Information Technology and Data Matters Sample Clauses

Information Technology and Data Matters. (a) Except as has not had and would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect, the IT Assets owned, used, or held for use by the Company or any of its Subsidiaries (i) are sufficient for the current needs of the businesses of the Company and its Subsidiaries; (ii) have not experienced any material failures, breakdowns, outages, or unavailability within the past three (3) years; and (iii) to the knowledge of the Company, are free from any “back door,” virus, malware, Trojan horse or similar malicious code and material bugs. (b) Except as has not had and would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect (i) the Company and each of its Subsidiaries have used commercially reasonable measures to ensure the confidentiality, privacy and security of Personal Information collected or held for use by the Company or its Subsidiaries, and (ii) the Company and each of its Subsidiaries are, and in the past three (3) years have been, in compliance with all Company Data Security Requirements. (c) Except as has not had and would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect, in the past three (3) years, (i) there has been no unauthorized access to or unauthorized use of any IT Assets, Personal Information or trade secrets owned or held for use by the Company or its Subsidiaries, (ii) neither the Company nor any of its Subsidiaries has experienced or been subject to any Security Incident, and (iii) neither the Company nor any of its Subsidiaries has received any written notices or complaints from any Person or been the subject of Proceeding with respect to any Security Incident or breach or violation of any Company Data Security Requirement.
AutoNDA by SimpleDocs
Information Technology and Data Matters. Except as is not and would not reasonably be expected to be, individually or in the aggregate, material to the Business, to the extent applicable to the operations of the Contributed Business Assets in the operation or conduct of the Business, (i) all Computer Systems are in good operating condition and operate in accordance with their applicable documentation in all material respects, and (ii) to the knowledge of Amber GT Parent, none of the Computer Systems contains any Disabling Code. The Amber Entities and their Affiliates (to the extent applicable to their ownership of the Contributed Business Assets in the operation or conduct of the Business) employ commercially reasonable protection and security measures (including commercially reasonable physical, organizational and technological measures) designed to protect the confidentiality, integrity and security of the Computer Systems and designed to detect and safeguard against Disabling Code. The Amber Entities and their Affiliates have in place business continuity and disaster recovery plans that are designed to minimize and mitigate the occurrence, duration and effect of any unscheduled unavailability of the Computer Systems to the extent related to the operation or conduct of the Business. Except as is not and would not reasonably be expected to be, individually or in the aggregate, material to the Business, to the knowledge of Amber GT Parent, to the extent related to the operation or conduct of the Business, there have been no (i) successful unauthorized intrusions or breaches of the security of the Computer Systems, (ii) prolonged periods of unscheduled unavailability of the Computer Systems, or (iii) failures, breakdowns or continued substandard performance of the Computer Systems, in each case that have caused any substantial disruption or interruption in or to the use of the Computer Systems, taken as a whole.
Information Technology and Data Matters. 21 3.13 Litigation ........................................................................................................................... 22 3.14 Brokerage .......................................................................................................................... 22 3.15 Insurance ........................................................................................................................... 22 3.16
Information Technology and Data Matters. All Computer Systems are in good operating condition, operate in accordance with their applicable documentation in all material respects. To the knowledge of the Company, none of the Computer Systems contains any Disabling Code. The Company Group employs commercially reasonable protection and security measures (including commercially reasonable physical, organizational and technological measures) designed to protect the confidentiality, integrity and security of the Computer Systems and designed to detect and safeguard against Disabling Code affecting the Company Group’s Business operations. The Company Group has in place business continuity and disaster recovery plans that are designed to minimize and mitigate the occurrence, duration and effect of any unscheduled unavailability of the Computer Systems. To the knowledge of the Company, there have been no (i) successful unauthorized intrusions or breaches of the security of the Computer Systems, (ii) prolonged periods of unscheduled unavailability of the Computer Systems, or (iii) failures, breakdowns or continued substandard performance of the Computer Systems, in each case that have caused any substantial disruption or interruption in or use of the Computer Systems as a whole or with respect to any portion thereof.
Information Technology and Data Matters. Except as set forth on Schedule 4.17(a), all Computer Systems are in good operating condition and operate in accordance with their applicable documentation in all material respects. To the knowledge of the Company, none of the Computer Systems contains any Disabling Code. The Company Group employs commercially reasonable protection and security measures (including commercially reasonable physical, organizational and technological measures) designed to protect the confidentiality, integrity and security of the Computer Systems and designed to detect and safeguard against Disabling Code affecting the Company Group’s Business operations. To the knowledge of the Company, there have been no (i) successful unauthorized intrusions or breaches of the security of the Computer Systems, (ii) prolonged periods of unscheduled unavailability of the Computer Systems, or (iii) failures, breakdowns or continued substandard performance of the Computer Systems, in each case that have caused any substantial disruption or interruption in or use of the Computer Systems as a whole or with respect to any portion thereof.
Information Technology and Data Matters. (a) Each of the CD Group Companies maintains, and is and has been in compliance in all material respects with, (i) a written information security program that includes commercially reasonable administrative, physical, technical and organizational measures and safeguards to protect the confidentiality, integrity and security of Confidential Information and/or Protected Data, and (ii) written privacy policies that comply with all Data Security Requirements. Each of the CD Group Companies is, and has been, in compliance in all material respects with all Data Security Requirements. Except as set forth in Section 3.12(a) of the Seller Disclosure Schedule, there have not been any Actions conducted or claims asserted by any Person, or notices sent (or required to be sent) or received to or from any Person, regarding Data Treatment by any Person in connection with the Business or any violation of applicable Data Security Requirements, and no such Action is pending or, to the Knowledge of Sellers, threatened and there is no reasonable basis for the same. Neither: (A) the execution and delivery of this Agreement, (B) the consummation of the Closing, nor (C) any transfers of Protected Data to Buyers pursuant to this Agreement (as part of the Purchased Assets or otherwise) will, in any case, result in a breach or violation of, or constitute a default under, any Data Security Requirement. The CD Group Companies maintain valid legal bases to transfer all Protected Data to Buyers pursuant to this Agreement. (b) The CD Group Companies use commercially reasonable efforts to protect the confidentiality, integrity and security of the Business Systems and all information stored or contained therein or transmitted thereby from any unauthorized use, access, interruption or modification by third parties. The CD Group Companies subject to Data Treatment only such customer data (including Protected Data) as they are authorized to subject to Data Treatment by Law or other Data Security Requirement. To the Knowledge of Sellers, there are no material bugs, viruses or material defects, material design or documentation errors, corruption or malicious computer code or programs that can cause harm to any Business System. The CD Group Companies have taken all reasonable precautions to ensure that all Software owned by the CD Group Companies and Business Systems (i) are fully functional and operate and run in a reasonable and efficient business manner, (ii) conform in all material respects...
Information Technology and Data Matters. (a) The Relevant Entities own, lease, license, or otherwise have the legal right to use all Business Systems. The Business Systems owned or controlled by the Relevant Entities are in all material respects operational, fulfill the purposes for which they were acquired or developed, and have security, back-up, and disaster recovery arrangements in place and hardware and software capacity, support and maintenance that are sufficient in all material respects for the business of the Relevant Entities as it is currently conducted. Since the Reference Date, the Relevant Entities have maintained in the ordinary course of business all required licenses and service Contracts, including the purchase of a sufficient number of license seats for all Software, with respect to the Business Systems owned or controlled by the Relevant Entities. Since the Reference Date, there has not been any material failure or outage with respect to any of the Business Systems owned or controlled by the Relevant Entities that has not been remedied or replaced, as appropriate, in all material respects. (b) Except as set forth on Schedule 4.11(b), each of the Relevant Entities is, and has been since the Reference Date, in compliance in all material respects with all Data Security Requirements. Since the Reference Date, the Relevant Entities have not, and, to the Company’s Knowledge, no third party that Processes Protected Data for or on behalf of the Relevant Entities has, experienced any material Security Breaches or any other Security Breaches that required any notification to any affected individual, Governmental Body, or other party pursuant to any Data Security Requirement (regardless of materiality). The Relevant Entities have not, and, to the Company’s Knowledge, no third party that Processes Protected Data for or on behalf of any Relevant Entity has, received any written notices or complaints from any Person (including any Governmental Body) regarding a Security Breach (regardless of materiality) or noncompliance with Data Security Requirements. The Relevant Entities maintain systems and procedures designed to receive and effectively respond to written complaints and, to the extent required by applicable Law, individual rights requests, in connection with the Relevant Entity’s Processing of Personal Information, and, to the extent required by applicable Law, the Relevant Entities have complied in all material respects with all such individual rights requests. (c) The Relevant Entiti...
AutoNDA by SimpleDocs

Related to Information Technology and Data Matters

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Information and Data ‌ Upon request of the Union, the Employer agrees to furnish the Union with the following information: budgets for the Board of Regents; budgets for each College; public information used in the preparation of budgets as provided by law such as salaries; minutes of meetings of the Board; policies of the Board of Regents which apply to faculty members. Voluminous information shall be made available for inspection or will be provided at reproduction cost.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Intellectual Property Rights and Confidentiality Clauses 3.1 Party A shall have exclusive and proprietary ownership, rights and interests in any and all intellectual properties arising out of or created during the performance of this Agreement, including but not limited to copyrights, patents, patent applications, software, technical secrets, trade secrets and others. Party B shall execute all appropriate documents, take all appropriate actions, submit all filings and/or applications, render all appropriate assistance and otherwise conduct whatever is necessary as deemed by Party A at its sole discretion for the purposes of vesting any ownership, right or interest of any such intellectual property rights in Party A, and/or perfecting the protections for any such intellectual property rights in Party A. 3.2 The Parties acknowledge that the existence and the terms of this Agreement and any oral or written information exchanged between the Parties in connection with the preparation and performance of this Agreement are regarded as confidential information. Each Party shall maintain confidentiality of all such confidential information, and without obtaining the written consent of the other Party, it shall not disclose any relevant confidential information to any third party, except for the information that: (a) is or will be in the public domain (other than through the receiving Party’s unauthorized disclosure); (b) is under the obligation to be disclosed pursuant to the applicable laws or regulations, rules of any stock exchange, or orders of the court or other government authorities; or (c) is required to be disclosed by any Party to its shareholders, directors, employees, legal counsels or financial advisors regarding the transaction contemplated hereunder, provided that such shareholders, directors, employees, legal counsels or financial advisors shall be bound by the confidentiality obligations similar to those set forth in this Section. Disclosure of any confidential information by the shareholders, director, employees of or agencies engaged by any Party shall be deemed disclosure of such confidential information by such Party and such Party shall be held liable for breach of this Agreement.

  • Proprietary Matters The Executive expressly understands and agrees that any and all improvements, inventions, discoveries, processes, know-how or intellectual property that are generated or conceived by the Executive during the term of this Agreement, whether generated or conceived during the Executive’s regular working hours or otherwise, will be the sole and exclusive property of the Company. Whenever requested by the Company (either during the term of this Agreement or thereafter), the Executive will assign or execute any and all applications, assignments and or other instruments and do all things which the Company deems necessary or appropriate in order to permit the Company to: (a) assign and convey or otherwise make available to the Company the sole and exclusive right, title, and interest in and to said improvements, inventions, discoveries, processes, know-how, applications, patents, copyrights, trade names or trademarks; or (b) apply for, obtain, maintain, enforce and defend patents, copyrights, trade names, or trademarks of the United States or of foreign countries for said improvements, inventions, discoveries, processes or know-how. However, the improvements, inventions, discoveries, processes or know-how generated or conceived by the Executive and referred to above (except as they may be included in the patents, copyrights or registered trade names or trademarks of the Company, or corporations, partnerships or other entities which may be affiliated with the Company) shall not be exclusive property of the Company at any time after having been disclosed or revealed or have otherwise become available to the public or to a third party on a non-confidential basis other than by a breach of this Agreement, or after they have been independently developed or discussed without a breach of this Agreement by a third party who has no obligation to the Company or its affiliates. The foregoing will not prohibit any activities which are expressly permitted by the last sentence of paragraph 3 of this Agreement during the term of this Agreement.

  • Confidential Information and Intellectual Property (a) Other than in the performance of the Executive’s duties hereunder, the Executive agrees not to use in any manner or disclose, distribute, publish, communicate or in any way cause to be used, disclosed, distributed, published, or communicated in any way or at any time, either while in the Company's employ or at any time thereafter, to any person not employed by the Company, or not engaged to render services to the Company, any Confidential Information (as defined below) obtained while in the employ of the Company. (b) Confidential Information includes any written or unwritten information which relates to and/or is used by the Company or its subsidiaries, affiliates or divisions, including, without limitation (i) the names, addresses, buying habits and other special information regarding past, present and potential customers, employees and suppliers of the Company, (ii) customer and supplier contracts and transactions or price lists of the Company and suppliers, (iii) methods of distribution, (iv) all agreements, files, books, logs, charts, records, studies, reports, processes, schedules and statistical information, (v) data, figures, projections, estimates, pricing data, customer lists, buying manuals or procedures, distribution manuals or procedures, other policy and procedure manuals or handbooks, (vi) supplier information, tax records, personnel histories and records, sales information, and property information, (vii) information regarding the present or future phases of business, (viii) ideas, inventions, trademarks, business information, know-how, processes, techniques, improvements, designs, redesigns, creations, discoveries, trade secrets, and developments, (ix) all computer software licensed or developed by the Company or its subsidiaries, affiliates or divisions, computer programs, computer-based and web-based training programs, and systems, and (x) finances and financial information, but Confidential Information will not include information of the Company or its subsidiaries, affiliates or divisions that (1) became or becomes a matter of public knowledge through sources independent of the Executive, (2) has been or is disclosed by the Company or its subsidiaries, affiliates or divisions without restriction on its use, or (3) has been or is required or specifically permitted to be disclosed by law or governmental order or regulation. The Executive also agrees that, if there is any reasonable doubt whether an item is public knowledge, to not regard the item as public knowledge until and unless the Company’s Chief Executive Officer confirms to the Executive that the information is public knowledge. (c) The provisions of this Section 5 shall not preclude the Executive from disclosing such information to the Executive's professional tax advisor or legal counsel solely to the extent necessary to the rendering of their professional services to the Executive if such individuals agree to keep such information confidential. (d) The Executive agrees that upon leaving the Company’s employ the Executive will remain reasonably available to answer questions from Company officers regarding the Executive’s former duties and responsibilities and the knowledge the Executive obtained in connection therewith. (e) The Executive agrees that upon leaving the Company's employ the Executive will not communicate with, or give statements to, any member of the media (including print, television, or radio media) relating to any matter (including pending or threatening lawsuits or administrative investigations) about which the Executive has knowledge or information (other than knowledge or information that is not Confidential Information) as a result of employment with the Company. The Executive further agrees to notify the Chief Executive Officer or his or her designee immediately after being contacted by any member of the media with respect to any matter affected by this section. (f) The Executive agrees that all information, inventions, and discoveries, whether or not patented or patentable, made or conceived by the Executive, either alone or with others, at any time while employed by the Company, which arises out of such employment or is pertinent to any field of business or research in which, during such employment, the Company, its subsidiaries, affiliates or divisions is engaged or (if such is known to or ascertainable by the Executive) is considering engaging (“Intellectual Property”) shall (i) be and remain the sole property of the Company and the Executive shall not seek a patent with respect to such Intellectual Property without the prior consent of an authorized representative of the Company and (ii) be disclosed promptly to an authorized representative of the Company along with all information the Executive possesses with regard to possible applications and uses. Further, at the request of the Company, and without expense or additional compensation to the Executive, the Executive agrees to execute such documents and perform such other acts as the Company deems necessary to obtain patents on such Intellectual Property in a jurisdiction or jurisdictions designated by the Company, and to assign to the Company or its designee such Intellectual Property and all patent applications and patents relating thereto. (g) The Executive and the Company agree that the Executive intends all original works of authorship within the purview of the copyright laws of the United States authored or created by the Executive in the course of the Executive’s employment with the Company will be works for hire within the meaning of such copyright law. (h) Upon termination of the Executive’s employment, or at any time upon request of the Company, the Executive will return to the Company all Confidential Information and Intellectual Property, in any form, including but not limited to letters, memoranda, reports, notes, notebooks, books of account, drawings, prints, specifications, formulae, data printouts, microfilms, magnetic tapes, disks, recordings, documents, and all copies thereof.

  • Information/Cooperation Executive shall, upon reasonable notice, furnish such information and assistance to the Bank as may be reasonably required by the Bank, in connection with any litigation in which it or any of its subsidiaries or affiliates is, or may become, a party; provided, however, that Executive shall not be required to provide information or assistance with respect to any litigation between Executive and the Bank or any other subsidiaries or affiliates.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!