IT Systems. (i)(x)To the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.
Appears in 3 contracts
Samples: Underwriting Agreement (AerSale Corp), Underwriting Agreement (AerSale Corp), Underwriting Agreement (AerSale Corp)
IT Systems. (i)(x)To i)(x) To the knowledge of the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all contractually mandated industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.
Appears in 2 contracts
Samples: Underwriting Agreement (Emcore Corp), Underwriting Agreement (Emcore Corp)
IT Systems. (i)(x)To i)(x) To the knowledge of the Company’s knowledge, there has been no material security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any material security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all contractually mandated industry guidelines, guidelines or standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practiceappropriate to its business.
Appears in 2 contracts
Samples: Underwriting Agreement (Protara Therapeutics, Inc.), Underwriting Agreement (Protara Therapeutics, Inc.)
IT Systems. (i)(x)To the Company’s knowledge, there i)(x)There has been no reportable security breach or attack or other compromise of or relating to any of the Company’s and its subsidiariesthe Subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries the Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any reportable security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries the Subsidiaries have materially complied, and are are, in all material respects, presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practicepractice in all material respects.
Appears in 2 contracts
Samples: Underwriting Agreement (Turning Point Brands, Inc.), Underwriting Agreement (Standard Diversified Inc.)
IT Systems. (i)(x)To the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.
Appears in 1 contract
IT Systems. (i)(x)To the Company’s knowledge, there i)(x) There has been no material security breach or attack or other material compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any material security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have materially complied, and are presently in material compliance with, in all material respects, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.
Appears in 1 contract
IT Systems. (i)(x)To the Company’s knowledge, knowledge there has been no material security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any material security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, in all material respects, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.
Appears in 1 contract
IT Systems. (i)(x)To the Company’s knowledgei) Since October 1, 2019 (x) there has been no material security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any material security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practicepractice in the respective countries in which they are headquartered.
Appears in 1 contract
IT Systems. (i)(x)To i)(x) To the Company’s knowledgeKnowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.
Appears in 1 contract
IT Systems. (i)(x)To i)(x) To the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiariesSubsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially each Subsidiary has complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have each Subsidiary has implemented backup and disaster recovery technology consistent with industry standards and practice.
Appears in 1 contract
IT Systems. (i)(x)To i)(x) To the Company’s knowledge, there has been no material security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any material security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, in all material respects, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.
Appears in 1 contract
IT Systems. (i)(x)To i)(x) To the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiariesSubsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and (y) the Company and its subsidiaries Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries Subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.
Appears in 1 contract