{"component": "clause", "props": {"groups": [{"samples": [{"hash": "gDsCLnSx1P5", "uri": "/contracts/gDsCLnSx1P5#it-systems", "label": "Underwriting Agreement (Statera Biopharma, Inc.)", "score": 33.2272415161, "published": true}, {"hash": "klA7czUh8mb", "uri": "/contracts/klA7czUh8mb#it-systems", "label": "Underwriting Agreement (AppTech Payments Corp.)", "score": 33.0246391296, "published": true}, {"hash": "3bkAuv7Ekvd", "uri": "/contracts/3bkAuv7Ekvd#it-systems", "label": "Underwriting Agreement (SIMPLICITY ESPORTS & GAMING Co)", "score": 32.7782325745, "published": true}], "snippet": "Except as would not, individually or in the aggregate, have a Material Adverse Effect, the Company reasonably believes that (i) the Company and the Subsidiaries own or have a valid right to access and use all computer systems, networks, hardware, software, databases, websites, and equipment used to process, store, maintain and operate data, information, and functions used in connection with the business of the Company and the Subsidiaries (the \u201cCompany IT Systems\u201d), (ii) the Company IT Systems are adequate for, and operate and perform as required in connection with, the operation of the business of the Company and the Subsidiaries as currently conducted and (iii) the Company and the Subsidiaries have implemented reasonable backup, security and disaster recovery technology consistent with applicable regulatory standards;", "size": 84, "snippet_links": [{"key": "in-the-aggregate", "type": "definition", "offset": [37, 53]}, {"key": "material-adverse-effect", "type": "clause", "offset": [62, 85]}, {"key": "reasonably-believes", "type": "definition", "offset": [99, 118]}, {"key": "right-to-access-and-use", "type": "clause", "offset": [181, 204]}, {"key": "computer-systems", "type": "definition", "offset": [209, 225]}, {"key": "equipment-used", "type": "clause", "offset": [282, 296]}, {"key": "maintain-and-operate", "type": "clause", "offset": [316, 336]}, {"key": "in-connection-with", "type": "clause", "offset": [375, 393]}, {"key": "business-of-the-company-and-the-subsidiaries", "type": "clause", "offset": [398, 442]}, {"key": "company-it-systems", "type": "definition", "offset": [449, 467]}, {"key": "as-required", "type": "clause", "offset": [541, 552]}, {"key": "operation-of-the-business-of-the-company", "type": "clause", "offset": [577, 617]}, {"key": "security-and-disaster-recovery", "type": "clause", "offset": [741, 771]}, {"key": "consistent-with", "type": "definition", "offset": [783, 798]}, {"key": "regulatory-standards", "type": "definition", "offset": [810, 830]}], "hash": "08aee7eae0baebf47120423722d5a8f6", "id": 1}, {"samples": [{"hash": "8PV5z02Zl31", "uri": "/contracts/8PV5z02Zl31#it-systems", "label": "Sales Agreement (Agriforce Growing Systems Ltd.)", "score": 36.8083496094, "published": true}, {"hash": "hUWKrgM8axc", "uri": "/contracts/hUWKrgM8axc#it-systems", "label": "At Market Issuance Sales Agreement (OptimumBank Holdings, Inc.)", "score": 35.6036949158, "published": true}, {"hash": "4nrJwIiEhNb", "uri": "/contracts/4nrJwIiEhNb#it-systems", "label": "Sales Agreement (Geron Corp)", "score": 35.1642723083, "published": true}], "snippet": "(i)(x) To the knowledge of Company, there has been no security breach or other compromise of any Company\u2019s information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, \u201cIT Systems and Data\u201d) and (y) the Company has not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data; (ii) the Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, have a Material Adverse Effect; and (iii) the Company has implemented backup and disaster recovery technology consistent with industry standards and practices.", "size": 52, "snippet_links": [{"key": "knowledge-of-company", "type": "definition", "offset": [14, 34]}, {"key": "security-breach", "type": "definition", "offset": [54, 69]}, {"key": "information-technology-and-computer-systems", "type": "clause", "offset": [107, 150]}, {"key": "the-data", "type": "clause", "offset": [198, 206]}, {"key": "third-party-data", "type": "definition", "offset": [276, 292]}, {"key": "by-or-on-behalf-of", "type": "definition", "offset": [304, 322]}, {"key": "it-systems-and-data", "type": "clause", "offset": [370, 389]}, {"key": "the-company-has", "type": "clause", "offset": [400, 415]}, {"key": "no-knowledge", "type": "clause", "offset": [447, 459]}, {"key": "compliance-with-all-applicable-laws", "type": "clause", "offset": [646, 681]}, {"key": "rules-and-regulations", "type": "clause", "offset": [721, 742]}, {"key": "governmental-or-regulatory-authority", "type": "definition", "offset": [773, 809]}, {"key": "internal-policies", "type": "definition", "offset": [811, 828]}, {"key": "obligations-relating-to-the", "type": "clause", "offset": [845, 872]}, {"key": "security-of-it-systems", "type": "clause", "offset": [885, 907]}, {"key": "protection-of", "type": "definition", "offset": [928, 941]}, {"key": "unauthorized-use", "type": "clause", "offset": [972, 988]}, {"key": "in-the-case", "type": "clause", "offset": [1053, 1064]}, {"key": "this-clause", "type": "clause", "offset": [1068, 1079]}, {"key": "in-the-aggregate", "type": "definition", "offset": [1102, 1118]}, {"key": "material-adverse-effect", "type": "clause", "offset": [1127, 1150]}, {"key": "backup-and-disaster-recovery", "type": "clause", "offset": [1190, 1218]}, {"key": "consistent-with", "type": "definition", "offset": [1230, 1245]}, {"key": "standards-and-practices", "type": "clause", "offset": [1255, 1278]}], "hash": "0a414150c6214d5d57ed02ba492c2712", "id": 2}, {"samples": [{"hash": "yed7XU1EsE", "uri": "/contracts/yed7XU1EsE#it-systems", "label": "Capital on Demand Sales Agreement (New Horizon Aircraft Ltd.)", "score": 36.1211509705, "published": true}, {"hash": "jp2TkgnY0wb", "uri": "/contracts/jp2TkgnY0wb#it-systems", "label": "Sales Agreement (Anavex Life Sciences Corp.)", "score": 34.5701560974, "published": true}, {"hash": "iEaXV716p4G", "uri": "/contracts/iEaXV716p4G#it-systems", "label": "Sales Agreement (Tectonic Therapeutic, Inc.)", "score": 34.5126609802, "published": true}], "snippet": "(i)(x)There has been no security breach or attack or other compromise of or relating to any of the Company\u2019s and its subsidiaries\u2019 information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (\u201cIT Systems and Data\u201d), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and each of its subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.", "size": 32, "snippet_links": [{"key": "security-breach", "type": "definition", "offset": [24, 39]}, {"key": "of-the-company", "type": "clause", "offset": [92, 106]}, {"key": "information-technology-and-computer-systems", "type": "clause", "offset": [131, 174]}, {"key": "the-data", "type": "clause", "offset": [222, 230]}, {"key": "third-party-data", "type": "definition", "offset": [300, 316]}, {"key": "by-or-on-behalf-of", "type": "definition", "offset": [328, 346]}, {"key": "it-systems-and-data", "type": "clause", "offset": [380, 399]}, {"key": "the-company-and-its-subsidiaries", "type": "clause", "offset": [411, 443]}, {"key": "knowledge-of", "type": "definition", "offset": [483, 495]}, {"key": "in-compliance-with", "type": "definition", "offset": [717, 735]}, {"key": "all-applicable-laws", "type": "clause", "offset": [737, 756]}, {"key": "regulation-of", "type": "clause", "offset": [799, 812]}, {"key": "authority-and", "type": "clause", "offset": [867, 880]}, {"key": "industry-guidelines", "type": "clause", "offset": [885, 904]}, {"key": "internal-policies", "type": "definition", "offset": [917, 934]}, {"key": "obligations-relating-to-the", "type": "clause", "offset": [951, 978]}, {"key": "security-of-it-systems", "type": "clause", "offset": [991, 1013]}, {"key": "protection-of", "type": "definition", "offset": [1034, 1047]}, {"key": "unauthorized-use", "type": "clause", "offset": [1078, 1094]}, {"key": "backup-and-disaster-recovery", "type": "clause", "offset": [1205, 1233]}, {"key": "consistent-with", "type": "definition", "offset": [1245, 1260]}, {"key": "industry-standards", "type": "definition", "offset": [1261, 1279]}], "hash": "7c60e2525e75c88af500a07971983ca1", "id": 4}, {"samples": [{"hash": "glpnfZN7EN9", "uri": "/contracts/glpnfZN7EN9#it-systems", "label": "Securities Purchase Agreement (Greenland Mines LTD)", "score": 37.2464065708, "published": true}, {"hash": "9htWDpH2p8q", "uri": "/contracts/9htWDpH2p8q#it-systems", "label": "Securities Purchase Agreement (RedCloud Holdings PLC)", "score": 37.1560592651, "published": true}, {"hash": "QCL9E0Ox8R", "uri": "/contracts/QCL9E0Ox8R#it-systems", "label": "Securities Purchase Agreement (Tivic Health Systems, Inc.)", "score": 36.9425048828, "published": true}], "snippet": "To the Knowledge of Company, (i)(A) there has been no security breach or other compromise of any of the Company\u2019s or its Subsidiaries\u2019 information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, \u201cIT Systems and Data\u201d), and (B) the Company has not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to the IT Systems and Data, except as would not, in the case of this clause (i), individually or in the aggregate, have a Material Adverse Effect; (ii) the Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or Governmental Entity, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, have a Material Adverse Effect; and (c) the Company has implemented backup and disaster recovery technology consistent with industry standards and practices.", "size": 39, "snippet_links": [{"key": "knowledge-of-company", "type": "definition", "offset": [7, 27]}, {"key": "security-breach", "type": "definition", "offset": [54, 69]}, {"key": "of-the-company", "type": "clause", "offset": [97, 111]}, {"key": "information-technology-and-computer-systems", "type": "clause", "offset": [135, 178]}, {"key": "the-data", "type": "clause", "offset": [226, 234]}, {"key": "third-party-data", "type": "definition", "offset": [304, 320]}, {"key": "by-or-on-behalf-of", "type": "definition", "offset": [332, 350]}, {"key": "it-systems-and-data", "type": "clause", "offset": [398, 417]}, {"key": "the-company-has", "type": "clause", "offset": [429, 444]}, {"key": "no-knowledge", "type": "clause", "offset": [475, 487]}, {"key": "in-the-case", "type": "clause", "offset": [651, 662]}, {"key": "this-clause", "type": "clause", "offset": [666, 677]}, {"key": "in-the-aggregate", "type": "definition", "offset": [699, 715]}, {"key": "material-adverse-effect", "type": "clause", "offset": [724, 747]}, {"key": "compliance-with-all-applicable-laws", "type": "clause", "offset": [791, 826]}, {"key": "rules-and-regulations", "type": "clause", "offset": [866, 887]}, {"key": "governmental-entity", "type": "definition", "offset": [918, 937]}, {"key": "internal-policies", "type": "definition", "offset": [939, 956]}, {"key": "obligations-relating-to-the", "type": "clause", "offset": [973, 1000]}, {"key": "security-of-it-systems", "type": "clause", "offset": [1013, 1035]}, {"key": "protection-of", "type": "definition", "offset": [1056, 1069]}, {"key": "unauthorized-use", "type": "clause", "offset": [1100, 1116]}, {"key": "backup-and-disaster-recovery", "type": "clause", "offset": [1316, 1344]}, {"key": "consistent-with", "type": "definition", "offset": [1356, 1371]}, {"key": "standards-and-practices", "type": "clause", "offset": [1381, 1404]}], "hash": "dc7470adb2fc249eedb4c55ce814c2cb", "id": 3}, {"samples": [{"hash": "9DLWbQt92Lg", "uri": "/contracts/9DLWbQt92Lg#it-systems", "label": "Underwriting Agreement (AerSale Corp)", "score": 32.9520874023, "published": true}, {"hash": "ezvUQn3l26l", "uri": "/contracts/ezvUQn3l26l#it-systems", "label": "Underwriting Agreement (AerSale Corp)", "score": 31.8788509369, "published": true}, {"hash": "4HlZ78ROiLG", "uri": "/contracts/4HlZ78ROiLG#it-systems", "label": "Underwriting Agreement (AerSale Corp)", "score": 31.6269683838, "published": true}], "snippet": "(i)(x)To the Company\u2019s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company\u2019s and its subsidiaries\u2019 information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (\u201cIT Systems and Data\u201d), and (y) the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, (ii) the Company and its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification and (iii) the Company and its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.", "size": 19, "snippet_links": [{"key": "security-breach", "type": "definition", "offset": [52, 67]}, {"key": "of-the-company", "type": "clause", "offset": [120, 134]}, {"key": "information-technology-and-computer-systems", "type": "clause", "offset": [159, 202]}, {"key": "the-data", "type": "clause", "offset": [250, 258]}, {"key": "third-party-data", "type": "definition", "offset": [328, 344]}, {"key": "by-or-on-behalf-of", "type": "definition", "offset": [356, 374]}, {"key": "it-systems-and-data", "type": "clause", "offset": [408, 427]}, {"key": "the-company-and-its-subsidiaries", "type": "clause", "offset": [439, 471]}, {"key": "knowledge-of", "type": "definition", "offset": [511, 523]}, {"key": "compliance-with", "type": "clause", "offset": [760, 775]}, {"key": "all-applicable-laws", "type": "clause", "offset": [777, 796]}, {"key": "regulation-of", "type": "clause", "offset": [839, 852]}, {"key": "authority-and", "type": "clause", "offset": [907, 920]}, {"key": "industry-guidelines", "type": "clause", "offset": [925, 944]}, {"key": "internal-policies", "type": "definition", "offset": [957, 974]}, {"key": "obligations-relating-to-the", "type": "clause", "offset": [991, 1018]}, {"key": "security-of-it-systems", "type": "clause", "offset": [1031, 1053]}, {"key": "protection-of", "type": "definition", "offset": [1074, 1087]}, {"key": "unauthorized-use", "type": "clause", "offset": [1118, 1134]}, {"key": "backup-and-disaster-recovery", "type": "clause", "offset": [1237, 1265]}, {"key": "consistent-with", "type": "definition", "offset": [1277, 1292]}, {"key": "industry-standards", "type": "definition", "offset": [1293, 1311]}], "hash": "d8a9d56e6e2a4fbc75e1008f9b86476d", "id": 10}, {"samples": [{"hash": "iABUwTIYzqV", "uri": "/contracts/iABUwTIYzqV#it-systems", "label": "Sales Agreement (Aspen Aerogels Inc)", "score": 33.2026023865, "published": true}, {"hash": "fHf6EWUMzhj", "uri": "/contracts/fHf6EWUMzhj#it-systems", "label": "Sales Agreement (Aspen Aerogels Inc)", "score": 33.2026023865, "published": true}, {"hash": "5oOSZbCX9FK", "uri": "/contracts/5oOSZbCX9FK#it-systems", "label": "Underwriting Agreement (Aspen Aerogels Inc)", "score": 31.9117050171, "published": true}], "snippet": "Except as otherwise described in the Prospectus, and except as would not, individually or in the aggregate, result in a Material Adverse Effect, (x) there has been no security breach or attack or other compromise of or relating to any of the Company\u2019s and its Subsidiaries\u2019 information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of the Company and its Subsidiaries), equipment or technology (\u201cIT Systems and Data\u201d), and (y) the Company and its Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data; (ii) the Company and each of its Subsidiaries have complied in all material respects, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification; and (iii) the Company and each of its Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.", "size": 27, "snippet_links": [{"key": "in-the-prospectus", "type": "clause", "offset": [30, 47]}, {"key": "in-the-aggregate", "type": "definition", "offset": [90, 106]}, {"key": "material-adverse-effect", "type": "clause", "offset": [120, 143]}, {"key": "security-breach", "type": "definition", "offset": [167, 182]}, {"key": "information-technology-and-computer-systems", "type": "clause", "offset": [274, 317]}, {"key": "the-data", "type": "clause", "offset": [365, 373]}, {"key": "third-party-data", "type": "definition", "offset": [443, 459]}, {"key": "the-company-and-its-subsidiaries", "type": "clause", "offset": [490, 522]}, {"key": "it-systems-and-data", "type": "clause", "offset": [551, 570]}, {"key": "knowledge-of", "type": "definition", "offset": [654, 666]}, {"key": "in-all-material-respects", "type": "definition", "offset": [869, 893]}, {"key": "compliance-with", "type": "clause", "offset": [925, 940]}, {"key": "all-applicable-laws", "type": "clause", "offset": [942, 961]}, {"key": "regulation-of", "type": "clause", "offset": [1004, 1017]}, {"key": "authority-and", "type": "clause", "offset": [1072, 1085]}, {"key": "industry-guidelines", "type": "clause", "offset": [1090, 1109]}, {"key": "internal-policies", "type": "definition", "offset": [1122, 1139]}, {"key": "security-of-it-systems", "type": "clause", "offset": [1184, 1206]}, {"key": "protection-of", "type": "definition", "offset": [1227, 1240]}, {"key": "unauthorized-use", "type": "clause", "offset": [1271, 1287]}, {"key": "commercially-reasonable", "type": "clause", "offset": [1399, 1422]}, {"key": "backup-and-disaster-recovery", "type": "clause", "offset": [1423, 1451]}], "hash": "42aa62fb269333a67693dd2b0b4376ff", "id": 5}, {"samples": [{"hash": "6oRar5DhJCE", "uri": "/contracts/6oRar5DhJCE#it-systems", "label": "Distribution Agreement (Plymouth Industrial REIT, Inc.)", "score": 33.1574249268, "published": true}, {"hash": "8VIapdpAsad", "uri": "/contracts/8VIapdpAsad#it-systems", "label": "Distribution Agreement (Plymouth Industrial REIT, Inc.)", "score": 32.1581115723, "published": true}, {"hash": "jjfYtayQhoa", "uri": "/contracts/jjfYtayQhoa#it-systems", "label": "Distribution Agreement (Plymouth Industrial REIT Inc.)", "score": 31.1546878815, "published": true}], "snippet": "The Company and its subsidiaries\u2019 information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, \u201cIT Systems\u201d) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (\u201cPersonal Data\u201d)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to the same, except for those that have been remedied without material cost or liability or the duty to notify any other person and those that would not, individually or in the aggregate, have a Material Adverse Effect, nor any incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.", "size": 20, "snippet_links": [{"key": "the-company-and-its-subsidiaries", "type": "clause", "offset": [0, 32]}, {"key": "assets-and-equipment", "type": "clause", "offset": [57, 77]}, {"key": "in-all-material-respects", "type": "definition", "offset": [238, 262]}, {"key": "as-required", "type": "clause", "offset": [263, 274]}, {"key": "in-connection-with", "type": "clause", "offset": [275, 293]}, {"key": "operation-of-the-business-of-the-company", "type": "clause", "offset": [298, 338]}, {"key": "free-and-clear", "type": "definition", "offset": [384, 398]}, {"key": "reasonable-controls", "type": "definition", "offset": [574, 593]}, {"key": "to-maintain", "type": "clause", "offset": [632, 643]}, {"key": "confidential-information-and", "type": "clause", "offset": [671, 699]}, {"key": "continuous-operation", "type": "clause", "offset": [715, 735]}, {"key": "it-systems-and-data", "type": "clause", "offset": [768, 787]}, {"key": "personally-identifiable", "type": "definition", "offset": [813, 836]}, {"key": "regulated-data", "type": "definition", "offset": [865, 879]}, {"key": "no-breaches", "type": "clause", "offset": [961, 972]}, {"key": "unauthorized-uses", "type": "clause", "offset": [997, 1014]}, {"key": "material-cost", "type": "definition", "offset": [1092, 1105]}, {"key": "duty-to-notify", "type": "clause", "offset": [1126, 1140]}, {"key": "any-other-person", "type": "definition", "offset": [1141, 1157]}, {"key": "in-the-aggregate", "type": "definition", "offset": [1200, 1216]}, {"key": "material-adverse-effect", "type": "clause", "offset": [1225, 1248]}, {"key": "internal-review", "type": "definition", "offset": [1274, 1289]}, {"key": "compliance-with-all-applicable-laws", "type": "clause", "offset": [1389, 1424]}, {"key": "rules-and-regulations", "type": "clause", "offset": [1464, 1485]}, {"key": "governmental-or-regulatory-authority", "type": "definition", "offset": [1516, 1552]}, {"key": "internal-policies", "type": "definition", "offset": [1554, 1571]}, {"key": "obligations-relating-to-the", "type": "clause", "offset": [1588, 1615]}, {"key": "it-systems-and-personal-data", "type": "clause", "offset": [1640, 1668]}, {"key": "protection-of", "type": "definition", "offset": [1680, 1693]}], "hash": "c1a2cf9e9269e8a2ae10fe3b3f4b1661", "id": 8}, {"samples": [{"hash": "730xFlQyFI1", "uri": "/contracts/730xFlQyFI1#it-systems", "label": "Underwriting Agreement (Bancorp, Inc.)", "score": 34.6276512146, "published": true}, {"hash": "47pfgxwlB6I", "uri": "/contracts/47pfgxwlB6I#it-systems", "label": "Underwriting Agreement (Bancorp, Inc.)", "score": 34.6002731323, "published": true}, {"hash": "1CM9ASCXwbz", "uri": "/contracts/1CM9ASCXwbz#it-systems", "label": "Underwriting Agreement (Hanmi Financial Corp)", "score": 32.6303901672, "published": true}], "snippet": "(i) The Company is not aware of any security breach or other compromise relating to the Company\u2019s or its subsidiaries\u2019 information technology and computer systems, networks, hardware, software, data and databases (including the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, \u201cIT Systems and Data\u201d), except for those that have been remedied without material cost or liability; (ii) neither the Company nor its subsidiaries have been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any material security breach or other compromise to their IT Systems and Data; and (iii) the Company and its subsidiaries have implemented appropriate controls, policies, procedures and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority and internal policies relating to the privacy and security of IT Systems and Data and to the reasonable protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification.", "size": 19, "snippet_links": [{"key": "to-the-company", "type": "definition", "offset": [81, 95]}, {"key": "information-technology-and-computer-systems", "type": "clause", "offset": [119, 162]}, {"key": "information-of", "type": "clause", "offset": [237, 251]}, {"key": "third-party-data", "type": "definition", "offset": [318, 334]}, {"key": "by-or-on-behalf-of", "type": "definition", "offset": [346, 364]}, {"key": "it-systems-and-data", "type": "clause", "offset": [412, 431]}, {"key": "material-cost", "type": "definition", "offset": [484, 497]}, {"key": "neither-the-company", "type": "definition", "offset": [517, 536]}, {"key": "knowledge-of", "type": "definition", "offset": [593, 605]}, {"key": "material-security-breach", "type": "definition", "offset": [681, 705]}, {"key": "the-company-and-its-subsidiaries", "type": "clause", "offset": [766, 798]}, {"key": "technological-safeguards", "type": "definition", "offset": [863, 887]}, {"key": "to-maintain", "type": "clause", "offset": [888, 899]}, {"key": "continuous-operation", "type": "clause", "offset": [927, 947]}, {"key": "consistent-with", "type": "definition", "offset": [1013, 1028]}, {"key": "standards-and-practices", "type": "clause", "offset": [1038, 1061]}, {"key": "as-required-by", "type": "clause", "offset": [1066, 1080]}, {"key": "regulatory-standards", "type": "definition", "offset": [1092, 1112]}, {"key": "compliance-with-all-applicable-laws", "type": "clause", "offset": [1173, 1208]}, {"key": "rules-and-regulations", "type": "clause", "offset": [1248, 1269]}, {"key": "authority-and", "type": "clause", "offset": [1327, 1340]}, {"key": "internal-policies", "type": "definition", "offset": [1341, 1358]}, {"key": "security-of-it-systems", "type": "clause", "offset": [1387, 1409]}, {"key": "protection-of", "type": "definition", "offset": [1441, 1454]}, {"key": "unauthorized-use", "type": "clause", "offset": [1485, 1501]}], "hash": "0677ddbd7ccc1d6aad012ea883638ad1", "id": 9}, {"samples": [{"hash": "agORa17nclR", "uri": "/contracts/agORa17nclR#it-systems", "label": "Underwriting Agreement (GOLUB CAPITAL BDC, Inc.)", "score": 35.9048614502, "published": true}, {"hash": "QMkMmf69s3", "uri": "/contracts/QMkMmf69s3#it-systems", "label": "Underwriting Agreement (GOLUB CAPITAL BDC, Inc.)", "score": 34.7316894531, "published": true}, {"hash": "8rdOZDZPECJ", "uri": "/contracts/8rdOZDZPECJ#it-systems", "label": "Underwriting Agreement (GOLUB CAPITAL BDC, Inc.)", "score": 33.0835037231, "published": true}], "snippet": "Neither the Adviser nor the Administrator is aware of any security breach or incident, unauthorized access or disclosure, or other compromise relating to IT Systems used by the Adviser or the Administrator. The Adviser\u2019s or the Administrator\u2019s IT systems are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Adviser and the Administrator as currently conducted, and, to the knowledge of the Adviser and the Administrator, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except, in each case, as would not reasonably be expected to, individually or in the aggregate, have a Material Adverse Effect. The Adviser and the Administrator have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all material IT Systems and data (including Personal Data) used in connection with their business, and there have been no breaches, violations, outages or unauthorized uses of or access to the same, except, in each case, as would not reasonably be expected to, individually or in the aggregate, have a Material Adverse Effect. The Adviser and the Administrator are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of the IT Systems used by the Adviser or the Administrator and all Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except, in each case, as would not reasonably be expected to, individually or in the aggregate, have a Material Adverse Effect.", "size": 24, "snippet_links": [{"key": "the-administrator", "type": "clause", "offset": [24, 41]}, {"key": "security-breach", "type": "definition", "offset": [58, 73]}, {"key": "unauthorized-access", "type": "definition", "offset": [87, 106]}, {"key": "by-the-adviser", "type": "clause", "offset": [170, 184]}, {"key": "in-all-material-respects", "type": "definition", "offset": [297, 321]}, {"key": "as-required", "type": "clause", "offset": [322, 333]}, {"key": "in-connection-with", "type": "clause", "offset": [334, 352]}, {"key": "operation-of-the-business", "type": "clause", "offset": [357, 382]}, {"key": "of-the-adviser", "type": "clause", "offset": [383, 397]}, {"key": "knowledge-of", "type": "definition", "offset": [456, 468]}, {"key": "free-and-clear", "type": "definition", "offset": [508, 522]}, {"key": "each-case", "type": "definition", "offset": [631, 640]}, {"key": "in-the-aggregate", "type": "definition", "offset": [698, 714]}, {"key": "material-adverse-effect", "type": "clause", "offset": [723, 746]}, {"key": "reasonable-controls", "type": "definition", "offset": [827, 846]}, {"key": "to-maintain", "type": "clause", "offset": [885, 896]}, {"key": "confidential-information-and", "type": "clause", "offset": [922, 950]}, {"key": "continuous-operation", "type": "clause", "offset": [966, 986]}, {"key": "it-systems-and-data", "type": "clause", "offset": [1028, 1047]}, {"key": "no-breaches", "type": "clause", "offset": [1134, 1145]}, {"key": "unauthorized-uses", "type": "clause", "offset": [1170, 1187]}, {"key": "access-to-the", "type": "clause", "offset": [1194, 1207]}, {"key": "compliance-with-all-applicable-laws", "type": "clause", "offset": [1402, 1437]}, {"key": "rules-and-regulations", "type": "clause", "offset": [1477, 1498]}, {"key": "governmental-or-regulatory-authority", "type": "definition", "offset": [1529, 1565]}, {"key": "internal-policies", "type": "definition", "offset": [1567, 1584]}, {"key": "obligations-relating-to-the", "type": "clause", "offset": [1601, 1628]}, {"key": "security-of-the", "type": "clause", "offset": [1641, 1656]}, {"key": "all-personal-data", "type": "definition", "offset": [1713, 1730]}, {"key": "protection-of", "type": "definition", "offset": [1742, 1755]}, {"key": "it-systems-and-personal-data", "type": "clause", "offset": [1761, 1789]}], "hash": "1bbe981c31ce60a57beeccf82fd40688", "id": 6}, {"samples": [{"hash": "2tA9ot0aF8q", "uri": "/contracts/2tA9ot0aF8q#it-systems", "label": "Underwriting Agreement (Silynxcom Ltd.)", "score": 36.2498283386, "published": true}, {"hash": "31DgkeK17qp", "uri": "/contracts/31DgkeK17qp#it-systems", "label": "Underwriting Agreement (Silynxcom Ltd.)", "score": 35.5352516174, "published": true}, {"hash": "4wIO9Q8LvZx", "uri": "/contracts/4wIO9Q8LvZx#it-systems", "label": "Underwriting Agreement (Sushi Ginza Onodera, Inc.)", "score": 35.1546897888, "published": true}], "snippet": "To the knowledge of the Company, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to any of the Company\u2019s or its Subsidiaries\u2019 information technology and computer systems, networks, hardware, software, data and databases (including the data and information of their respective customers, employees, suppliers, vendors and any third-party data maintained, processed or stored by the Company and its Subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its Subsidiaries), equipment or technology (collectively, \u201cIT Systems and Data\u201d), except in each case, as would not reasonably be expected to have a Material Adverse Effect, and (B) the Company and its Subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data\u037e (ii) the Company and its Subsidiaries have implemented commercially reasonable controls, policies, procedures and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data as is customary for the Company\u2019s business or as required by applicable regulatory standards\u037e and (iii) the IT Systems and Data are adequate for, and operate and perform in all material respects as required in connection with the operation of the businesses of the Company and its Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants.", "size": 22, "snippet_links": [{"key": "knowledge-of-the-company", "type": "definition", "offset": [7, 31]}, {"key": "security-breach", "type": "definition", "offset": [51, 66]}, {"key": "unauthorized-access", "type": "definition", "offset": [80, 99]}, {"key": "relating-to", "type": "definition", "offset": [141, 152]}, {"key": "information-technology-and-computer-systems", "type": "clause", "offset": [195, 238]}, {"key": "information-of", "type": "clause", "offset": [313, 327]}, {"key": "party-data", "type": "definition", "offset": [400, 410]}, {"key": "the-company-and-its-subsidiaries", "type": "clause", "offset": [446, 478]}, {"key": "by-third-parties", "type": "clause", "offset": [518, 534]}, {"key": "behalf-of-the-company", "type": "clause", "offset": [538, 559]}, {"key": "it-systems-and-data", "type": "clause", "offset": [623, 642]}, {"key": "each-case", "type": "definition", "offset": [656, 665]}, {"key": "material-adverse-effect", "type": "clause", "offset": [713, 736]}, {"key": "no-knowledge", "type": "clause", "offset": [815, 827]}, {"key": "reasonable-controls", "type": "definition", "offset": [1087, 1106]}, {"key": "technological-safeguards", "type": "definition", "offset": [1133, 1157]}, {"key": "to-maintain", "type": "clause", "offset": [1158, 1169]}, {"key": "continuous-operation", "type": "clause", "offset": [1197, 1217]}, {"key": "security-of", "type": "clause", "offset": [1234, 1245]}, {"key": "for-the-company", "type": "definition", "offset": [1288, 1303]}, {"key": "as-required-by", "type": "clause", "offset": [1318, 1332]}, {"key": "in-all-material-respects", "type": "definition", "offset": [1442, 1466]}, {"key": "in-connection-with", "type": "clause", "offset": [1479, 1497]}, {"key": "operation-of-the-businesses-of-the-company", "type": "clause", "offset": [1502, 1544]}, {"key": "free-and-clear", "type": "definition", "offset": [1590, 1604]}], "hash": "390981137b755b798897ce2ea7e38a12", "id": 7}], "next_curs": "ClMSTWoVc35sYXdpbnNpZGVyY29udHJhY3Rzci8LEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhNpdC1zeXN0ZW1zIzAwMDAwMDBhDKIBAmVuGAAgAA==", "clause": {"parents": [["representations-and-warranties-of-the-company", "Representations and Warranties of the Company"], ["representations-and-warranties", "Representations and Warranties"], ["representations-and-warranties-by-the-company", "Representations and Warranties by the Company"], ["representations-warranties-and-covenants-of-the-company", "REPRESENTATIONS, WARRANTIES AND COVENANTS OF THE COMPANY"], ["intellectual-property", "Intellectual Property"]], "title": "IT Systems", "size": 1306, "children": [["", ""], ["general", "General"], ["the-kenvue-it", "The Kenvue IT"], ["no-governmental-assistance", "No Governmental Assistance"], ["privacy", "Privacy"]], "id": "it-systems", "related": [["computer-systems", "Computer Systems", "Computer Systems"], ["computer-software", "Computer Software", "Computer Software"], ["services-and-equipment", "SERVICES AND EQUIPMENT", "SERVICES AND EQUIPMENT"], ["service-monitoring-analyses-and-oracle-software", "SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE", "SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE"], ["proprietary-software", "Proprietary Software", "Proprietary Software"]], "related_snippets": [], "updated": "2026-04-03T05:43:50+00:00"}, "json": true, "cursor": ""}}