Information Technology and Data Protection. (a) Except as Disclosed, in the 12 months prior to the date hereof no Group Company has suffered failures or bugs in or breakdowns of any System used in connection with the business of any Group Company which have caused any substantial disruption or interruption in or to its use and the Investor is not aware of any fact or matter which is likely to disrupt, interrupt or affect the use of such equipment following the Completion Date on the same basis as it is presently used.
Information Technology and Data Protection. 10.1 All of the systems used by the Companies in connection with the operation of the business of the Companies are maintained and operated exclusively by the Companies and are not wholly or partly dependent on any facilities or means, including any electronic, mechanical or photographic process, computerized or otherwise, (except for the software being located in an external server) which are not under the exclusive ownership and control of the Companies. Each of the Companies’ computer systems, hardware and software and all programs available on and run by the computer systems, perform to their optimal capacity and no errors or defects, which have not been fully remedied, have been discovered therein. Such computer systems contain no virus or potentially harmful program codes. The Companies have complied with all written policy guidelines for all parties with access to its computer systems regarding use of its computer systems, including use of the internet and e-mail, and, to the Sellers’ knowledge, such policy guidelines have been and are being complied with.
Information Technology and Data Protection. 16.1 Copies or details of all material third party contracts under which the IT System is licensed, leased, supplied or maintained to, for or on behalf of the Target Group (the “IT Contracts”) have been disclosed in the Data Room at Folders 8, 16.6 and 16.7.
Information Technology and Data Protection. The Parties shall comply with the provisions of Schedule 8 (Information Technology and Data Protection) as applicable.
Information Technology and Data Protection. (a) The Systems used in connection with the Business are adequate for the current needs of that business, including without limitation as to the system capacity and ability to process current peak volumes in a timely manner.
Information Technology and Data Protection. The Parties shall comply with the provisions of Schedule 10 (information Technology and Data Protection), as applicable.
Information Technology and Data Protection. Except as would not, individually or in the aggregate, have a Material Adverse Effect, the Company and its subsidiaries own or have a valid right to access and use all computer systems, networks, hardware, software, data and databases (including (i) the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its subsidiaries, and (ii) any such data processed or stored by third parties on behalf of the Company and its subsidiaries (such data described in the foregoing clause (ii) being referred to as “Third Party Data”)), equipment or technology, websites and functions used in connection with the business of the Company and the subsidiaries (collectively, “IT Systems and Data” and, without regard to Third Party Data, “Company IT Systems and Data”). The IT Systems and Data are adequate for, and operate and perform as required in connection with, the operation of the business of the Company and its subsidiaries as currently conducted, except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries have implemented commercially reasonable backup, security and disaster recovery technology consistent with applicable regulatory standards and customary industry practices. To the Company’s knowledge, there has been no material security breach or incident, unauthorized access or disclosure, or other compromise relating to the Company IT Systems and Data, and there has been no material security breach or incident, unauthorized access or disclosure, or other material compromise relating to Third Party Data, except in each case for breaches, incidents, unauthorized access or disclosures, or other compromises that would not have a Material Adverse Effect. Neither the Company nor its subsidiaries have been notified of, and have no knowledge of, any event or condition that would result in, (i) any material security breach or incident, unauthorized access or disclosure or other compromise to the Company IT Systems and Data and (ii) any material security breach or incident, unauthorized access or disclosure or other material compromise to Third Party Data. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies...
Information Technology and Data Protection. 8.4.1 Each element of the Business IT is owned by, or used under an agreement with or validly licensed to, the relevant Group Company. The Disclosure Letter contains true, accurate and not misleading details of all such Business IT and relevant agreements and/or licences in all material respects. Each of the Group Companies has complied with all the terms and conditions of all licences and agreements to which it is a party or by which it is bound relating to such Business IT licensed from third parties in all material respects.
Information Technology and Data Protection. 12.1 The Disclosure Documents lists complete and current details of material IT Systems.
Information Technology and Data Protection. 14.1 Except as disclosed in Disclosure Schedule 14.1, the Systems used in connection with the Business are adequate for the immediate and future needs of the Business, including as to the system capacity and ability to process current peak volumes in a timely manner.