Information Technology; Security and Privacy Sample Clauses

Information Technology; Security and Privacy. (a) All information technology and computer systems relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information whether or not in electronic format, necessary to the conduct of the business of the Company and its Subsidiaries (collectively, “Company IT Systems”) have been maintained, in all material respects, in accordance with reasonable and commercial standards suggested by the manufacturer of third-party-owned systems or in accordance with standards reasonably prudent in the entertainment industry and the electronic commerce industry, that are designed to encourage proper operation, monitoring and use. The Company IT Systems are currently in good working condition with respect to the performance of information technology operations necessary to conduct the business of the Company and its Subsidiaries in all material respects. The Company and its Subsidiaries have in place a commercially reasonable disaster recovery program that provides for the regular back-up of, and addresses recovery of, the data and information necessary to the conduct of the business of the Company and its Subsidiaries (including such data and information that is stored on magnetic or optical media in the ordinary course), and as of the date hereof, such disaster recovery program operates under normal circumstances without material disruption to, or material interruption in, the conduct of the business of the Company and its Subsidiaries. (b) All right, title and interest in and to the confidential and proprietary data included in the Owned Intellectual Property Rights that is material to the business of the Company and its Subsidiaries and contained in any database used or maintained by the Company or its Subsidiaries (collectively, the “Company Data”) is owned by the Company or a Subsidiary, free and clear of all Encumbrances except Permitted Encumbrances. All computer programs included within the Owned Intellectual Property Rights are not licensed pursuant to a so-called “open source” license and do not incorporate and are not based on any computer programs that are licensed pursuant to a so-called “open source” license. (c) The Company and its Subsidiaries have established and are in material compliance with written information security procedures covering the Company and its Subsidiaries that are in accordance with current standards reasonable in the entertainment industry and the electronic commerc...
AutoNDA by SimpleDocs
Information Technology; Security and Privacy. Except as has not had, or would not reasonably be expected to have, individually or in the aggregate, a Parent Material Adverse Effect, (a) since January 1, 2010, (i) there have been, to the Knowledge of Parent, no security breaches in Parent’s or any of the Parent Subsidiariesinformation technology systems, and (ii) there have been no disruptions in any of Parent or the Parent Subsidiaries’ information technology systems that adversely affected Parent’s or any of the Parent Subsidiaries’ business or operations; and (b) Parent has established and is in compliance with a written information security program or programs covering Parent and the Parent Subsidiaries that (i) includes safeguards for the security, confidentiality, and integrity of transactions and confidential or proprietary Parent Data and (ii) is designed to protect against unauthorized access to the Parent IT Systems, Parent Data, and the systems of any Third Party service providers that have access to (A) Parent Data or (B) Parent IT Systems.
Information Technology; Security and Privacy. Except as has not had, or would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect, (a) since January 1, 2010, (i) there have been, to the Knowledge of the Company, no security breaches in the Company’s or any of the Company Subsidiariesinformation technology systems, and (ii) there have been no disruptions in any of the Company’s or the Company Subsidiaries’ information technology systems that adversely affected the Company’s or any of the Company Subsidiaries’ business or operations; and (b) the Company has established and is in compliance with a written information security program or programs covering the Company and the Company Subsidiaries that (i) includes safeguards for the security, confidentiality, and integrity of transactions and confidential or proprietary Company Data and (ii) is designed to protect against unauthorized access to the Company IT Systems, Company Data, and the systems of any Third Party service providers that have access to (A) Company Data or (B) Company IT Systems.
Information Technology; Security and Privacy. Except as has not had, or would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect, (a) since January 1, 2008, (i) there have been, to the Knowledge of the Company, no security breaches in the Company’s or any of the Company Subsidiariesinformation technology systems, and (ii) there have been no disruptions in any of the Company’s or the Company Subsidiaries’ information technology systems that adversely affected the Company’s or any of the Company Subsidiaries’ business or operations; (b) no material capital expenditures are necessary with respect to the Company’s or the Company Subsidiaries’ information technology systems with respect to their businesses as currently conducted, other than capital expenditures in the Ordinary Course of Business that are consistent with the past practice of the Company or the Company Subsidiaries; and (c) the Company has established and is in compliance with a written information security program or programs covering the Company and the Company Subsidiaries that (i) includes safeguards for the security, confidentiality, and integrity of transactions and confidential or proprietary Company Data and (ii) is designed to protect against unauthorized access to the Company IT Systems, Company Data, and the systems of any third party service providers that have access to (A) Company Data or (B) Company IT Systems.
Information Technology; Security and Privacy. (a) To the Knowledge of the Contributors, all information technology and computer systems, including Software, hardware, networks, interfaces, and related systems, relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, material to the conduct of the business of the Contributed Companies, their Subsidiaries and the Contributed Businesses (collectively, “Contributed Company IT Systems”) are in good working condition to effectively perform all information technology operations necessary to conduct the business of the Contributed Companies, their Subsidiaries and the Contributed Businesses in all material respects. The Contributed Companies and Subsidiaries thereof have in place a commercially reasonable disaster recovery program consistent with commercially reasonable protection disaster recovery program customarily used in the same industry as the business of the Contributed Companies, their Subsidiaries and the Contributed Businesses. (b) Each Contributed Company has implemented commercially reasonable security measures consistent with measures customarily used in the same industry as the business of the Contributed Companies, their Subsidiaries and the Contributed Businesses that are designed to protect against unauthorized use, access, interruption, modification or corruption of the Contributed Company IT Systems. (c) To the Knowledge of the Contributors, the Contributed Company IT Systems are sufficient for the immediate needs of the business of the Contributed Companies, their Subsidiaries and the Contributed Businesses. To the Knowledge of the Contributors, since the Relevant Date, there has not been any: (i) material outage affecting any Contributed Company IT System; or (ii) material data security breach or other unauthorized use, access, interruption, modification or corruption of any Contributed Company IT System, or written complaint, written notice to, or audit, proceeding or investigation conducted or claim asserted by any Person against any Contributed Company or Subsidiary thereof regarding any actual or alleged security breach or other unauthorized use, access, interruption, modification or corruption of any Contributed Company IT System.
Information Technology; Security and Privacy. To the Company’s and the Stockholder’s knowledge, all information technology and computer systems (including software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, used in or necessary in the conduct of the business of the Company and its Subsidiaries (collectively, “Company IT Systems”) have been properly maintained by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the industry. As of the Closing Date, to Company’s and the Stockholder’s knowledge, the Company IT Systems are in good working condition to effectively perform all information technology operations of the Business as conducted by the Company immediately prior to the Closing.
Information Technology; Security and Privacy. 1.10.1 The Company and the Company Subsidiaries own, lease or license-in all Company IT Systems used in or necessary for the conduct of the business of the Company and the Company Subsidiaries as currently conducted. All Company IT Systems have been properly maintained, in all material respects, by technically competent personnel, in accordance with standards set by the manufacturers, to ensure proper operation, monitoring and use. The Company IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct the business of the Company and the Company Subsidiaries in all material respects. The Company and the Company Subsidiaries have in place a commercially reasonable disaster recovery program, including providing for the regular back-up and prompt recovery of the data and information necessary for the conduct of the business of the Company and the Company Subsidiaries as currently conducted (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of the business of the Company and the Company Subsidiaries. 1.10.2 All right, title and interest in and to the data included in the Company Intellectual Property that is material to the business of the Company and the Company Subsidiaries and contained in any database used or maintained by the Company or the Company Subsidiaries (collectively, the “Company Data”) is owned or under a right to use by the Company or a Company Subsidiary, free and clear of all liens. Except as set forth in Schedule 1.10.2, the Company IT Systems have not failed in the three (3) years preceding the Effective Date in any manner or been compromised to any extent other than such failures or compromises that, individually or in the aggregate, are immaterial, and the Company Data has not been corrupted or, to the Company’s Knowledge, accessed by any unauthorized Person. 1.10.3 The Company has established and is in compliance in all material respects with a written information security program or programs covering the Company and the Company Subsidiaries that (i) includes safeguards for the security, confidentiality and integrity of transactions and confidential or proprietary Company Data and (ii) is designed to protect against unauthorized access to the Company IT Systems, Company Data and the systems of any third party service providers that have access to (A) ...
AutoNDA by SimpleDocs
Information Technology; Security and Privacy. (a) All information technology and computer systems, including software, hardware, networks, interfaces, and related systems, relating to the transmission, storage, maintenance, processing or analysis of data and information, whether or not in electronic format, material to the conduct of the business of the Acquired Companies, taken as a whole, (collectively, “Acquired Company IT Systems”) have been maintained in all material respects in accordance with prudent industry standards. All Acquired Companies have in place a disaster recovery program designed to provide for the regular back-up and recovery of the data and information material to the conduct of the business of the Acquired Companies without material adverse impact to the conduct of the business of the Acquired Companies, taken as a whole. (b) All right, title and interest in and to the data included in any Company Intellectual Property and other information (including personal information regarding any Person) that is material to the business of the Acquired Companies, taken as a whole, and contained in any database used or otherwise maintained by an Acquired Company in any form or medium (collectively, the “Acquired Company Data”) is owned, leased or licensed by such Acquired Company. (c) Since December 31, 2018, to the Company’s Knowledge, there has not been any (i) material disruption, interruption, outage or continued substandard performance affecting any Acquired Company IT System in any material respect or (ii) to the Company’s Knowledge, any material incidents of physical or data security breaches or other material unauthorized use, access, interruption, modification or corruption of any Acquired Company IT System or any Acquired Company Data, or any material written complaints, notices to, or audits, proceedings or investigations conducted or claims asserted by any Person against any Acquired Company regarding any actual or alleged material security breach or other material unauthorized use, access, interruption, modification or corruption of any Acquired Company IT System.
Information Technology; Security and Privacy. To Company’s knowledge, all information technology and computer systems (including software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, used in or necessary in the conduct of the Business (collectively, “Company IT Systems”) have been properly maintained by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the industry. As of the Closing Date, to Company’s knowledge, the Company IT Systems are in good working condition to effectively perform all information technology operations of the Business as conducted by Company immediately prior to the Closing.
Information Technology; Security and Privacy. (a) All information technology and computer systems relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information whether or not in electronic format, used in or necessary to the conduct of the business of the Targets (collectively, “IT Systems”) have been properly maintained, in all material respects, by technically competent personnel, in accordance with standards set by the manufacturers, to ensure proper operation, monitoring and use. The IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct the business of the Targets in all material respects. The Targets have in place a commercially reasonable disaster recovery program, including providing for the regular back-up and commercially prompt recovery of the data and information necessary to the conduct of the business of the Targets (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of the business of the Targets. (b) All right, title and interest in and to the data included in the Intellectual Property of the Targets and contained in any database used or maintained by a Target (collectively, the “Target Data”) is owned by a Target, free and clear of all Encumbrances. (c) The Targets have established and are in material compliance with a written information security program or programs covering the Targets that (i) includes safeguards for the security, confidentiality, and integrity of transactions and confidential or proprietary Target Data and (ii) is designed to protect against unauthorized access to the IT Systems, Target Data, and the systems of any third party service providers that have access to (A) Target Data or (B) the IT Systems.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!