Information Technology; Data Privacy Sample Clauses

The Information Technology; Data Privacy clause establishes requirements and responsibilities for handling personal and sensitive data within the scope of the agreement. It typically outlines how parties must collect, store, process, and protect data, often referencing compliance with relevant data protection laws such as GDPR or CCPA. This clause ensures that both parties maintain appropriate safeguards for data privacy, thereby reducing the risk of data breaches and legal liability.
POPULAR SAMPLE Copied 4 times
Information Technology; Data Privacy. (a) Except as has not had, and would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect, (i) neither the Company nor any of its Subsidiaries has experienced any defects in any Software or other information technology systems used or held for use by the Company or its Subsidiaries, including any material error, omission, interruption or delay in the processing of any transactions or data, and (ii) no Software used or held for use by the Company or its Subsidiaries contains any device or feature designed to disrupt, disable, or otherwise impair the functioning of any Software or any back door, time bomb, Trojan, worm, drop-dead device, or other code or routines that permit unauthorized access or the unauthorized disablement or erasure of such Software or information or data (or all parts thereof) or other Software of users. (b) The Company and its Subsidiaries maintain disaster recovery plans that are adequate to ensure that the computer hardware, Software and data used by the Company and its Subsidiaries can be replaced or substituted without material disruption to their respective businesses. (c) The Company and its Subsidiaries have adequate procedures in place to ensure internal and external security of the computer hardware, Software and data used or held for use in their respective businesses, including adequate technical, physical and organizational measures for preventing unauthorized access to Company Data, preventing the introduction of viruses and making and storing on-site and off-site back-up copies of Software and data. To the Knowledge of the Company, there have been no security breaches in the information technology systems used by the Company or any of its Subsidiaries except as would not be, or reasonably be expected to be, individually or in the aggregate, material to the Company and its Subsidiaries, taken as a whole. (d) Except as has not had, and would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect, no material Software owned by the Company or any of its Subsidiaries is subject to the terms of any “open source” or other similar license that provides for any source code of such Software to be disclosed, licensed, publicly distributed or dedicated to the public. (e) The Company and its Subsidiaries’ data, privacy and security practices conform, and since January 1, 2019 have conformed, to all of the Privacy Commitments in all mate...
Information Technology; Data Privacy. (a) The Company has taken commercially reasonable steps to ensure the continued operation of the material software and databases included in the Company Owned IP Rights, and all of its material computers and other information technology infrastructure and assets used in the business (collectively, the “IT Assets”), and to protect the security and confidentiality of its IT Assets and the material information and records stored on or accessed or transmitted using the IT Assets. The IT Assets of the Company operate and perform in all material respects as is necessary and sufficient for the conduct of the business of the Company as currently conducted by them. To the Company’s Knowledge, the IT Assets are free from malicious code and do not contain any bugs, errors, vulnerabilities or problems that, in each case, would be expected to materially adversely affect the operation or use of any such IT Assets in the business of the Company. To the Company’s Knowledge, there has not been in the past three (3) years any material (i) unauthorized intrusions or breach of the security of the IT Assets, (ii) malfunction of the IT Assets or (iii) accidental or unauthorized access to, loss or misuse of Personal Data maintained by the Company. The Company has implemented commercially reasonable backups and security measures to duplicate, store and protect its material information that is stored in electronic form or media. (b) The Company and, to the Knowledge of the Company, each of the Company’s Data Processors, is in compliance in all material respects with all applicable Data Privacy Requirements. To the Company’s Knowledge, the Company is not under investigation by any Governmental Body for a material violation of applicable Laws relating to data privacy or security, nor has the Company received any written complaint or inquiry related to its data privacy or security practices. The Company and, to the Knowledge of the Company, each of the Company’s Data Processors, has implemented and maintains commercially reasonable organizational, physical, administrative and technical measures substantially consistent with industry standards to protect the operation, confidentiality, integrity and security of all Personal Data or other sensitive business data against loss, theft, or unauthorized access, disclosure or use. To the Company’s Knowledge, the Company has not experienced any security incident in which an unauthorized party accessed or acquired Personal Data or sensitive bu...
Information Technology; Data Privacy. (a) Parent has taken commercially reasonable steps to ensure the continued operation of the material software and databases included in the Parent Owned IP Rights, and all of its material computers and other information technology infrastructure and assets used in the business (collectively, the “Parent IT Assets”), and to protect the security and confidentiality of the Parent IT Assets and the material information and records stored on or accessed or transmitted using the Parent IT Assets. The Parent IT Assets operate and perform in all material respects as is necessary and sufficient for the conduct of the business of Parent as currently conducted by it. To Parent’s Knowledge, the Parent IT Assets are free from malicious code and do not contain any bugs, errors, vulnerabilities or problems that, in each case, would be expected to materially adversely affect the operation or use of any such Parent IT Assets in the business of Parent. To Parent’s Knowledge, there has not been in the past three (3) years any material (i) unauthorized intrusions or breach of the security of the Parent IT Assets, (ii) malfunction of the Parent IT Assets or (iii) accidental or unauthorized access to, loss or misuse of Personal Data maintained by Parent. Parent has implemented commercially reasonable backups and security measures to duplicate, store and protect its material information that is stored in electronic form or media. (b) Parent and, to the Knowledge of Parent, each of Parent’s Data Processors, is in compliance in all material respects with all applicable Data Privacy Requirements. To Parent’s Knowledge, Parent is not under investigation by any Governmental Body for a material violation of applicable Laws relating to data privacy or security, nor has Parent received any written complaint or inquiry related to its data privacy or security practices. Parent and, to the Knowledge of Parent, each of Parent’s Data Processors, has implemented and maintains commercially reasonable organizational, physical, administrative and technical measures substantially consistent with industry standards to protect the operation, confidentiality, integrity and security of all Personal Data or other sensitive business data against loss, theft, or unauthorized access, disclosure or use. To Parent’s Knowledge, Parent has not experienced any security incident in which an unauthorized party accessed or acquired Personal Data or sensitive business data maintained by or on behalf of Parent.