Cyber Security. Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »
Cyber Security. Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.
Cyber Security. Except as may be included or incorporated by reference in the Registration Statement and the Prospectus, (x) to the Company’s knowledge, there has been no material security breach or other material compromise of or relating to any of the Company’s information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company has not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any material security breach or other material compromise to their IT Systems and Data; (ii) the Company is presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, result in a Material Adverse Effect; and (iii) the Company has implemented backup and disaster recovery technology consistent with industry standards and practices. Any certificate signed by an officer of the Company and delivered to the Agents or to counsel for the Agents pursuant to or in connection with this Agreement shall be deemed to be a representation and warranty by the Company, as applicable, to the Agents as to the matters set forth therein.
Cyber Security. The Service Provider shall ensure that any system on which the Service Provider holds any Purchaser Data, including back-up data, is a secure system that complies with the Security Plan detailed in (Schedule 11). The service provider’s systems, policies and procedures should comply with the National Cyber Security Centre’s Cloud Security Principles and the cloud security requirements of the Specification & Service Levels (Schedule 1). The Service Provider must, where appropriate, review and update systems, policies and procedures regularly to ensure continued compliance with the NCSC Cloud Security Principles.
Cyber Security. Critical Infrastructure Asset Identification and Configuration Management Databases c. Information Assurance of Critical Infrastructure
Cyber Security. Except as may be included or incorporated by reference in the Registration Statement and the Prospectus, (x) to the Company’s knowledge, there has been no material security breach or other material compromise of or relating to any of the Company’s information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) and none that would result in a legal or contractual obligation of the Company to notify any other person about such occurrence; and (y) the Company has not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any material security breach or other material compromise to their IT Systems and Data; (ii) the Company is presently in compliance with all material applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, result in a Material Adverse Effect; and (iii) the Company has implemented backup and disaster recovery technology consistent with the requirements set forth in the Company’s insurance policies. Any certificate signed by an officer of the Company and delivered to the Agent or to counsel for the Agent pursuant to or in connection with this Agreement shall be deemed to be a representation and warranty by the Company, as applicable, to the Agent as to the matters set forth therein.
Cyber Security. Except as may be included or incorporated by reference in the Registration Statement and the Prospectus, (x) to the Company’s knowledge, there has been no material security breach or other material compromise of or relating to any of the Company’s information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company has not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any material security breach or other material compromise to their IT Systems and Data; (ii) the Company is presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, result in a Material Adverse Effect; and (iii) the Company has implemented backup and disaster recovery technology consistent with industry standards and practices.
Cyber Security. The PERFORMER shall provide adequate security for all USSOCOM information on PERFORMER information systems. To provide adequate security, the PERFORMER shall implement, at a minimum, the following information security protections:
Cyber Security. The Client shall maintain commercially reasonable security controls in compliance with all applicable legal requirements. In the event of any attempted, suspected, or actual compromise of the integrity or confidentiality of the Client’s IT systems, the Client shall notify WTW. WTW shall not be responsible for any loss in connection with, arising out of, or relating to, in whole or in part, any breach by the Client of the terms of this paragraph other than to the extent that such loss arises directly as a result of WTW’s fraud, wilful default or negligence.
Cyber Security. Except for matters which, individually or in the aggregate, have not had and would not reasonably be expected to have a Material Adverse Effect, (A) there has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company or its subsidiaries information technology and computer systems, networks, hardware, software, data and databases (including the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its subsidiaries), equipment or technology (collectively, “IT Systems and Data”); and (B) neither the Company nor its subsidiaries have been notified of, and the Company has no knowledge of any event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data. The Company and its subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification.