Common use of Computer and Technology Security Clause in Contracts

Computer and Technology Security. Seller has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the Business, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any "back door," "time bomb," "Trojan horse," "worm," "drop dead device," "virus," or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.

Appears in 1 contract

Samples: Asset Purchase Agreement (Teavana Holdings Inc)

AutoNDA by SimpleDocs

Computer and Technology Security. Seller The Company has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the BusinessBusiness of the Company, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any "‘‘back door," "’’ ‘‘time bomb," "’’ ‘‘Trojan horse," "’’ ‘‘worm," "’’ ‘‘drop dead device," "’’ ‘‘virus," ’’ or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems, which would have a Material Adverse Effect on the Company.

Appears in 1 contract

Samples: Stock Purchase Agreement (SunOpta Inc.)

Computer and Technology Security. Seller Intellamed has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the Businessbusiness of Intellamed, including the Division, including the implementation of procedures designed to ensure that such information technology systems are free from any disabling codes or instructions, timertime, copy protection device, clock, counter or other limiting design or routing and any "back door," "” “time bomb," "” “Trojan horse," "” “worm," "” “drop dead device," "” “virus," or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.

Appears in 1 contract

Samples: Asset Purchase Agreement (Universal Hospital Services Inc)

Computer and Technology Security. Seller has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the Business, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any "back door," "” “time bomb," "” “Trojan horse," "” “worm," "” “drop dead device," "” “virus," or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the such information technology systems.

Appears in 1 contract

Samples: Asset Purchase Agreement (Penn Treaty American Corp)

AutoNDA by SimpleDocs

Computer and Technology Security. Seller Company has taken all reasonable steps to safeguard the information technology systems utilized in the operation of the Businessbusiness of Company, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any "back door," "” “time bomb," "” “Trojan horse," "” “worm," "” “drop dead device," "” “virus," or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems.

Appears in 1 contract

Samples: Membership Interest Purchase Agreement (Hickory Tech Corp)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!