Intellectual Property; Data Privacy and Security. (a) The Company is the sole and exclusive owner of all Owned Intellectual Property, free and clear of all Liens. All Owned Intellectual Property is valid and enforceable. Schedule 3.10(a) contains an accurate and complete list of all Owned Intellectual Property (including Trademarks, and Software). All registered Intellectual Property has been maintained effective by the filing of all necessary filings, maintenance and renewals and timely payment of requisite fees. No loss or expiration of any Owned Intellectual Property is threatened, pending or reasonably foreseeable, except for patents expiring at the end of their statutory terms (and not as a result of any act or omission by the Company, including failure by the Company to pay any required maintenance fees). (b) The Company has taken all necessary and desirable action to maintain and protect all of the Owned Intellectual Property. The Company has taken commercially reasonable measures to protect the confidentiality of all trade secrets and any other confidential information of the Company (and any confidential information owned by any Person to whom the Company has a confidentiality obligation). No such trade secrets or other confidential information have been disclosed by the Company to any Person other than pursuant to a written Contract restricting the disclosure and use of such trade secrets or any other confidential information by such Person. No current or former founder, employee, contractor or consultant of the Company has any right, title or interest, directly or indirectly, in whole or in part, in any Owned Intellectual Property. The Company has obtained from all Persons (including all current and former founders, employees and contractors) who have created any Intellectual Property for the Company, valid and enforceable written assignments of any such Intellectual Property to the Company, and the Company has delivered true and complete copies of such assignments to Buyer. No Person is in violation of any such written confidentiality or assignment Contracts. (c) The IT Assets are operational, fulfill the purposes for which they were acquired or developed, have security, back-ups and disaster recovery arrangements in place and hardware and Software capacity, support, maintenance and trained personnel which are sufficient in all material respects for the current and anticipated future needs of the business of the Company. The Company has disaster recovery and security plans, procedures and facilities and have taken reasonable steps consistent with or exceeding industry standards to safeguard the availability, security and integrity of the IT Assets and all data and information stored thereon, including from unauthorized access and infection by Malicious Code. The Company has maintained in the Ordinary Course of Business all required licenses and service contracts, including the purchase of a sufficient number of license seats for all Software, with respect to the IT Assets. The IT Assets have not suffered any security breach or material failure. (d) The Company and the former and current products, services and conduct of the business of the Company, including the manufacture, importation, use, offer for sale, sale, licensing, distribution or other commercial exploitation thereof have not infringed, misappropriated or otherwise violated, and do not infringe, misappropriate or otherwise violate, any Intellectual Property rights or rights of publicity of any Person. The Company is not the subject of any pending Proceeding that either alleges a claim of infringement, misappropriation or other violation of any Intellectual Property rights of any Person or challenges the ownership, use, patentability, registration, validity or enforceability of any Owned Intellectual Property, and no such claims have been asserted or threatened against the Company at any time. No Person has notified the Company that any of such Person’s Intellectual Property rights are infringed, misappropriated or otherwise violated by the Company or that the Company requires a license to any of such Person’s Intellectual Property rights. There is no actual unauthorized use, interference, disclosure, infringement, misappropriation or other violation by any Person of any of the Owned Intellectual Property, and no written or oral claims alleging such infringement, misappropriation or other violation have been made against any Person by the Company. (e) The Company is and always has been in compliance with all applicable Privacy and Security Requirements. The Company has not, and no third-party Processing Protected Data on behalf of the Company has, experienced any Security Breaches, and neither the Company nor any Member is aware of any notices or complaints from any Person regarding such a Security Breach. The Company has not received any notices or complaints from any Person (including any Governmental Entity) regarding the unauthorized Processing of Protected Data or non-compliance with applicable Privacy and Security Requirements. The Company does not engage in the sale, as defined by applicable Privacy and Security Requirements, of Personal Information. (f) The Company has valid and legal rights to Process all Protected Data that is Processed by or on behalf of the Company in connection with the use and/or operation of its products, services and business, and the execution, delivery, or performance of this Agreement will not affect these rights or violate any applicable Privacy and Security Requirements. The Company has implemented, and has required all third parties that receive Personal Information or Protected Data from or on behalf of the Company to implement, reasonable physical, technical and administrative safeguards consistent with industry standards that are designed to protect Protected Data from unauthorized access by any Person, and to ensure compliance in all material respects with all applicable Privacy and Security Requirements.
Appears in 4 contracts
Samples: Equity Purchase Agreement (Cannabist Co Holdings Inc.), Equity Purchase Agreement (Verano Holdings Corp.), Equity Purchase Agreement (Cannabist Co Holdings Inc.)
Intellectual Property; Data Privacy and Security. (a) The Company is the sole and exclusive owner of all Owned Intellectual Property, free and clear of all Liens. All Owned Intellectual Property is valid and enforceable. Schedule 3.10(a) contains an accurate and complete list of all Owned Intellectual Property (including Trademarks, and Software). All registered Intellectual Property has been maintained effective by the filing of all necessary filings, maintenance and renewals and timely payment of requisite fees. No loss or expiration of any Owned Intellectual Property is threatened, pending or reasonably foreseeable, except for patents expiring at the end of their statutory terms (and not as a result of any act or omission by the Company, including failure by the Company to pay any required maintenance fees).
(b) The Company has taken all necessary and desirable action to maintain and protect all of the Owned Intellectual Property. The Company has taken commercially reasonable measures to protect the confidentiality of all trade secrets and any other confidential information of the Company (and any confidential information owned by any Person to whom the Company has a confidentiality obligation). No such trade secrets or other confidential information have been disclosed by the Company to any Person other than pursuant to a written Contract restricting the disclosure and use of such trade secrets or any other confidential information by such Person. No current or former founder, employee, contractor or consultant of the Company has any right, title or interest, directly or indirectly, in whole or in part, in any Owned Intellectual Property. The Company has obtained from all Persons (including all current and former founders, employees and contractors) who have created any Intellectual Property for the Company, valid and enforceable written assignments of any such Intellectual Property to the Company, and the Company has delivered true and complete copies of such assignments to Buyer. No Person is in violation of any such written confidentiality or assignment Contracts.
(c) The IT Assets are operational, fulfill the purposes for which they were acquired or developed, have security, back-ups and disaster recovery arrangements in place and hardware and Software capacity, support, maintenance and trained personnel which are sufficient in all material respects for the current and anticipated future needs of the business of the Company. The Company has disaster recovery and security plans, procedures and facilities and have taken reasonable steps consistent with or exceeding industry standards to safeguard the availability, security and integrity of the IT Assets and all data and information stored thereon, including from unauthorized access and infection by Malicious Code. The Company has maintained in the Ordinary Course of Business all required licenses and service contracts, including the purchase of a sufficient number of license seats for all Software, with respect to the IT Assets. The IT Assets have not suffered any security breach or material failure.
(d) The Company and the former and current products, services and conduct of the business of the Company, including the manufacture, importation, use, offer for sale, sale, licensing, distribution or other commercial exploitation thereof have not infringed, misappropriated or otherwise violated, and do not infringe, misappropriate or otherwise violate, any Intellectual Property rights or rights of publicity of any Person. The Company is not the subject of any pending Proceeding that either alleges a claim of infringement, misappropriation or other violation of any Intellectual Property rights of any Person or challenges the ownership, use, patentability, registration, validity or enforceability of any Owned Intellectual Property, and no such claims have been asserted or threatened against the Company at any time. No Person has notified the Company that any of such Person’s Intellectual Property rights are infringed, misappropriated or otherwise violated by the Company or that the Company requires a license to any of such Person’s Intellectual Property rights. There is no actual unauthorized use, interference, disclosure, infringement, misappropriation or other violation by any Person of any of the Owned Intellectual Property, and no written or oral claims alleging such infringement, misappropriation or other violation have been made against any Person by the Company.
(e) The Company is and always has been in compliance with all applicable Privacy and Security Requirements. The Company has not, and no third-party Processing Protected Data on behalf of the Company has, experienced any Security Breaches, and neither the Company nor any the Member is aware of any notices or complaints from any Person regarding such a Security Breach. The Company has not received any notices or complaints from any Person (including any Governmental Entity) regarding the unauthorized Processing of Protected Data or non-compliance with applicable Privacy and Security Requirements. The Company does not engage in the sale, as defined by applicable Privacy and Security Requirements, of Personal Information.
(f) The Company has valid and legal rights to Process all Protected Data that is Processed by or on behalf of the Company in connection with the use and/or operation of its products, services and business, and the execution, delivery, or performance of this Agreement will not affect these rights or violate any applicable Privacy and Security Requirements. The Company has implemented, and has required all third parties that receive Personal Information or Protected Data from or on behalf of the Company to implement, reasonable physical, technical and administrative safeguards consistent with industry standards that are designed to protect Protected Data from unauthorized access by any Person, and to ensure compliance in all material respects with all applicable Privacy and Security Requirements.
Appears in 2 contracts
Samples: Equity Purchase Agreement (Verano Holdings Corp.), Equity Purchase Agreement (Cannabist Co Holdings Inc.)
Intellectual Property; Data Privacy and Security. (a) The Company is the sole and exclusive owner of all Owned Intellectual Property, free and clear of all Liens. All Owned Intellectual Property is valid and enforceable. Schedule 3.10(a) contains an accurate and complete list of all Owned Intellectual Property (including Trademarks, and Software). All registered Intellectual Property has been maintained effective by the filing of all necessary filings, maintenance and renewals and timely payment of requisite fees. No loss or expiration of any Owned Intellectual Property is threatened, pending or reasonably foreseeable, except for patents expiring at the end of their statutory terms (and not as a result of any act or omission by the Company, including failure by the Company to pay any required maintenance fees).
(b) The Company has taken all necessary and desirable action to maintain and protect all of the Owned Intellectual Property. The Company has taken commercially reasonable measures to protect the confidentiality of all trade secrets and any other confidential information of the Company (and any confidential information owned by any Person to whom the Company has a confidentiality obligation). No such trade secrets or other confidential information have been disclosed by the Company to any Person other than pursuant to a written Contract restricting the disclosure and use of such trade secrets or any other confidential information by such Person. No current or former founder, employee, contractor or consultant of the Company has any right, title or interest, directly or indirectly, in whole or in part, in any Owned Intellectual Property. The Company has obtained from all Persons (including all current and former founders, employees and contractors) who have created any Intellectual Property for the Company, valid and enforceable written assignments of any such Intellectual Property to the Company, and the Company has delivered true and complete copies of such assignments to Buyer. No Person is in violation of any such written confidentiality or assignment Contracts.
(c) The IT Assets are operational, fulfill the purposes for which they were acquired or developed, have security, back-ups and disaster recovery arrangements in place and hardware and Software capacity, support, maintenance and trained personnel which are sufficient in all material respects for the current and anticipated future needs of the business of the Company. The Company has disaster recovery and security plans, procedures and facilities and have taken reasonable steps consistent with or exceeding industry standards to safeguard the availability, security and integrity of the IT Assets and all data and information stored thereon, including from unauthorized access and infection by Malicious Code. The Company has maintained in the Ordinary Course of Business all required licenses and service contracts, including the purchase of a sufficient number of FH12251261.5 license seats for all Software, with respect to the IT Assets. The IT Assets have not suffered any security breach or material failure.
(d) The Company and the former and current products, services and conduct of the business of the Company, including the manufacture, importation, use, offer for sale, sale, licensing, distribution or other commercial exploitation thereof have not infringed, misappropriated or otherwise violated, and do not infringe, misappropriate or otherwise violate, any Intellectual Property rights or rights of publicity of any Person. The Company is not the subject of any pending Proceeding that either alleges a claim of infringement, misappropriation or other violation of any Intellectual Property rights of any Person or challenges the ownership, use, patentability, registration, validity or enforceability of any Owned Intellectual Property, and no such claims have been asserted or threatened against the Company at any time. No Person has notified the Company that any of such Person’s Intellectual Property rights are infringed, misappropriated or otherwise violated by the Company or that the Company requires a license to any of such Person’s Intellectual Property rights. There is no actual unauthorized use, interference, disclosure, infringement, misappropriation or other violation by any Person of any of the Owned Intellectual Property, and no written or oral claims alleging such infringement, misappropriation or other violation have been made against any Person by the Company.
(e) The Company is and always has been in compliance with all applicable Privacy and Security Requirements. The Company has not, and no third-party Processing Protected Data on behalf of the Company has, experienced any Security Breaches, and neither the Company nor any the Member is aware of any notices or complaints from any Person regarding such a Security Breach. The Company has not received any notices or complaints from any Person (including any Governmental Entity) regarding the unauthorized Processing of Protected Data or non-compliance with applicable Privacy and Security Requirements. The Company does not engage in the sale, as defined by applicable Privacy and Security Requirements, of Personal Information.
(f) The Company has valid and legal rights to Process all Protected Data that is Processed by or on behalf of the Company in connection with the use and/or operation of its products, services and business, and the execution, delivery, or performance of this Agreement will not affect these rights or violate any applicable Privacy and Security Requirements. The Company has implemented, and has required all third parties that receive Personal Information or Protected Data from or on behalf of the Company to implement, reasonable physical, technical and administrative safeguards consistent with industry standards that are designed to protect Protected Data from unauthorized access by any Person, and to ensure compliance in all material respects with all applicable Privacy and Security Requirements.
Appears in 1 contract