Common use of Computer and Technology Security Clause in Contracts

Computer and Technology Security. Target has taken reasonable steps to safeguard the information technology systems utilized in the operation of the business of Target, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to the Knowledge of Sellers, to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems except as listed on Schedule 3(cc) of the Disclosure Schedules.

Appears in 2 contracts

Samples: Asset Purchase Agreement (Professional Diversity Network, Inc.), Asset Purchase Agreement (Professional Diversity Network, Inc.)

AutoNDA by SimpleDocs

Computer and Technology Security. Target has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of Target, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to the Knowledge of Sellers, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems except as listed on Schedule 3(cc) of the Disclosure Schedulessystems.

Appears in 2 contracts

Samples: Business Sale and Membership Interest (Penford Corp), Business Sale and Membership Interest (Penford Corp)

AutoNDA by SimpleDocs

Computer and Technology Security. Target Seller has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of TargetBusiness, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any "back door,” “" "time bomb,” “" "Trojan horse,” “" "worm,” “" "drop dead device,” “" "virus," or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to the Knowledge of Sellers, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems except as listed on Schedule 3(cc) of the Disclosure Schedulessystems.

Appears in 1 contract

Samples: Asset Purchase Agreement (Teavana Holdings Inc)

Time is Money Join Law Insider Premium to draft better contracts faster.