Information Technology; Security & Privacy Sample Clauses

Information Technology; Security & Privacy. All material information technology and computer systems (including software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, used in or necessary to the conduct of the business of GETCO or any of its Subsidiaries (collectively, “GETCO IT Systems”) are in all material respects in good working condition to effectively perform the information technology operations necessary to conduct the business of GETCO or any of its Subsidiaries. Since January 1, 2010, neither GETCO nor any of its Subsidiaries has experienced any material disruption to, or material interruption in, its conduct of business attributable to a defect, bug, breakdown or other failure or deficiency of the GETCO IT Systems. GETCO and its Subsidiaries have taken commercially reasonable measures to provide for the back-up and recovery of the data and information necessary to the conduct of the business of GETCO and its Subsidiaries (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of the business of GETCO or any of its Subsidiaries.
AutoNDA by SimpleDocs
Information Technology; Security & Privacy. All material information technology and computer systems (including software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, used in or necessary to the conduct of the business of Knight or any of its Subsidiaries (collectively, “Knight IT Systems”) are in all material respects in good working condition to effectively perform the information technology operations necessary to conduct the business of Knight or any of its Subsidiaries. Since January 1, 2010, neither Knight nor any of its Subsidiaries has experienced any material disruption to, or material interruption in, its conduct of business attributable to a defect, bug, breakdown or other failure or deficiency of the Knight IT Systems. Knight and its Subsidiaries have taken commercially reasonable measures to provide for the back-up and recovery of the data and information necessary to the conduct of the business of Knight and its Subsidiaries (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of the business of Knight or any of its Subsidiaries.
Information Technology; Security & Privacy. All information technology and computer systems and services (including software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, used in or necessary to the conduct of the Company’s business (collectively, “Company IT Systems”) have been properly maintained by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the industry (including strong passwords), to ensure proper operation, monitoring and use. The Company IT Systems are in material compliance with regulatory standards and guidelines as required by applicable Law. The Company has commercially reasonable disaster recovery plans, procedures and facilities for its business and has taken commercially reasonable steps to safeguard Company IT Systems. Company IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct consolidated business. The Company has not experienced since January 1, 2012 any material disruption to, or material interruption in, its conduct of its business attributable to a defect, bug, breakdown, cyber or security breach or other failure or deficiency of the Company IT Systems. The Company has taken reasonable measures to provide for the backup and recovery of the data and information necessary to the conduct of their businesses (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of their respective businesses. The Company, is not in breach of any material contract related to any Company IT Systems. To the Knowledge of the Company, has at all times complied in all material respects with all applicable legal requirements (including but not limited to all regulatory standards and guidelines) relating to privacy, data protection and the collection and use of personal information gathered or accessed in the course of the operations of the Company. The Company has at all times complied in all material respects with all rules, policies and procedures established by the Company from time to time with respect to the foregoing. No claims are pending and, to its Knowledge, no claims have been asserted or threatened agains...
Information Technology; Security & Privacy. (a) All information technology and computer systems relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information whether or not in electronic format, used in or necessary to the conduct of the business of the Company and its Subsidiaries (collectively, “Company IT Systems”) have been properly maintained, in all material respects, by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the entertainment industry and the electronic commerce industry, to ensure proper operation, monitoring and use. The Company IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct the business of the Company and its Subsidiaries in all material respects. The Company and its Subsidiaries have in place a commercially reasonable disaster recovery program, including providing for the regular back-up and prompt recovery of the data and information necessary to the conduct of the business of the Company and its Subsidiaries (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of the business of the Company and its Subsidiaries. (b) All right, title and interest in and to the data included in the Owned Intellectual Property that is material to the business of the Company and its Subsidiaries and contained in any database used or maintained by the Company or its Subsidiaries (collectively, the “Company Data”) is owned by the Company or a Subsidiary, free and clear of all Encumbrances. (c) The Company has established and is in compliance with a written information security program or programs covering the Company and its Subsidiaries that (i) includes safeguards for the security, confidentiality, and integrity of transactions and confidential or proprietary Company Data and (ii) is designed to protect against unauthorized access to the Company IT Systems, Company Data, and the systems of any third party service providers that have access to (A) Company Data or (B) Company IT Systems.
Information Technology; Security & Privacy. (a) To MetroCorp’s Knowledge, all information technology and computer systems (including software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, used in or necessary to the conduct of MetroCorp’s business (collectively, “MetroCorp IT Systems”) have been properly maintained by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the industry, to ensure proper operation, monitoring and use. MetroCorp has commercially reasonable disaster recovery plans, procedures and facilities for its business and has taken commercially reasonable steps to safeguard MetroCorp IT Systems. MetroCorp IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct consolidated business. Neither MetroCorp nor any of its Subsidiaries has experienced within the past three (3) years any material disruption to, or material interruption in, its conduct of its business attributable to a defect, bug, breakdown or other failure or deficiency of MetroCorp IT Systems. MetroCorp and its Subsidiaries have taken reasonable measures to provide for the backup and recovery of the data and information necessary to the conduct of their businesses (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of their respective businesses. Neither MetroCorp nor any of its Subsidiaries is in breach of any material contract related to any MetroCorp IT Systems. (b) MetroCorp has at all times complied in all material respects with all applicable legal requirements relating to privacy, data protection and the collection and use of personal information gathered or accessed in the course of the operations of MetroCorp. MetroCorp has at all times complied in all material respects with all rules, policies and procedures established by MetroCorp from time to time with respect to the foregoing. No claims are pending and, to the Knowledge of MetroCorp, no claims have been asserted or threatened against MetroCorp or are likely to be asserted or threatened against MetroCorp by any Person alleging a violation of such Person’s privacy, personal or confid...
Information Technology; Security & Privacy. All material information technology and computer systems (including Software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information whether or not in electronic format, used in or necessary to the conduct of the business of the Company or any of its Subsidiaries (collectively, “Company IT Systems”) have been properly maintained in all material respects by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the industry, to ensure proper operation, monitoring and use. The Company IT Systems are in all material respects in good working condition to effectively perform all information technology operations necessary to conduct the business of the Company or any of its Subsidiaries. Neither the Company nor any of its Subsidiaries has experienced within the past three (3) years any material disruption to, or material interruption in, its conduct of business attributable to a defect, bug, breakdown or other failure or deficiency of the Company IT Systems. The Company and its Subsidiaries have taken commercially reasonable measures to provide for the back-up and recovery of the data and information necessary to the conduct of the business of the Company and its Subsidiaries (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of the business of the Company or any of its Subsidiaries. Neither the Company nor any of its Subsidiaries is in material breach of any material Contract related to any Company IT System.
Information Technology; Security & Privacy. (i) To the Company’s Knowledge, all information technology and computer systems (including software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, used in or necessary to the conduct of the Company’s business (collectively, “Company IT Systems”) have been properly maintained by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards
AutoNDA by SimpleDocs
Information Technology; Security & Privacy. To CFC’s or Cascade Bank’s knowledge, all information technology and computer systems (including software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, used in or necessary to the conduct of CFC’s business (collectively, “CFC IT Systems”) have been properly maintained by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the industry, to ensure proper operation, monitoring and use. The CFC IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct consolidated business. Neither CFC nor any of its Subsidiaries has experienced within the past three (3) years any material disruption to, or material interruption in, its conduct of its business attributable to a defect, bug, breakdown or other failure or deficiency of the CFC IT Systems. CFC and its Subsidiaries have taken reasonable measures to provide for the back-up and recovery of the data and information necessary to the conduct of their businesses (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of their respective businesses. Neither CFC nor any of its Subsidiaries is in breach of any Material Contract related to any CFC IT Systems.
Information Technology; Security & Privacy. (i) To the Company’s Knowledge, all information technology and computer systems (including software, information technology and telecommunication hardware and other equipment) relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, used in or necessary to the conduct of the Company’s business (collectively, “Company IT Systems”) have been properly maintained by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the industry, to ensure proper operation, monitoring and use. The Company has commercially reasonable disaster recovery plans, procedures and facilities for its business and has taken commercially reasonable steps to safeguard the Company IT Systems. The Company IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct consolidated business. Neither the Company nor any of the Company Subsidiaries has experienced within the past three (3) years any material disruption to, or material interruption in, its conduct of its business attributable to a defect, bug, breakdown or other failure or deficiency of the Company IT Systems. The Company and the Company Subsidiaries have taken reasonable measures to provide for the back-up and recovery of the data and information necessary to the conduct of their businesses (including such data and information that is stored on magnetic or optical media in the ordinary course) without material disruption to, or material interruption in, the conduct of their respective businesses. Neither the Company nor any of the Company Subsidiaries is in breach of any Material Contract related to any Company IT Systems. (ii) The Company has at all times complied in all material respects with all applicable legal requirements relating to privacy, data protection and the collection and use of personal information gathered or accessed in the course of the operations of the Company. The Company has at all times complied in all material respects with all rules, policies and procedures established by the Company from time to time with respect to the foregoing. No claims are pending and, to the Knowledge of the Company, no claims have been asserted or threatened against the Company or are likely to be asserted or threatened against the Company by any Person alleging a ...
Information Technology; Security & Privacy. (a) The Company and each of its Subsidiaries have implemented commercially reasonable backup, security and disaster recovery technologies and procedures that are consistent with industry standards and best practices. To the Knowledge of the Company and except as would not, individually or in the aggregate, be material to the Company and its Subsidiaries, taken as a whole, (i) no Person has gained unauthorized access to any of the Company’s or any of its Subsidiaries’ information technology systems, (ii) there has been no unauthorized access to any Personal Information or other customer, employee and other personally identifiable information held by the Company or any of its Subsidiaries and (iii) the information and data processed and/or stored by the Company or any of its Subsidiaries in connection with the operation of its respective business has not been corrupted or compromised. (b) The IT Assets operate and perform in accordance with the Company’s and its Subsidiaries’ internal standards as well as any applicable warranties, documentation, and functional specifications, and otherwise as currently required by the Company and its Subsidiaries, except where such failure of compliance, has not had and would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect. The IT Assets have not materially malfunctioned, been materially breached, or failed within the past five (5) years. The IT Assets do not contain any “time bombs,” “trojan horses,” “back doors,” “trap doors,” worms, viruses, bugs, spyware, keylogger software, or other faults or malicious devices that could adversely impact the functionality of the IT Assets or allow third parties to track or monitor activity using such IT Assets, except such faults or malicious devices that have not had and would not reasonably be expected to have, individually or in the aggregate, a Company Material Adverse Effect. None of the IT Assets contain, incorporate, include, or are embedded with any shareware, freeware open source code, or other software subject to a general public license or other public or similar licensing regime, except as would not be reasonably expected to have, individually or in the aggregate, a Company Material Adverse Effect.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!