonable steps to safeguard the information technology systems utilized in the operation of the Business (including the implementation of customary procedures to ensure that such information technology systems are free from any disabling codes or instructions, time, copy protection device, clock, counter, or other limiting design or routing and any back door, time bomb, Trojan horse, worm, drop dead device, virus, or other malicious software routines or hardware components that, in each case, permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party), and in the last two (2) years, to Sellers’ Knowledge, there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Computer and Technology Security. Buyer has taken all reasonable steps to safeguard the Systems, including the implementation of procedures to ensure that such Systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third-party, and to date there have been no successful unauthorized intrusions or breaches of the security of the Systems.
Computer and Technology Security. Seller and its Subsidiaries have taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of Seller and its Subsidiaries, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to the Knowledge of Seller, to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
AutoNDA by SimpleDocs
Computer and Technology Security. NRM’s and each Company’s Systems are in commercially reasonable working order in light of its current operations, and NRM and each Company have purchased a sufficient number of license seats for all software currently used by NRM and each Company, as applicable, in such operations. All software currently installed on the Systems is properly licensed and paid for in full. All software used in the conduct and operation of NRM’s and each Company’s business operations is in good condition and working order, is free of material programming errors, and is sufficient to pursue the activities of NRM’s and each Company’s business as it is currently conducted. NRM and each Company has taken all reasonable steps to safeguard its Systems, including the implementation of procedures to ensure that its Systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of any of the Systems. No third-party providing services to NRM or either Company with respect to the Systems has failed to meet any material service obligations. NRM and each Company has taken all reasonable measures to ensure the upkeep of its Systems, and there has not been any material malfunction with respect to any aspect of the Systems that has not been remedied in all material respects. NRM and each Company has implemented and maintains commercially reasonable backup and data recovery, disaster recovery and business continuity plans, consistent with industry practices of companies offering similar services, and acts in compliance therewith. NRM and each Company has tested such plans on a periodic basis, and such plans have proven effective upon testing. No aspect of NRM’s or either Company’s Systems is currently under development or will require any material development effort or expenditure following the Closing in order to complete such aspect of the Systems.
Computer and Technology Security. Sellers have taken all commercially reasonable steps to safeguard the Systems, including the implementation of procedures to ensure that such Systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that, in each case, permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third-party.
Computer and Technology Security. Seller and its Subsidiaries have taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of Seller and its Subsidiaries, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to the Knowledge of Seller, to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems. Certain Business Relationships. Except as listed in Section 3.26 of the Disclosure Schedule, none of Seller’s or any Subsidiary of Seller’s Affiliates, directors, trustees, officers and employees or their Affiliates have been involved in any business arrangement or relationship, other than employment Contracts entered in the Ordinary Course of Business and collective bargaining agreements, with Seller or any Subsidiary of Seller within the past six (6) months or that is currently ongoing or continues after the Effective Date, and none of such Persons owns (except as a result of Seller's IP Policy) any asset, tangible or intangible, that is used in the business of Seller or any Subsidiary of Seller (collectively, the “Related Party Contracts”).
Time is Money Join Law Insider Premium to draft better contracts faster.