IT Assets, Data Privacy and Security Sample Clauses
The 'IT Assets, Data Privacy and Security' clause establishes the obligations and standards for handling information technology resources and safeguarding sensitive data. It typically outlines requirements for the proper use, protection, and management of hardware, software, and digital information, including compliance with relevant data privacy laws and implementation of security measures such as encryption or access controls. This clause is essential for minimizing the risk of data breaches, ensuring regulatory compliance, and protecting both parties’ confidential information throughout the course of the agreement.
IT Assets, Data Privacy and Security. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (i) the computers, websites, applications, databases, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company (including any third party technology or services used by the Company but excluding any public networks) (collectively, the “IT Assets”) operate and perform as necessary for the operation of the business of the Company as currently conducted, (ii) to the Company’s Knowledge, the IT Assets are free and clear of all viruses, vulnerabilities, bugs, errors, defects, Trojan horses, time bombs, malware and other malicious code, and (iii) the Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their confidential information and the privacy, confidentiality, integrity, and security of all IT Assets and data (including all Personal Data (defined below), sensitive, confidential, or regulated data (collectively, “Confidential Data”)) used in connection with their businesses. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, there have been no breaches, outages, or unauthorized uses of, or accesses to IT Assets or Confidential Data (each, a “Breach”), nor any Breaches under internal review or investigation by the Company in relation to the same. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, the Company complies, and has complied, with all applicable state and federal data privacy and security laws and regulations and industry standards applicable to the performance of Company’s obligations under any contracts regarding the collection, use, storage, retention, disclosure, transfer, disposal, or any other processing (collectively “Process” or “Processing”) and privacy, confidentiality, integrity and security of Personal Data (“Privacy Laws”). To ensure compliance with the Privacy Laws, the Company has in place, comply with, and take appropriate steps designed to ensure compliance in all material respects with the Company’s policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Confidential Data (the “Policies”). The Company and, to the Company’s Knowledge, any third par...
IT Assets, Data Privacy and Security. The computers, websites, applications, databases, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company and its subsidiaries (excluding any public networks) (collectively, the “IT Assets”) are adequate for, and operate and perform for, the operation of the business of the Company and its subsidiaries as currently conducted and as proposed to be conducted as described in the Registration Statement, the Pricing Disclosure Package and the Prospectus. To the knowledge of the Company, the IT Assets are free and clear of material viruses, vulnerabilities, disabling code or other harmful code that may reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries have at all times implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their confidential information and the
IT Assets, Data Privacy and Security. The computers, websites, applications, databases, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company and its subsidiaries (including any third party technology or services used by the Company but excluding any public networks) (collectively, the “IT Assets”) are, in all material respects, adequate for, and operate and perform for, the operation of the business of the Company and its subsidiaries as currently conducted and as proposed to be conducted as described in the Registration Statement, the Pricing Disclosure Package and the Prospectus. To the Company’s knowledge, the IT Assets are free and clear of all viruses, vulnerabilities, bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have at all times implemented and maintained reasonable controls, policies, procedures, and safeguards designed to maintain and protect the privacy, confidentiality, integrity, continuous operation, redundancy and security of all IT Assets, Personal Data (defined below), and sensitive, confidential, or regulated data (collectively, “Confidential Data”)) used in connection with their businesses. There have been no actual breaches of, violations of, outages of, or unlawful or unauthorized uses of, destruction of, losses of, alterations of, or accesses to IT Assets and no unlawful or unauthorized uses of, destruction of, losses of, alterations of, or
IT Assets, Data Privacy and Security. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (i) the computers, websites, applications, databases, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company and its subsidiaries (including any third party technology or services used by the Company but excluding any public networks) (collectively, the “IT Assets”) operate and perform as necessary for the operation of the business of the Company and its subsidiaries as currently conducted, (ii) to the knowledge of the Company, the IT Assets are free and clear of all viruses, vulnerabilities, bugs, errors, defects, Trojan horses, time bombs, malware and other malicious code, and (iii) the Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their confidential information and the privacy, confidentiality, integrity, and security of all IT Assets and data (including all Personal Data (defined below), sensitive, confidential, or regulated data (collectively, “Confidential Data”)) used in connection with their businesses. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, there have been no breaches, outages, or unauthorized uses of, or accesses to IT Assets or Confidential Data (each, a “Breach”), nor any
IT Assets, Data Privacy and Security. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (i) the computers, websites, applications, databases, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company (including any third party technology or services used by the Company but excluding any public networks) (collectively, the “IT Assets”) operate and perform as necessary for the operation of the business of the Company as currently conducted, (ii) to the Company’s Knowledge, the IT Assets are free and clear of all viruses, vulnerabilities, bugs, errors, defects, Trojan horses, time bombs, malware and other malicious code, and (iii) the Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their confidential information and the privacy, confidentiality, integrity, and security of all IT Assets and data (including all Personal Data (defined below), sensitive, confidential, or regulated data (collectively, “Confidential Data”)) used in connection with their businesses. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, there have been no breaches, outages, or unauthorized uses of, or accesses to IT Assets or Confidential Data (each, a
IT Assets, Data Privacy and Security. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, the computers, websites, applications, databases, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company and its subsidiaries (excluding any public networks) (collectively, the “IT Assets”) operate and perform as is necessary for, the operation of the business of the Company and its subsidiaries as currently conducted and as proposed to be conducted as described in the Registration Statement and the Prospectus. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, the IT Assets are free and clear of viruses, vulnerabilities, disabling code or other harmful code. The Company and its subsidiaries have at
IT Assets, Data Privacy and Security. The computers, websites, applications, databases, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company and its subsidiaries (including any third party technology or services used by the Company and its subsidiaries but excluding any public networks) (collectively, the “IT Assets”) are, in all material respects, adequate for, and operate and perform for, the operation of the business of the Company and its subsidiaries as currently conducted and as proposed to be conducted as described in the Registration Statement, the General Disclosure Package and the Prospectus. To the Company’s knowledge, the IT Assets are free and clear of all viruses, vulnerabilities, bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have at all times implemented and maintained reasonable controls, policies, procedures, and safeguards designed
IT Assets, Data Privacy and Security. Except as otherwise described in the Disclosure Documents or would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (i) the computers, websites, applications, databases, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company and its subsidiaries (excluding any public networks) (collectively, the “IT Assets”) are adequate for, and operate and perform for, the operation of the business of the Company and its subsidiaries as currently conducted, and (ii) the IT Assets are free and clear of all viruses, vulnerabilities, bugs, errors, defects, Trojan horses, time
IT Assets, Data Privacy and Security. Except as would not reasonably be expected to have a Material Adverse Effect, (i) the computers, websites, applications, databases, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company and its subsidiaries (including any information technology resources provided by third parties but excluding any public networks) (collectively, the “IT Assets”) are adequate for, and operate and perform as is necessary for, the operation of the business of the Company and its subsidiaries as currently conducted and as proposed to be conducted as described in the Registration Statement, the Pricing Disclosure Package and the Prospectus and (ii) the IT Assets are free and clear of viruses, vulnerabilities, disabling code or other harmful code. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards (including all necessary administrative, technical, and physical controls) to maintain and protect their confidential information and the integrity, continuous operation, redundancy and security of all IT Assets and data (including all Personal Data (defined below), sensitive, confidential, or regulated data
IT Assets, Data Privacy and Security. The computers, websites, applications, databases, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company and its subsidiaries (excluding any public networks) (collectively, the “IT Assets”) are adequate for, and operate and perform for, the operation of the business of the Company and its subsidiaries as currently conducted and as proposed to be conducted as described in the Registration Statement and the Prospectus. To the Knowledge of the Company, the IT Assets are free and clear of material viruses, vulnerabilities, disabling code or other harmful code that may reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries have at all times implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their confidential information and the integrity, continuous operation, redundancy and security of all IT Assets and data (including all Personal Data (defined below), sensitive, confidential, or regulated data (“Confidential Data”)) used in connection with their businesses. With respect to each third party performing services for the Company and its subsidiaries that is or has been permitted to access or process Confidential Data or IT Assets (including contract research organizations and contract manufacturing organizations), the Company has obtained a written agreement from such third party that binds such third party to (A) at least the same restrictions and conditions that apply to the Company with respect to such Confidential Data or IT Assets, (B) implement reasonable and appropriate measures for protecting such Confidential Data or IT Assets from unlawful
