Computer and Technology Security. Target has taken reasonable steps to safeguard the information technology systems utilized in the operation of the business of Target, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to the Knowledge of Sellers, to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems except as listed on Schedule 3(cc) of the Disclosure Schedules.
Appears in 2 contracts
Samples: Asset Purchase Agreement (Professional Diversity Network, Inc.), Asset Purchase Agreement (Professional Diversity Network, Inc.)
Computer and Technology Security. Target has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business of Target, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to the Knowledge of Sellers, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems except as listed on Schedule 3(cc) of the Disclosure Schedulessystems.
Appears in 2 contracts
Samples: Business Sale and Membership Interest Purchase Agreement (Penford Corp), Business Sale and Membership Interest Purchase Agreement (Penford Corp)
Computer and Technology Security. To the Knowledge of Seller, Target has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the business Business of Target, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and, to the Knowledge of SellersSeller, to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems except as listed on Schedule 3(cc) of the Disclosure Schedulessystems.
Appears in 1 contract