Computer and Technology Security. Company has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of Company, including the implementation of procedures to minimize the risk that such information technology systems have any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any back door, virus, malicious code or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to Company’s knowledge, to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Appears in 17 contracts
Samples: Stock Purchase Agreement (Camber Energy, Inc.), Loan Agreement (Camber Energy, Inc.), Stock Purchase Agreement (Camber Energy, Inc.)
Computer and Technology Security. Company has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of Company, including the implementation of procedures designed to minimize the risk that such information technology systems have any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any back door, virus, malicious code or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to Company’s knowledge, to date there have been no successful unauthorized intrusions or breaches of the security of the its information technology systems.
Appears in 8 contracts
Samples: Purchase Agreement (Generex Biotechnology Corp), Note Purchase Agreement (Inception Mining Inc.), Note Purchase Agreement (Inception Mining Inc.)
Computer and Technology Security. Company has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of Company, including the implementation of procedures to minimize the risk ensure that such information technology systems have are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any back door, virus, malicious code or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to Company’s knowledge, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Appears in 1 contract
Samples: Stock Purchase Agreement (6D Global Technologies, Inc)