Computer and Technology Security. The Company and the Subsidiaries have taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of the Company and the Subsidiaries consistent with the guidance of its Regulatory Authorities, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Appears in 3 contracts
Samples: Stock Purchase Agreement (Jacksonville Bancorp Inc /Fl/), Stock Purchase Agreement (Jacksonville Bancorp Inc /Fl/), Stock Purchase Agreement (Jacksonville Bancorp Inc /Fl/)
Computer and Technology Security. The Company and the its Subsidiaries have taken all reasonable steps reasonably necessary to safeguard the information technology systems utilized in the operation of the business of the Company and the Subsidiaries consistent with the guidance of its Regulatory AuthoritiesSubsidiaries, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “wormworms,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Appears in 1 contract
Samples: Merger Agreement (Entegris Inc)
Computer and Technology Security. The Company and the Subsidiaries have taken all in place reasonable steps to safeguard safeguards of the information technology systems utilized in the operation of the business of the Company and the Subsidiaries consistent with the guidance of its Regulatory Authorities, including the implementation of procedures intended to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit limit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date the Company’s knowledge there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Appears in 1 contract
Computer and Technology Security. The Company Triant Holdings and the its Subsidiaries have taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of the Company Triant Holdings and the Subsidiaries consistent with the guidance of its Regulatory AuthoritiesSubsidiaries, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.
Appears in 1 contract