Common use of IT Systems Clause in Contracts

IT Systems. (i)(x)To the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 3 contracts

Samples: Underwriting Agreement (AerSale Corp), Underwriting Agreement (AerSale Corp), Underwriting Agreement (AerSale Corp)

AutoNDA by SimpleDocs

IT Systems. (i)(x)To i)(x) To the knowledge of the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all contractually mandated industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 2 contracts

Samples: Underwriting Agreement (Emcore Corp), Underwriting Agreement (Emcore Corp)

IT Systems. (i)(x)To i)(x) To the knowledge of the Company’s knowledge, there has been no material security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any material security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all contractually mandated industry guidelines, guidelines or standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practiceappropriate to its business.

Appears in 2 contracts

Samples: Underwriting Agreement (Protara Therapeutics, Inc.), Underwriting Agreement (Protara Therapeutics, Inc.)

IT Systems. (i)(x)To the Company’s knowledge, there i)(x)There has been no reportable security breach or attack or other compromise of or relating to any of the Company’s and its subsidiariesthe Subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries the Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any reportable security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries the Subsidiaries have materially complied, and are are, in all material respects, presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practicepractice in all material respects.

Appears in 2 contracts

Samples: Underwriting Agreement (Turning Point Brands, Inc.), Underwriting Agreement (Standard Diversified Inc.)

IT Systems. (i)(x)To the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or ​ ​ technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Underwriting Agreement (AerSale Corp)

IT Systems. (i)(x)To the Company’s knowledge, there i)(x) There has been no material security breach or attack or other material compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any material security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have materially complied, and are presently in material compliance with, in all material respects, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Sales Agreement (MedAvail Holdings, Inc.)

IT Systems. (i)(x)To the Company’s knowledge, knowledge there has been no material security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any material security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, in all material respects, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Underwriting Agreement (Biolife Solutions Inc)

IT Systems. (i)(x)To the Company’s knowledgei) Since October 1, 2019 (x) there has been no material security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any material security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practicepractice in the respective countries in which they are headquartered.

Appears in 1 contract

Samples: Underwriting Agreement (Clearfield, Inc.)

AutoNDA by SimpleDocs

IT Systems. (i)(x)To i)(x) To the Company’s knowledgeKnowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Underwriting Agreement (Jasper Therapeutics, Inc.)

IT Systems. (i)(x)To i)(x) To the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiariesSubsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially each Subsidiary has complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have each Subsidiary has implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Sales Agreement (22nd Century Group, Inc.)

IT Systems. (i)(x)To i)(x) To the Company’s knowledge, there has been no material security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any material security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, in all material respects, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Underwriting Agreement (X4 Pharmaceuticals, Inc)

IT Systems. (i)(x)To i)(x) To the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiariesSubsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries Subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Appears in 1 contract

Samples: Sales Agreement (Greenlane Holdings, Inc.)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!