Intellectual Property Rights; Data Processing Sample Clauses
Intellectual Property Rights; Data Processing. (i) To the knowledge of the Seller, Seller and the Seller Subsidiaries own or possess all legal rights to, or are licensed or otherwise have the right to use, all proprietary rights, including, without limitation, trademarks, trade names, service marks and copyrights, if any, that are material to the conduct of their existing businesses. Section 3.01(ee) of the Seller Disclosure Schedule sets forth all proprietary rights that are material to the conduct of the business of Seller or the Seller Subsidiaries. Neither Seller nor any Seller Subsidiary is bound by or a party to any options, licenses or agreements of any kind with respect to any trademarks, service marks or trade names that it claims to own. Neither Seller nor any Seller Subsidiary has received any communications alleging that any of them has violated any of the patents, trademarks, service marks, trade names, copyrights or trade secrets or any other proprietary rights of any other person or entity.
(ii) The computer, information technology and data processing systems, facilities and services, including all software, hardware, networks, communications facilities, platforms and related systems and services (collectively, “Systems”), used by Seller and each of the Seller Subsidiaries are reasonably sufficient for the conduct of the respective businesses of Seller and the Seller Subsidiaries as currently conducted, and such Systems are in good working condition to effectively perform all computing, information technology and data processing operations necessary for the operation of the respective businesses of Seller and each of the Seller Subsidiaries as currently conducted. To Seller’s knowledge, no third party has gained unauthorized access to any such Systems owned or controlled by Seller or any of the Seller Subsidiaries, and Seller and each of the Seller Subsidiaries has taken commercially reasonable steps and implemented commercially reasonable safeguards to ensure that the Systems are secure from unauthorized access and free from any disabling codes or instructions, spyware, Trojan horses, worms, viruses or other software routines that permit or cause unauthorized access to, or disruption, impairment, disablement, or destruction of, software, data or other materials. Seller and each of the Seller Subsidiaries has implemented backup and disaster recovery policies, procedures and systems consistent with generally accepted industry practices for financial institutions of comparable size and com...
