We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Information Technology Sample Clauses

Information Technology. The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.
Information Technology. The Company’s and the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company and the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and the Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.
Information TechnologyAll information technology acquisitions shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of Standards and Technology’s website at xxxx://xxxxxxxxxx.xxxx.xxx commensurate with the mission of the subcontract and conducive to the research and development efforts of the ORNL.
Information Technology. The Company’s, the Subsidiaries’ and, to the knowledge of the Company, the Related Parties’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company, the Subsidiaries and the Related Entities as currently conducted. The Company, the Subsidiaries and, to the knowledge of the Company, the Related Parties maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company, the Subsidiaries and, to the knowledge of the Company, the Related Parties are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.
Information Technology. The Company’s, the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company, the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except as would not reasonably be expected to have a Material Adverse Effect. The Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices, and are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not reasonably be expected to have a Material Adverse Effect.
Information Technology. 21.1 The definitions in this paragraph apply in this agreement.
Information Technology. The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, except where such failure to operate and perform would not reasonably be expected to result in a Material Adverse Change, and to the knowledge of the Company are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and except as would not, individually or in the aggregate, result in a Material Adverse Change, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not result in a Material Adverse Change. The disclosures in the Registration Statement and the Prospectus concerning the effects of federal, state, local and all foreign regulation on the Company’s business in the past and as currently contemplated are correct in all material respects and no other such regulations are required to be disclosed in the Registration Statement and the Prospectus which are not so disclosed.
Information TechnologyThe Parties shall, to the extent possible, endeavour to use electronic means of communication to permit efficient dissemination of information on government procurement, particularly as regards tender opportunities offered by entities, while respecting the principles of transparency and non-discrimination.
Information TechnologyL Brands shall cause each Service Recipient, its employees and any subcontractors to: (a) not attempt to obtain access to or use any information technology systems of any Service Provider Party, or any data owned by any Service Provider Party, or any data used or processed by any Service Provider Party (other than any data of any Service Recipient), except to the extent required to receive the Services; (b) maintain reasonable security measures to protect the systems of each Service Provider Party to which it has access pursuant to this Agreement from access by unauthorized third parties, and any “back door”, “time bomb”, “Trojan Horse”, “worm”, “drop dead device”, “virus” or other computer software routine intended or designed to disrupt, disable, harm or otherwise impede in any manner the operation of such systems; (c) not permit access or use of information technology systems of any Service Provider Party by a third party other than as authorized by prior written consent of Service Provider; (d) not disable, damage or erase or disrupt or impair the normal operation of the information technology systems of any Service Provider Party; and (e) comply with the security policies and procedures of each Service Provider Party (to the extent previously provided to each Service Recipient in writing). Each party hereto shall promptly notify the other party in the event it or any of its respective Affiliates becomes aware of or suspects that there has been a breach of security or a loss, theft or unauthorized access, use or disclosure of any information technology systems (collectively, “IT Breach”) of any Service Provider Party or any Service Recipient to the extent such (i) IT Breach could adversely affect the provision or receipt of the Services hereunder or such other party’s data or Confidential Information or (ii) notice is required by Applicable Law.
Information Technology. 16.7.1 A Member shall not be required to introduce information technology as a component of a course unless the technology is specifically related to the subject matter, or the mode of delivery of the course has been approved by the Department, Area or equivalent academic sub-unit, or Faculty, as appropriate. 16.7.2 When a course includes an Information Technology requirement, the form of IT requirement shall be included in the job posting under 13.3. Once a Member has been appointed to teach a course, he/she shall not be required to change the course to an alternate mode of delivery during the period of the appointment. 16.7.3 When computer technology is required for the delivery of a course, the University shall ensure that the Member teaching the course has access to computer equipment capable of handling the required mode of delivery. 16.7.4 Nothing in the provisions of 16.7 above shall prevent a Member from introducing or using Information Technology as part of a course. 16.7.5 To assist Members and to facilitate technological innovation within the University community, the University shall inform Members of training programs, and shall make these programs accessible on the same basis as full-time faculty.