Common use of Cybersecurity; Data Protection Clause in Contracts

Cybersecurity; Data Protection. The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, would not, individually or in the aggregate, have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and, to the knowledge of the Company there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company and its subsidiaries or any of their properties or assets, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect would not, individually or in the aggregate, result in a Material Adverse Effect.

Appears in 3 contracts

Samples: NEWMONT Corp /DE/, NEWMONT Corp /DE/, Newmont Goldcorp Corp /De/

AutoNDA by SimpleDocs

Cybersecurity; Data Protection. The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, would not, individually or in the aggregate, have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and, to the knowledge of the Company and there have been (i) no breaches, violations, outages or unauthorized uses of or accesses to the same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any and (ii) no incidents under internal review or investigations relating to the same, except where such breach, violation, outage, unauthorized use or access, or incidents under internal review or investigation relating to the same, would not be reasonably expected to have, individually or in the aggregate, a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company and its subsidiaries or any of their properties or assetssubsidiaries, and all internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect would not, individually or in the aggregate, result in a Material Adverse Effect.

Appears in 3 contracts

Samples: Underwriting Agreement (Brookfield Property Partners L.P.), Underwriting Agreement (Brookfield Property Partners L.P.), Brookfield Property Partners L.P.

Cybersecurity; Data Protection. The Company Except as disclosed in the Registration Statement, the Time of Sale Information and the Prospectus, (i) (x) to the knowledge of the Company, there has been no material security breach or other material compromise of or relating to any of the Company’s or its subsidiaries’ information technology assets and equipment, computers, computer systems, networks, hardware, software, websitesdata (including the data maintained by the Company or its subsidiaries of their respective customers, applicationsemployees, and databases suppliers, vendors or other third parties), equipment or technology (collectively, “IT SystemsSystems and Data”) are adequate for, and operate and perform as required in connection with the operation of the business of (y) the Company and its subsidiaries as currently conductedhave not been notified of, free and clear have no knowledge of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy any event or condition that would reasonably be expected to result in, any material security breach or failure other material compromise to operate or perform, would not, individually or in the aggregate, have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material IT Systems and data Data; (including all personal, personally identifiable, sensitive, confidential or regulated data ii) (“Personal Data”)x) used in connection with their businesses, and, to the knowledge of the Company there have been no breachesCompany, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company and its subsidiaries or any of their properties or assetsauthority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such protect IT Systems and Personal Data from unauthorized use, access, misappropriation or modificationmodification and (y) the Company and its subsidiaries maintain and enforce policies and procedures designed to promote and ensure compliance with all such applicable laws or statutes and all such applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations, except where such non-compliance or failure to protect as would not, in the case of this clause (ii), individually or in the aggregate, result in have a Material Adverse Effect; and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

Appears in 3 contracts

Samples: Underwriting Agreement (Ati Inc), Underwriting Agreement (Allegheny Technologies Inc), Allegheny Technologies Inc

Cybersecurity; Data Protection. The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material all IT Systems and data (including the privacy and security of all personal, personally identifiable, sensitive, confidential or regulated data processed or maintained on the IT Systems or otherwise by the Company and its subsidiaries (“Personal Data”)) used in connection with their businesses, and, and to the knowledge of the Company Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that as would not, individually or in the aggregate, reasonably be expected to have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the samea Material Adverse Effect. The Company and its subsidiaries are are, except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company authority, and its subsidiaries or any of their properties or assets, all internal policies and contractual obligations of the Company and its subsidiaries, relating to the security of IT Systems and the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect would not, individually or in the aggregate, result in a Material Adverse Effect.

Appears in 3 contracts

Samples: Underwriting Agreement (NanoString Technologies Inc), NanoString Technologies Inc, NanoString Technologies Inc

Cybersecurity; Data Protection. The Except as would not, individually or in the aggregate, be material to the Company and its subsidiaries, taken as a whole, (A) the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform their core functionality as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and (B), to the knowledge of the Company, are free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, would not, individually or in the aggregate, have a Material Adverse Effect. (A) The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards that are commercially reasonable for its industry in an effort to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material all IT Systems and data (including all personal, personally identifiable, sensitive, or confidential data collected or regulated data processed by the Company or its subsidiaries in connection with their businesses (“Personal Data”), and except as otherwise disclosed in the Time of Sale Information and the Offering Memorandum, and except as otherwise would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (B) used in connection with their businesses, and, to the knowledge of the Company Company’s knowledge, there have been no breaches, violations, outages breaches or unauthorized uses of or accesses to samesuch IT Systems or Personal Data. Except as would not, except for those that individually or in the aggregate, reasonably be expected to have been remedied without material cost or liability or a Material Adverse Effect, the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and statutes, all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over authority, and all of the Company Company’s and its subsidiaries or any of their properties or assets, subsidiaries’ applicable internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect would not, individually or in the aggregate, result in a Material Adverse Effect.

Appears in 2 contracts

Samples: Purchase Agreement (Lyft, Inc.), Lyft, Inc.

Cybersecurity; Data Protection. The Except as would not reasonably be expected, individually or in the aggregate, to have a Material Adverse Effect: (i) the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, would not, individually or in (ii) the aggregate, have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and, to the knowledge of the Company and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The , and (iii) the Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company and its subsidiaries or any of their properties or assetsauthority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect would not, individually or in the aggregate, result in a Material Adverse Effect.

Appears in 2 contracts

Samples: Seres Therapeutics, Inc., Seres Therapeutics, Inc.

Cybersecurity; Data Protection. The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform Except as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, would not, individually or described in the aggregateRegistration Statement and the Prospectus, have a Material Adverse Effect. The (i) the Company and its subsidiaries have implemented backup and maintained commercially reasonable controlsdisaster recovery technology reasonably consistent with industry standards and practices; and (ii) to the knowledge of the Company, policies, procedures, there has been no security breach or other compromise to the personal data and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data, including the data (“Personal Data”)) used of the Company and its subsidiaries’ respective employees, suppliers, vendors and third parties, in each case, maintained or processed by the Company and its subsidiaries in connection with their businessesbusinesses (collectively, and, to the knowledge of the Company there have been no breaches, violations, outages or unauthorized uses of or accesses to same“Confidential Data”), except for those any breach or compromise that have has been remedied without material cost or liability or the duty to notify or disclose such breach or compromise to any other person, nor any incidents under internal review governmental entity or investigations relating regulatory agency or which otherwise would not be expected, individually or in the aggregate, to have a Material Adverse Effect. Except as described in the Registration Statement and the Prospectus, to the same. The knowledge of the Company, the Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company and its subsidiaries or any of their properties or assetsauthority, internal policies and contractual obligations relating to of the Company and its subsidiaries, governing the privacy and security of information technology and computer systems, networks, hardware, software, data, equipment or technology of the Company and its subsidiaries (collectively, “IT Systems Systems”) and Personal Confidential Data and to the protection of such IT Systems and Personal Confidential Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect as would notnot be expected, individually or in the aggregate, result in to have a Material Adverse Effect.

Appears in 2 contracts

Samples: Equity Distribution Agreement (Mitcham Industries Inc), Mind Technology, Inc

Cybersecurity; Data Protection. The Except as disclosed in the Disclosure Package and the Prospectus, or as would not individually or in the aggregate, reasonably be expected to be material to the Company and its subsidiaries, taken as a whole, (i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any of the Company’s or its subsidiaries’ information technology assets and equipment, computers, computer systems, networks, hardware, software, websitesdata (including the data maintained by the Company or its subsidiaries of their respective customers, applicationsemployees, and databases suppliers, vendors or other third parties), equipment or technology (collectively, “IT SystemsSystems and Data), (ii) are adequate for, and operate and perform as required in connection with the operation of the business of the Company and its subsidiaries as currently conductedhave not been notified of, free and clear have no knowledge of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy any event or condition that would reasonably be expected to result in, any security breach or failure other compromise to operate or perform, would not, individually or in the aggregate, have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material IT Systems and data Data, (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)iii) used in connection with their businesses, and, to the knowledge of the Company there have been no breachesCompany, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company and its subsidiaries or any of their properties or assetsauthority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where and (iv) the Company and its subsidiaries maintain and enforce policies and procedures designed to promote and ensure compliance with all such non-compliance applicable laws and all such applicable judgments, orders, rules and regulations of any court or failure arbitrator or governmental or regulatory authority, internal policies and contractual obligations. The Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices. Any certificate signed by an officer of the Company and delivered to protect would not, individually the Underwriters or in to counsel for the aggregate, result in Underwriters shall be deemed to be a Material Adverse Effectrepresentation and warranty by the Company to each Underwriter as to the matters set forth therein.

Appears in 1 contract

Samples: Underwriting Agreement (Brown Forman Corp)

Cybersecurity; Data Protection. The Except as would not, individually or in the aggregate, be material to the Company and its subsidiaries, taken as a whole, (A) the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform their core functionality as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and (B), to the knowledge of the Company, are free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, would not, individually or in the aggregate, have a Material Adverse Effect. (A) The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards that are commercially reasonable for its industry in an effort to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material all IT Systems and data (including all personal, personally identifiable, sensitive, or confidential data collected or regulated data processed by the Company or its subsidiaries in connection with their businesses (“Personal Data”), and except as otherwise disclosed in the Registration Statement, the Pricing Disclosure Package and the Prospectus, and except as otherwise would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (B) used in connection with their businesses, and, to the knowledge of the Company Company’s knowledge, there have been no breaches, violations, outages breaches or unauthorized uses of or accesses to samesuch IT Systems or Personal Data. Except as would not, except for those that individually or in the aggregate, reasonably be expected to have been remedied without material cost or liability or a Material Adverse Effect, the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and statutes, all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over authority, and all of the Company Company’s and its subsidiaries or any of their properties or assets, subsidiaries’ applicable internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect would not, individually or in the aggregate, result in a Material Adverse Effect.

Appears in 1 contract

Samples: Lyft, Inc.

Cybersecurity; Data Protection. The Except as would not reasonably be expected, individually or in the aggregate, to have a Material Adverse Effect, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases owned by the Company (collectively, “IT Systems”) are adequate for, and operate and perform as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, would not, individually or in the aggregate, have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards designed to maintain and protect their material trade secrets and confidential information and the integrity, continuous operation, redundancy and security of their material all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and, to . To the knowledge of the Company Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to samethe foregoing, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company and its subsidiaries or any of their properties or assetsauthority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect would not, individually or in ; and the aggregate, result in a Material Adverse EffectCompany and its subsidiaries have implemented backup and disaster recovery technology reasonably consistent with industry standards and practices.

Appears in 1 contract

Samples: Underwriting Agreement (Frequency Therapeutics, Inc.)

AutoNDA by SimpleDocs

Cybersecurity; Data Protection. The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and are, to the knowledge of the Company and its subsidiaries, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, would not, individually or in the aggregate, have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, andand neither the Company nor its subsidiaries have been notified of, to the and each of them have no knowledge of the Company there have been no any event or condition that could result in, any breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company and its subsidiaries or any of their properties or assetsauthority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect would not, individually or in the aggregate, result in a Material Adverse Effect.

Appears in 1 contract

Samples: J M SMUCKER Co

Cybersecurity; Data Protection. (i) The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, would not, individually or in ; (ii) the aggregate, have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and, to the knowledge of the Company and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The ; and (iii) the Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company and its subsidiaries or any of their properties or assetsauthority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modificationmodification except, except where such non-compliance or failure to protect in the case of clauses (i), (ii) and (iii), as would not, individually or in the aggregate, result in reasonably be expected to have a Material Adverse Effect.

Appears in 1 contract

Samples: Underwriting Agreement (Aptargroup, Inc.)

Cybersecurity; Data Protection. The Company Except as would not reasonably be expected to result in a Material Adverse Effect, the Parent Guarantor and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform as required in connection with with, the operation of the business of the Company Parent Guarantor and its subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, would not, individually or in the aggregate, have a Material Adverse Effect. The Company Parent Guarantor and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their all material IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and, to the knowledge of the Company there . There have been no (i) breaches, violations, outages or unauthorized uses of or accesses to same, except for same (excluding those that have been remedied without material cost or liability or the duty to notify any other person, nor any ) or (ii) incidents under internal review or investigations relating to the same, except, in the case of clause (i) or (ii), as would not reasonably be expected to result in a Material Adverse Effect. The Company Parent Guarantor and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company and its subsidiaries or any of their properties or assetsauthority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect would not, individually or in the aggregate, result in a Material Adverse Effect.

Appears in 1 contract

Samples: Underwriting Agreement (H&r Block Inc)

Cybersecurity; Data Protection. The Company Partnership and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company Partnership and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, would not, individually or in the aggregate, have a Material Adverse Effect. The Company Partnership and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and, to the knowledge of the Company and there have been (i) no breaches, violations, outages or unauthorized uses of or accesses to the same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any and (ii) no incidents under internal review or investigations relating to the samesame except as would not, individually or in the aggregate, result in a Material Adverse Effect. The Company Partnership and its subsidiaries are presently in material compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company Partnership and its subsidiaries or any of their properties or assetssubsidiaries, and all internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect would not, individually or in the aggregate, result in a Material Adverse Effect.

Appears in 1 contract

Samples: Brookfield Renewable Partners L.P.

Cybersecurity; Data Protection. The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably adequate for, and operate and perform in all material respects as required in connection with with, the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except where such inadequacy in, or failure to operate or perform, as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of their material all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and, to the knowledge of the Company and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that as would not, individually or in the aggregate, reasonably be expected to have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the samea Material Adverse Effect. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority having jurisdiction over the Company and its subsidiaries or any of their properties or assetsauthority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where such non-compliance or failure to protect as would not, individually or in the aggregate, result in reasonably be expected to have a Material Adverse Effect. Any certificate signed by any officer or representative of the Company or any of its subsidiaries and delivered to the Agent or counsel for the Agent in connection with an issuance of Shares shall be deemed a representation and warranty by the Company to the Agent as to the matters covered thereby on the date of such certificate. The Company acknowledges that the Agent and, for purposes of the opinions to be delivered pursuant to Section 4(p) hereof, counsel to the Company and counsel to the Agent, will rely upon the accuracy and truthfulness of the foregoing representations and hereby consents to such reliance.

Appears in 1 contract

Samples: Sales Agreement (UroGen Pharma Ltd.)

Time is Money Join Law Insider Premium to draft better contracts faster.