Information Technology; Cyber Security Clause Samples

Information Technology; Cyber Security. (i) The information technology (including data communications systems, equipment and devices) that each Borrower Affiliate uses in connection with the Project, or sublicenses or otherwise makes available to the Borrower (“IT System”) operates and performs in all material respects as necessary: (A) to permit the Borrower or relevant other Borrower Affiliates to develop, design, engineer, procure, construct, startup, commission, own, operate and maintain the Project; (B) to complete the activities designated to achieve Substantial Completion and Project Completion; and (C) to exercise each Borrower Affiliate’s rights and perform its obligations under the Major Project Documents to which such Borrower Affiliate is a party, as applicable at the relevant time. (ii) Each Borrower Affiliate has implemented and maintains, and has caused each other Borrower Affiliate that is its Subsidiary and each Major Project Participant (as applicable) to implement and maintain in connection with the Project, commercially reasonable privacy, information security, cyber security, disaster recovery, business continuity, data backup and incident response plans, policies and procedures consistent with Prudent Industry Practice (including administrative, technical and physical safeguards) designed to protect: (A) Sensitive Information from any unauthorized, accidental, or unlawful Processing, loss, destruction, or modification; (B) each IT System from any unauthorized or unlawful access, acquisition, use, control, disruption, destruction, or modification; and (C) the integrity, security and availability of the Sensitive Information and IT Systems. (iii) In the past five (5) years, neither any Borrower Affiliate, nor to such Borrower Affiliate’s Knowledge, any Person that Processes Sensitive Information on behalf of such Borrower Affiliate in connection with the Project, has suffered any data breaches or other incidents that have resulted in: (A) any unauthorized Processing of, any Sensitive Information; or (B) any unauthorized access to or acquisition, use, control, disruption or corruption of any of the IT Systems. (iv) Each Borrower Affiliate is and, during the past five (5) years, has been, in material compliance with: (A) all applicable Data Protection Laws; and (B) its contractual obligations, and all binding privacy notices and policies, binding on such Borrower Affiliate and related to the Processing of Sensitive Information. 25 ▇▇▇▇▇▇▇ Pass – Affiliate Suport,Share Retention...
Information Technology; Cyber Security. (a) The information technology (including data communications systems, equipment and devices) used in the business of the Recipient (collectively, the “IT Systems”) operates and performs in all material respects as necessary: (i) for the development, design, engineering, procurement, construction, starting up, commissioning, ownership, operation or maintenance of the Projects; (ii) to complete the activities designated to achieve, for each Project, the Project Completion Date; and (iii) to exercise the Recipient’s rights and perform its obligations under the Financing Documents in a timely manner. (b) The Recipient has implemented and maintains, and has caused, or no later than the first Disbursement Date for the relevant Project, will have caused, each other Recipient Party to implement and maintain in connection with each Project, commercially reasonable privacy, information security, cyber security, disaster recovery, business continuity, data backup and incident response plans, policies and procedures consistent with Prudent Industry Practice (including administrative, technical and physical safeguards) designed to protect: (i) Sensitive Information from any unauthorized, accidental, or unlawful Processing or loss; (ii) each applicable IT System from any unauthorized or unlawful access, acquisition, use, control, disruption, destruction, or modification; and (iii) the integrity, security and availability of the Sensitive Information and IT Systems.
Information Technology; Cyber Security. (a) The information technology (including data communications systems, equipment and devices) used in the business of the Recipient (collectively, the “IT Systems”) operates and performs in all material respects as necessary: (i) for the development, design, engineering, procurement, construction, starting up, commissioning, ownership, operation or maintenance of the Projects; (ii) to complete the activities designated to achieve, for each Project, the Project Completion Date; and (iii) to exercise the Recipient’s rights and perform its obligations under the Financing Documents in a timely manner. (b) The Recipient and each Recipient Party has implemented and maintains, and has caused, or no later than the first Disbursement Date for the relevant Project, will have caused, each Major Project Participant to implement and maintain in connection with each Project, commercially reasonable privacy, information security, cyber security, disaster recovery, business continuity, data backup and incident response plans, policies and procedures consistent with Prudent Industry Practice (including administrative, technical and physical safeguards) designed to protect: (i) Sensitive Information from any unauthorized, accidental, or unlawful Processing or loss; (ii) each applicable IT System from any unauthorized or unlawful access, acquisition, use, control, disruption, destruction, or modification; and (iii) the integrity, security and availability of the Sensitive Information and IT Systems.
Information Technology; Cyber Security. (i) none of the Borrower Entities has received any third party claims, in writing, related to, any loss, theft, unauthorized access to, or unauthorized acquisition, modification, disclosure, retention, processing, corruption, destruction, or other misuse of any information subject to Data Protection Laws (including any ransomware incident); (ii) none of the Borrower Entities has received any written notice of any claims, investigations (including investigations by any Governmental Authority), inquiries or alleged violations relating to any information that is subject to Data Protection Laws and created, received, maintained or transmitted by the Borrower Entities or the Controlled Affiliates; and (iii) none of the Borrower Entities have notified in writing, or been required by Applicable Law, regulation, or contract to notify in writing, any person or entity of any personal data or information security-related incident.
Information Technology; Cyber Security. (a) The information technology (including data communications systems, equipment and devices) used in the business of the Sponsor Guarantor (collectively, the “IT Systems”) operates and performs in all material respects as necessary: (i) for the development, design, engineering, procurement, construction, starting up, commissioning, ownership, operation or maintenance of the Projects; (ii) to complete the activities designated to achieve each Project Completion Date; and (iii) to exercise the Sponsor Guarantor’s rights and perform its obligations under the Financing Documents in a timely manner. (b) The Sponsor Guarantor has implemented and maintains, and has caused, or no later than the first Disbursement Date for the relevant Project, will have caused, each Recipient to implement and maintain in connection with each Project, commercially reasonable privacy, information security, cyber security, disaster recovery, business continuity, data backup and incident response plans, policies and procedures consistent with Prudent Industry Practice (including administrative, technical and physical safeguards) designed to protect: (i) Sensitive Information from any unauthorized, accidental, or unlawful Processing or loss; (ii) each applicable IT System from any 10 unauthorized or unlawful access, acquisition, use, control, disruption, destruction, or modification; and (iii) the integrity, security and availability of the Sensitive Information and IT Systems.