Common use of Computer and Technology Security Clause in Contracts

Computer and Technology Security. The Company and the Subsidiaries have taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of the Company and the Subsidiaries consistent with the guidance of its Regulatory Authorities, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.

Appears in 3 contracts

Samples: Stock Purchase Agreement (Jacksonville Bancorp Inc /Fl/), Stock Purchase Agreement (Jacksonville Bancorp Inc /Fl/), Stock Purchase Agreement (Jacksonville Bancorp Inc /Fl/)

AutoNDA by SimpleDocs

Computer and Technology Security. The Company and the its Subsidiaries have taken all reasonable steps reasonably necessary to safeguard the information technology systems utilized in the operation of the business of the Company and the Subsidiaries consistent with the guidance of its Regulatory AuthoritiesSubsidiaries, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “wormworms,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.

Appears in 1 contract

Samples: Merger Agreement (Entegris Inc)

Computer and Technology Security. The Company and the Subsidiaries have taken all in place reasonable steps to safeguard safeguards of the information technology systems utilized in the operation of the business of the Company and the Subsidiaries consistent with the guidance of its Regulatory Authorities, including the implementation of procedures intended to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit limit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date the Company’s knowledge there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.

Appears in 1 contract

Samples: Stock Purchase Agreement (Palmetto Bancshares Inc)

AutoNDA by SimpleDocs

Computer and Technology Security. The Company Triant Holdings and the its Subsidiaries have taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of the Company Triant Holdings and the Subsidiaries consistent with the guidance of its Regulatory AuthoritiesSubsidiaries, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.

Appears in 1 contract

Samples: Asset Purchase Agreement (PDF Solutions Inc)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!