Cyber Security and Data Protection Sample Clauses

Cyber Security and Data Protection. The information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases of the Company and its subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operations of the businesses of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants; the Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, “Personal Data”)) used in connection with their businesses and implemented backup and disaster recovery technology consistent with industry standards and practice, and there have been no breaches, violations, outages, attack or unauthorized uses of or accesses to same; the Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
AutoNDA by SimpleDocs
Cyber Security and Data Protection. Seller warrants that it has implemented sufficient organizational, technical and administrative controls, policies, procedures, and safeguards to maintain confidentiality and integrity of any personal, proprietary or confidential information of (or provided by) Buyer in connection with the delivery of Goods and/or Services under this Agreement (collectively “Data”. Personal information means any identifying or potentially identifiable information including but not limited to names, contact details, IP addresses and any information associated with those identifiers. Seller shall further ensure that its information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) perform as required in connection with the provision of Goods and/or Services under the Agreement and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. Seller shall promptly notify Buyer of any suspected or actual loss (or loss of control over), destruction, disclosure of or unauthorized access to Data (“Security Incident''). All Security Incidents shall be reported to Xxxxx Xxxxxxx via email to xxxxxxxxxxxxxxxxxx@xxxxxxxxxxxxx.xxx without undue delay and not later than 24 hours upon becoming aware of or suspecting a Security incident. Seller shall provide Buyer with all necessary information about the General Terms and Conditions of Purchase North America
Cyber Security and Data Protection. 12.1. The Group has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to the same, except for those that would not reasonably be expected to result in a Material Adverse Change or that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same.
Cyber Security and Data Protection. Except as described in the Time of Sale Prospectus and the Prospectus, the information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases of the Company and its Subsidiaries and Affiliated Entities (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operations of the businesses of the Company and its Subsidiaries and Affiliated Entities as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants; the Company and its Subsidiaries and Affiliated Entities have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, “Personal Data”)) used in connection with their businesses and implemented backup and disaster recovery technology consistent with industry standards and practice, and there have been no breaches, violations, outages, attack or unauthorized uses of or accesses to same; the Company and its Subsidiaries and Affiliated Entities are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
Cyber Security and Data Protection. The Company and its Controlled Entities’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its Controlled Entities, taken as a whole, as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its Controlled Entities have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data in all material respects (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, nor any incidents under internal review or investigations relating to the same, except for those that would not reasonably be expected to have a Material Adverse Effect or that have been remedied without material cost or liability or the duty to notify any other person. As of the date hereof, (i) neither the Company nor any of its Controlled Entities is currently subject to a cybersecurity review by the Cyberspace Administration of the PRC (the “CAC”); (ii) neither the Company nor any of its Controlled Entities has received any communication, enquiry, notice, warning or sanctions with respect to the Cybersecurity Law of the PRC or from the CAC, except for those in the ordinary course of business that would not reasonably be expected to have a Material Adverse Effect; and (iii) the Company is not aware of any pending or threatened cybersecurity review by the CAC on the Company or any of its Controlled Entities. The Company and its Controlled Entities are presently in compliance in material respects with all applicable laws or statutes, judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data (including cyber security) and to the protection of such IT Systems and Personal Data from unauthorized use, access, misa...
Cyber Security and Data Protection. 15.1 The Company and the other members of the Group’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform as required in connection with the operation of the business of the Company and the other members of the Group as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and the other members of the Group have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, nor any incidents under internal review or investigations relating to the same. The Company and the other members of the Group are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification in all material aspects.
Cyber Security and Data Protection. 20.1 Supplier warrants that it has implemented sufficient organizational, technical and administrative controls, policies, procedures, and safeguards to maintain confidentiality and integrity of any personal, proprietary or confidential information of (or provided by) Xxxxx Xxxxxxxx in connection with the delivery of Goods and/or Services subject to these Terms and Conditions (collectively “Data”). Personal information means any identifying or potentially identifiable information including but not limited to names, contact details, IP addresses and any information associated with those identifiers.
AutoNDA by SimpleDocs

Related to Cyber Security and Data Protection

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • Privacy and Data Security (a) The parties will keep confidential any information regarding the Trust, the Variable Accounts, and Contract Owners received in connection with providing services and meeting their respective obligations hereunder, except: (a) as necessary to provide the services or otherwise meet their respective obligations under this Agreement; (b) as necessary to comply with applicable law; and (c) information regarding the Trust or Variable Accounts which is otherwise publicly available. The parties will maintain internal safekeeping procedures to safeguard and protect the confidentiality of the data transmitted to another party or its designees or agents in accordance with Section 248.11 of Regulation S-P (17 CFR 248.1–248.30) (“Reg S-P”) and any other applicable federal or state privacy laws and regulations, including without limitation 201 CFR 17.00 et seq. and applicable security breach notification regulations (collectively “Privacy Laws”). Each party shall use such data solely to effect the services contemplated herein, and none of the parties will directly, or indirectly through an affiliate, disclose any non-public personal information protected under Privacy Laws (“Non-public Personal Information”) received from another party to any person that is not an affiliate, designee, service provider, or agent of the receiving party and provided that any such information disclosed to an affiliate, designee, service provider, or agent will be under the same or substantially similar contractual limitations on use and non-disclosure and will comply with all legal requirements. The Company will not use information, including Non-public Personal Information, directly or indirectly provided to it by Nationwide or its designees or agents pursuant to this Agreement for the purpose of marketing to Contract Owners or any other similar purpose, except as may be agreed by the parties hereto. Except for confidential information consisting of Non-public Personal Information, which will be governed in all respects in accordance with the immediately preceding sentence, confidential information does not include information which (i) was publicly known and/or was in the possession of the party receiving confidential information (“Receiving Party”) from other sources prior to the Receiving Party’s receipt of confidential information from the party disclosing confidential information (“Disclosing Party”), or (ii) is or becomes publicly available other than as a result of a disclosure by the Receiving Party or its representatives, or (iii) is or becomes available to the Receiving Party on a non-confidential basis from a source (other than the Disclosing Party) which, to the best of the Receiving Party’s knowledge, is not prohibited from disclosing such information to the Receiving Party by a legal, contractual, or fiduciary obligation to the Disclosing Party, or (iv) describes the fees payable to Nationwide under this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.