Common use of Information Technology Systems and Data Clause in Contracts

Information Technology Systems and Data. Except to the extent it would not be reasonably expected to have a Material Adverse Effect, the information technology assets, equipment, computers, systems, networks, hardware, software, internet websites, applications, data and databases (including the Personal Data, the data of their respective customers, employees, suppliers, vendors and any other third party data maintained, processed or transmitted by or on behalf of the Company and the Company Subsidiaries) used by or on behalf of the Company and Company Subsidiaries (collectively, “IT Systems and Data”) are reasonably adequate for, and operate and perform as required in connection with, the operation of the businesses of the Company and the Company Subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and each Company Subsidiary take and have taken all reasonable technical and organizational measures necessary to protect the IT Systems and Data. Without limiting the foregoing, the Company and the Company Subsidiaries have used commercially reasonable efforts to establish and maintain, and have established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans, consistent with industry standards and practices, that are designed to protect against and prevent the breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or any other compromise or misuse, in each case, of or relating to any IT Systems and Data (“Breach”). There has been no Breach, and the Company and the Company Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any Breach except as would not be reasonably expected to have a Material Adverse Effect.

Appears in 8 contracts

Samples: Investment Agreement (Owlet, Inc.), Stock Purchase Agreement (Nikola Corp), Exchange and Investment Agreement (Nikola Corp)

AutoNDA by SimpleDocs

Information Technology Systems and Data. Except to the extent it would not be reasonably expected to have a Material Adverse Effect, the information technology assets, equipment, computers, systems, networks, hardware, software, internet websites, applications, data and databases (including the Personal Data, the data of their respective customers, employees, suppliers, vendors and any other third party data maintained, processed or transmitted by or on behalf of the Company and the Company Subsidiaries) used by or on behalf of the Company and Company Subsidiaries (collectively, “IT Systems and Data”) are reasonably adequate for, and operate and perform as required in connection with, the operation of the businesses of the Company and the Company Subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and each Company Subsidiary take and have taken all reasonable technical and organizational measures necessary to protect the IT Systems and Data. Without limiting the foregoing, the Company and the Company Subsidiaries have used commercially reasonable efforts to establish and maintain, and have established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans, consistent with industry standards and practices, that are designed to protect against and prevent the breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or any other compromise or misuse, in each case, of or relating to any IT Systems and Data (“Breach”). There has been no Breach, and the Company and the Company Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any Breach except as would not be reasonably expected to have a Material Adverse EffectBreach.

Appears in 4 contracts

Samples: Subscription Agreement (Oatly Group AB), Investment Agreement (Oatly Group AB), Subscription Agreement (Oatly Group AB)

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.