Data Protection; No Breaches. The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has taken all technical and organizational measures necessary to protect the information technology systems and Data used in connection with the operation of the Company’s business. Without limiting the foregoing, the Company has used reasonable efforts to establish and maintain, and has established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s business (“Breach”). To the Company’s knowledge, there has been no such Breach, and the Company has not been notified of and has no knowledge of any event or condition that would reasonably be expected to result in, any such Breach.
Appears in 2 contracts
Samples: Open Market Sale Agreement (Aehr Test Systems), Equity Distribution Agreement (Aehr Test Systems)
Data Protection; No Breaches. The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has taken all technical and organizational measures necessary to protect the information technology systems and Data used in connection with the operation of the Company’s business. Without limiting the foregoing, the Company has used reasonable efforts to establish and maintain, and has established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s business (“Breach”). To the Company’s knowledge, there There has been no such Breach, and the Company has not been notified of and has no knowledge of any event or condition that would reasonably be expected to result in, any such Breach.
Appears in 2 contracts
Samples: Equity Distribution Agreement (Golden Matrix Group, Inc.), Equity Distribution Agreement (Cohen & Co Inc.)
Data Protection; No Breaches. The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has taken all technical and organizational measures reasonably necessary to protect the information technology systems and Data used in connection with the operation of the Company’s business. Without limiting the foregoing, the Company has used reasonable efforts to establish and maintain, and has established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s business (“Breach”). To the Company’s knowledge, there There has been no such Breach, and the Company has not been notified of and has no knowledge of any event or condition that would reasonably be expected to result in, any such Breach.
Appears in 2 contracts
Samples: Equity Distribution Agreement (Immersion Corp), Equity Distribution Agreement (Immersion Corp)
Data Protection; No Breaches. The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. .The Company has taken all technical and organizational measures necessary to protect the information technology systems and Data used in connection with the operation of the Company’s business. Without limiting the foregoing, the Company has used reasonable efforts to establish and maintain, and has established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s business (“Breach”). To the Company’s knowledge, there There has been no such Breach, and the Company has not been notified of and has no knowledge of any event or condition that would reasonably be expected to result in, any such Breach.
Appears in 1 contract
Data Protection; No Breaches. The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has taken all technical and organizational measures reasonably necessary to protect the information technology systems and Data used in connection with the operation of the Company’s business. Without limiting the foregoing, the Company has used reasonable efforts to establish and maintain, and has established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s business (“Breach”). To the Company’s knowledge, there There has been no such Breach, and the Company has not been notified of and has no knowledge of any event or condition that would reasonably be expected to result in, any such Breach.
Appears in 1 contract
Samples: Equity Distribution Agreement (American Virtual Cloud Technologies, Inc.)
Data Protection; No Breaches. The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has taken all reasonable technical and organizational measures necessary to protect the information technology systems and Data used in connection with the operation of the Company’s business. Without limiting the foregoing, the Company has used reasonable efforts to establish and maintain, and has established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that plans, which are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s business (“Breach”). To the Company’s knowledge, there There has been no such Breach, and the US.129929318.07 Company has not been notified of and has no knowledge of any event or condition that would reasonably be expected to result in, any such Breach.
Appears in 1 contract
Data Protection; No Breaches. The To the best of the Company’s knowledge, the Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has taken all technical and organizational measures necessary commercially reasonable efforts to protect the information technology systems and Data used in connection with the operation of the Company’s business. Without limiting the foregoing, the Company has used reasonable efforts to establish and maintain, and has established, maintained, implemented and complied with, maintain reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s business (“Breach”). To the Company’s knowledge, there There has been no such Breach, and the Company has not been notified of and has no knowledge of any event or condition that would reasonably be expected to result in, any such Breach.
Appears in 1 contract
Samples: Equity Distribution Agreement (Serve Robotics Inc. /DE/)
Data Protection; No Breaches. The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has taken all reasonable technical and organizational measures necessary to protect the information technology systems and Data used in connection with the operation of the Company’s business. Without limiting the foregoing, the Company has used reasonable efforts to establish and maintain, and has established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s business (“Breach”). To the Company’s knowledge, there There has been no such Breach, and the Company has not been notified of and has no knowledge of any event or condition that would reasonably be expected to result in, any such Breach.
Appears in 1 contract
Data Protection; No Breaches. The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has taken all technical and organizational measures necessary to protect the information technology systems and Data used in connection with the operation of the Company’s business. Without limiting the foregoing, the Company has used reasonable efforts to establish and maintain, and has established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that plans, which are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s business (“Breach”). To the Company’s knowledge, there There has been no such Breach, and the Company has not been notified of and has no knowledge of any event or condition that would reasonably be expected to result in, any such Breach.
Appears in 1 contract