Computer and Technology Security. Company has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of Company, including the implementation of procedures to minimize the risk that such information technology systems have any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any back door, virus, malicious code or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to Company’s knowledge, to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Computer and Technology Security. The Company and the Subsidiaries have taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of the Company and the Subsidiaries consistent with the guidance of its Regulatory Authorities, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Computer and Technology Security. Target has taken reasonable steps to safeguard the information technology systems utilized in the operation of the business of Target, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to the Knowledge of Sellers, to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems except as listed on Schedule 3(cc) of the Disclosure Schedules.
Computer and Technology Security. Seller has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the Business, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any "back door," "time bomb," "Trojan horse," "worm," "drop dead device," "virus," or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Computer and Technology Security. Buyer has taken all reasonable steps to safeguard the Systems, including the implementation of procedures to ensure that such Systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third-party, and to date there have been no successful unauthorized intrusions or breaches of the security of the Systems.
Computer and Technology Security. NRM’s and each Company’s Systems are in commercially reasonable working order in light of its current operations, and NRM and each Company have purchased a sufficient number of license seats for all software currently used by NRM and each Company, as applicable, in such operations. All software currently installed on the Systems is properly licensed and paid for in full. All software used in the conduct and operation of NRM’s and each Company’s business operations is in good condition and working order, is free of material programming errors, and is sufficient to pursue the activities of NRM’s and each Company’s business as it is currently conducted. NRM and each Company has taken all reasonable steps to safeguard its Systems, including the implementation of procedures to ensure that its Systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of any of the Systems. No third-party providing services to NRM or either Company with respect to the Systems has failed to meet any material service obligations. NRM and each Company has taken all reasonable measures to ensure the upkeep of its Systems, and there has not been any material malfunction with respect to any aspect of the Systems that has not been remedied in all material respects. NRM and each Company has implemented and maintains commercially reasonable backup and data recovery, disaster recovery and business continuity plans, consistent with industry practices of companies offering similar services, and acts in compliance therewith. NRM and each Company has tested such plans on a periodic basis, and such plans have proven effective upon testing. No aspect of NRM’s or either Company’s Systems is currently under development or will require any material development effort or expenditure following the Closing in order to complete such aspect of the Systems.
Computer and Technology Security. Sellers have taken commercially reasonable steps to safeguard the information technology systems utilized in the operation of the Business (including the implementation of customary procedures to ensure that such information technology systems are free from any disabling codes or instructions, time, copy protection device, clock, counter, or other limiting design or routing and any back door, time bomb, Trojan horse, worm, drop dead device, virus, or other malicious software routines or hardware components that, in each case, permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party), and in the last two (2) years, to Sellers’ Knowledge, there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Computer and Technology Security. Seller and its Subsidiaries have taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of Seller and its Subsidiaries, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to the Knowledge of Seller, to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Computer and Technology Security. Target and InnoWare Plastic have taken reasonably prudent steps to safeguard the information technology systems utilized in the operation of the business of Target and InnoWare Plastic, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Computer and Technology Security. The Company has taken all reasonable steps to safeguard its Systems, including the implementation of procedures to ensure that the Systems are free from any disabling code or instruction, timer, copy protection device, clock, counter or other limiting design or routing and any "back door," "time bomb," "Trojan horse," "worm," "drop dead device," "virus" or other software routine or hardware component that permits unauthorized access to or disablement of the Systems, or the unauthorized capture or erasure of data. All suspected unauthorized attempts to gain access to any component of the Systems are described in Schedule 3.29. To the Knowledge of Sellers, since January 1, 2010 there has been no successful unauthorized intrusion or breach of the security of the Systems.