Information Technology Clause Samples
POPULAR SAMPLE Copied 57 times
Information Technology. The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.
Information Technology. The Company’s, the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company, the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except as would not reasonably be expected to have a Material Adverse Effect. The Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices, and are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not reasonably be expected to have a Material Adverse Effect.
Information Technology. 21.1 The definitions in this paragraph apply in this agreement.
Information Technology. The Company’s and the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company and the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and the Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.
Information Technology. All information technology acquisitions shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of Standards and Technology’s website at ▇▇▇▇://▇▇▇▇▇▇▇▇▇▇.▇▇▇▇.▇▇▇ commensurate with the mission of the subcontract and conducive to the research and development efforts of the ORNL.
Information Technology. The Company’s, the Subsidiaries’ and, to the knowledge of the Company, the Related Parties’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company, the Subsidiaries and the Related Entities as currently conducted. The Company, the Subsidiaries and, to the knowledge of the Company, the Related Parties maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company, the Subsidiaries and, to the knowledge of the Company, the Related Parties are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.
Information Technology. The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company as currently conducted, except where such failure to operate and perform would not reasonably be expected to result in a Material Adverse Change, and to the knowledge of the Company are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and except as would not, individually or in the aggregate, result in a Material Adverse Change, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not result in a Material Adverse Change. The disclosures in the Registration Statement and the Prospectus concerning the effects of federal, state, local and all foreign regulation on the Company’s business in the past and as currently contemplated are correct in all material respects and no other such regulations are required to be disclosed in the Registration Statement and the Prospectus which are not so disclosed.
Information Technology. The Parties shall, to the extent possible, endeavour to use electronic means of communication to permit efficient dissemination of information on government procurement, particularly as regards tender opportunities offered by entities, while respecting the principles of transparency and non-discrimination.
Information Technology. (a) All material information technology systems (including, but not limited to domains, and IP addresses, hardware, middleware, software products and services as well as middleware or software products or services to produce such hardware, middleware or software functionalities, databases, servers and networks) used in the Business (the IT Systems) are owned, licensed to, or otherwise lawfully held by the Company and sufficient to conduct the Business as conducted on the Closing Date. The IT Systems are not subject to any Encumbrances. No circumstances exist at Closing that would cause the IT Systems to not be available to the Company (i) as at Closing, or (ii) to Sellers’ Knowledge following the Closing on materially the same terms and conditions as currently used and available.
(b) All material agreements related to the IT Systems have been included in the Disclosure Materials.
(c) To Sellers’ Knowledge, all licenses relating to the IT Systems are valid and in full force and, to Sellers’ Knowledge, the Company is not in breach of such licenses. The Company has not received written notice from any third person alleging that the Company is in breach of any such licenses.
(d) The IT Systems are in good working order, are functioning properly considering the purposes of the Business and provide sufficient processing and storage capacity and performance for their respective purposes and are subject to appropriate data security and disaster recovery procedures (including, but not limited to any back-up, recovery and restoration measures).
(e) To Sellers’ Knowledge, none of the IT Systems contain any: (i) bug, defect or error; or (ii) any code designed or intended to have, or intended to be capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file, in each case, without the user’s consent, that in each case (i) or (ii) materially and adversely affects the performance of the Business.
(f) The Company has not in the 24 months prior to the Closing Date suffered any material failures or bugs in or breakdowns or material down-time of any computer hardware or software used in connection with the Business that have caused any substantial disruption or interruption to the Business.
(g) The Company has not been subj...
Information Technology. L Brands shall cause each Service Recipient, its employees and any subcontractors to: (a) not attempt to obtain access to or use any information technology systems of any Service Provider Party, or any data owned by any Service Provider Party, or any data used or processed by any Service Provider Party (other than any data of any Service Recipient), except to the extent required to receive the Services; (b) maintain reasonable security measures to protect the systems of each Service Provider Party to which it has access pursuant to this Agreement from access by unauthorized third parties, and any “back door”, “time bomb”, “Trojan Horse”, “worm”, “drop dead device”, “virus” or other computer software routine intended or designed to disrupt, disable, harm or otherwise impede in any manner the operation of such systems; (c) not permit access or use of information technology systems of any Service Provider Party by a third party other than as authorized by prior written consent of Service Provider; (d) not disable, damage or erase or disrupt or impair the normal operation of the information technology systems of any Service Provider Party; and (e) comply with the security policies and procedures of each Service Provider Party (to the extent previously provided to each Service Recipient in writing). Each party hereto shall promptly notify the other party in the event it or any of its respective Affiliates becomes aware of or suspects that there has been a breach of security or a loss, theft or unauthorized access, use or disclosure of any information technology systems (collectively, “IT Breach”) of any Service Provider Party or any Service Recipient to the extent such (i) IT Breach could adversely affect the provision or receipt of the Services hereunder or such other party’s data or Confidential Information or (ii) notice is required by Applicable Law.
