Information Technology Systems Sample Clauses

Information Technology Systems. The assessor(s) will complete electronic reports on site and may need the use of a computer and printer in order to leave a copy of the assessment documentation with the customer’s representative. All assessment personnel are required to keep their personal IT system virus free, but should a problem arise, Centre for Assessment cannot accept responsibility for any corruption of the customer’s IT systems. The customer has the right to refuse access to their IT Systems.
Information Technology Systems. ‌ Each institution will provide access to telephone service and information technology systems for each faculty unit member under substantially similar conditions to those available to full-time instructional or research faculty unit members holding professorial rank.
Information Technology Systems. 7.1. The Implementer will implement security protocols consistent with those established in the Policy Manual and compliant with Privacy Laws for any Customer Information that is downloaded from or stored outside of SPECTRUM that is under Implementer’s control. 7.2. The Implementer shall maintain sufficient information technology systems (software, hardware, network speeds, etc.) to enable them to fully access and utilize SPECTRUM. The connectivity speed of the Implementers and its subcontractors may be tested if required by the Policy Manual. 7.3. No software license purchase or IT systems development may occur by the Implementer Subcontractor using Focus on Energy funds without a waiver being obtained from the Administrator.
Information Technology Systems. Own or have access to (through arm’s length service contracts including the IT Service Agreement and the Reliant Parent Services Agreement if the same are then in effect), at all times, the Information Technology Systems necessary to run the Retail Energy Business, including Information Technology Systems providing capabilities consistent with the arrangements in place for the Retail Energy Business as of the Effective Date (taking into account the Transition Agreement if then in effect).
Information Technology Systems. The IT Systems of EMV and its Subsidiaries are in good working condition to effectively perform all computing, information technology and data processing operations necessary for the operation of the business of EMV and its Subsidiaries. In the three years prior to the date of this Agreement, there has been no unauthorized access, use, intrusion, or failure, breakdown or continued substandard performance of any IT System that has caused (i) a material disruption or interruption in or to the operation of any business of EMV or any of its Subsidiaries or (ii) material loss, destruction, damage, or harm of or to EMV (or any of its Subsidiaries) or its operations, personnel, property, or other assets. EMV has taken steps consistent with applicable industry best practices, to protect the integrity and security of the IT Systems of EMV and the data and other information stored thereon. EMV has taken commercially reasonable steps to provide for the remote-site back-up of data and information critical to the conduct of its business in an attempt to avoid material disruption to, or material interruption in, the conduct of such business. EMV has taken appropriate measures in accordance with industry practices to ensure disaster recovery and business continuity plans in the event of disaster or emergency.
Information Technology Systems. In the operation of the Business, Seller does not rely on Elecsys or any Affiliate of Elecsys for any services or support with respect to any computer network, telecommunication or other information technology systems and has no links with the computer network, telecommunication or other information technology systems of Elecsys or any Affiliate of Elecsys without which the Business could not be run as presently conducted.
Information Technology Systems. C omputing and Communication: Party shall select, in consultation with the Agency of Human ServicesInformation Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Party as part of this agreement. Options include, but are not limited to: 1. Party’s provision of certified computing equipment, peripherals and mobile devices, on a separate Party’s network with separate internet access. The Agency of Human Services’ accounts may or may not be provided. 2. State supplied and managed equipment and accounts to access state applications and data, including State issued active directory accounts and application specific accounts, which follow the National Institutes of Standards and Technology (NIST) security and the Health Insurance Portability & Accountability Act (HIPAA) standards. I ntellectual Property/Work Product Ownership: All data, technical information, materials first gathered, originated, developed, prepared, or obtained as a condition of this agreement and used in the performance of this agreement -- including, but not limited to all reports, surveys, plans, charts, literature, brochures, mailings, recordings (video or audio), pictures, drawings, analyses, graphic representations, software computer programs and accompanying documentation and printouts, notes and memoranda, written procedures and documents, which are prepared for or obtained specifically for this agreement, or are a result of the services required under this grant -- shall be considered "work for hire" and remain the property of the State of Vermont, regardless of the state of completion unless otherwise specified in this agreement. Such items shall be delivered to the State of Vermont upon 30-days notice by the State. With respect to software computer programs and / or source codes first developed for the State, all the work shall be considered "work for hire,” i.e., the State, not the Party (or subcontractor or sub-grantee), shall have full and complete ownership of all software computer programs, documentation and/or source codes developed. Party shall not sell or copyright a work product or item produced under this agreement without explicit permission from the State of Vermont. If Party is operating a system or application on behalf of the State of Vermont, Party shall not make information entered into the system or application available for uses by any other pa...
Information Technology Systems. A.24.1 The Seller has disclosed copies of all the agreements required to use, support, maintain and/or develop all components of the computer systems (including all Licenses, development agreements, software maintenance and support agreements, hardware maintenance agreements, source code escrow agreements and disaster-recovery agreements). The Buyer has waived any details to be represented herein. A.24.2 The Company has not breached any of its obligations under any of the agreements referred to in B.24.1, those agreements all remain in full force and effect as at Closing and no notice has been served by any party to terminate any of those agreements. A.24.3 Save as stated in the agreements referred to in A.24.1, the Company is not restricted in any way in using the computer systems (whether by way of a technical device or otherwise). A.24.4 The use of the computer systems by the Company does not, and the continued use of the computer systems by the Buyer after Closing will not, infringe the Intellectual Property rights of any third party. A.24.5 The Company has exclusive control of the operation of the computer systems and of the storage, processing and retrieval of all data stored on the computer systems, and solely the Company owns any Intellectual Property rights in such data. A.24.6 All Intellectual Property Rights in the developed software are owned by the Company and the Company has in its possession an up-to-date, useable and complete copy of the source code for all developed software together with copies of all programmers’ commentaries and technical documentation required to allow the continuing maintenance and development of that software by the Buyer. A.24.7 The computer systems have adequate functionality, capability and capacity for the present requirements of the Company, and each part of the computer systems is compatible with each other part. A.24.8 The computer systems have not been used to hold or process data in any manner that contravenes the applicable laws.
Information Technology Systems. (A) The Company is not aware of any security breach or other compromise relating to the Company’s or its subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (including the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”), except for those that have been remedied without material cost or liability or that would not reasonably be expected to have a Material Adverse Effect; (B) neither the Company nor any of its subsidiaries have been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any material security breach or other compromise to their IT Systems and Data; and (C) the Company and its subsidiaries have implemented appropriate controls, policies, procedures and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority and internal policies relating to the privacy and security of IT Systems and Data and to the reasonable protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification except as would not reasonably be expected to have a Material Adverse Effect.
Information Technology Systems. The Internal IT Systems are either owned by, or licensed or leased to, the Group Companies. None of the Group Companies has, in the twelve months prior to the date of this Agreement, received a written notice from a third party alleging that a Group Company is in default under licences or leases relating to the Internal IT Systems.