Common use of Cyber Security and Data Protection Clause in Contracts

Cyber Security and Data Protection. The information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases of the Company and its subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operations of the businesses of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants; the Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, “Personal Data”)) used in connection with their businesses and implemented backup and disaster recovery technology consistent with industry standards and practice, and there have been no breaches, violations, outages, attack or unauthorized uses of or accesses to same; the Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Appears in 10 contracts

Samples: Underwriting Agreement (JBDI Holdings LTD), Underwriting Agreement (JBDI Holdings LTD), Underwriting Agreement (Roma Green Finance LTD)

AutoNDA by SimpleDocs

Cyber Security and Data Protection. The information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases of the Company and its subsidiaries subsidiary (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operations of the businesses of the Company and its subsidiaries subsidiary as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants; the Company and its subsidiaries subsidiary have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, “Personal Data”)) used in connection with their businesses and implemented backup and disaster recovery technology consistent with industry standards and practice, and there have been no breaches, violations, outages, attack or unauthorized uses of or accesses to same; the Company and its subsidiaries subsidiary are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Appears in 1 contract

Samples: Underwriting Agreement (Junee LTD)

AutoNDA by SimpleDocs

Cyber Security and Data Protection. The Company and its Controlled Entities’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases of the Company and its subsidiaries (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operations operation of the businesses business of the Company and its subsidiaries Controlled Entities as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants; the . The Company and its subsidiaries Controlled Entities have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, “Personal Data”)) used in connection with their businesses and implemented backup and disaster recovery technology consistent with industry standards and practicebusinesses, and there have been no breaches, violations, outages, attack outages or unauthorized uses of or accesses to same; , except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its subsidiaries Controlled Entities are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Appears in 1 contract

Samples: Underwriting Agreement (Uxin LTD)

Time is Money Join Law Insider Premium to draft better contracts faster.