Personal Data and Cybersecurity Sample Clauses

Personal Data and Cybersecurity. To Seller’s knowledge, in the three (3) years prior to the Closing Date, no Seller nor their respective Company has suffered any actual material data breach with respect to Personal Data.
AutoNDA by SimpleDocs

Related to Personal Data and Cybersecurity

  • Personal Data The Company, the Participant’s local employer and the local employer’s parent company or companies may hold, collect, use, process and transfer, in electronic or other form, certain personal information about the Participant for the exclusive purpose of implementing, administering and managing the Participant’s participation in the Plan. Participant understands that the following personal information is required for the above named purposes: his/her name, home address and telephone number, office address (including department and employing entity) and telephone number, e-mail address, date of birth, citizenship, country of residence at the time of grant, work location country, system employee ID, employee local ID, employment status (including international status code), supervisor (if applicable), job code, title, salary, bonus target and bonuses paid (if applicable), termination date and reason, tax payer’s identification number, tax equalization code, US Green Card holder status, contract type (single/dual/multi), any shares of stock or directorships held in the Company, details of all stock option grants (including number of grants, grant dates, exercise price, vesting type, vesting dates, expiration dates, and any other information regarding options that have been granted, canceled, vested, unvested, exercisable, exercised or outstanding) with respect to the Participant, estimated tax withholding rate, brokerage account number (if applicable), and brokerage fees (the “Data”). Participant understands that Data may be collected from the Participant directly or, on Company’s request, from Participant’s local employer. Participant understands that Data may be transferred to third parties assisting the Company in the implementation, administration and management of the Plan, including the brokers approved by the Company, the broker selected by the Participant from among such Company-approved brokers (if applicable), tax consultants and the Company’s software providers (the “Data Recipients”). Participant understands that some of these Data Recipients may be located outside the Participant’s country of residence, and that the Data Recipient’s country may have different data privacy laws and protections than the Participant’s country of residence. Participant understands that the Data Recipients will receive, possess, use, retain and transfer the Data, in electronic or other form, for the purposes of implementing, administering and managing the Participant’s participation in the Plan, including any requisite transfer of such Data as may be required for the administration of the Plan and/or the subsequent holding of shares of common stock on the Participant’s behalf by a broker or other third party with whom the Participant may elect to deposit any shares of common stock acquired pursuant to the Plan. Participant understands that Data will be held only as long as necessary to implement, administer and manage the Participant’s participation in the Plan. Participant understands that Data may also be made available to public authorities as required by law, e.g., to the U.S. government. Participant understands that the Participant may, at any time, review Data and may provide updated Data or corrections to the Data by written notice to the Company. Except to the extent the collection, use, processing or transfer of Data is required by law, Participant may object to the collection, use, processing or transfer of Data by contacting the Company in writing. Participant understands that such objection may affect his/her ability to participate in the Plan. Participant understands that he/she may contact the Company’s Stock Plan Administration to obtain more information on the consequences of such objection.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Personal Information The Purchaser provides its consent to:

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • Personal Services The Member shall not be required to perform services for the Company solely by virtue of being a Member.

  • Network 2.7.1 DCH will provide to the Contractor up-to-date changes to the State’s list of excluded Providers, as well as any additional information that will affect the Contractor’s Provider network.

  • Privacy and Data Protection The Company and its subsidiaries have operated their business in a manner compliant in all material respects with all United States federal, state, local and non-United States privacy, data security and data protection laws and regulations applicable to the Company’s collection, use, transfer, protection, disposal, disclosure, handling, storage and analysis of personal data. The Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure the integrity and security of the data collected, handled or stored in connection with its business; the Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure compliance with the Health Care Laws that govern privacy and data security and take, and have taken reasonably appropriate steps designed to assure compliance in all material respects with such policies and procedures. The Company and its subsidiaries have taken reasonable steps to maintain the confidentiality of its personally identifiable information, protected health information, consumer information and other confidential information of the Company, its subsidiaries and any third parties in its possession (“Sensitive Company Data”). The tangible or digital information technology systems (including computers, screens, servers, workstations, routers, hubs, switches, networks, data communications lines, technical data and hardware), software and telecommunications systems used or held for use by the Company and its subsidiaries (the “Company IT Assets”) are adequate and operational for, in accordance with their documentation and functional specifications, the business of the Company and its subsidiaries as now operated and as currently proposed to be conducted as described in the Registration Statement, the General Disclosure Package and the Prospectus. The Company and its subsidiaries have used reasonable efforts to establish, and have established, commercially reasonable disaster recovery and security plans, procedures and facilities for the business consistent with industry standards and practices in all material respects, including, without limitation, for the Company IT Assets and data held or used by or for the Company and its subsidiaries. The Company and its subsidiaries have not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data, except where such breaches, compromises or incidents would not, individually or in the aggregate, be material to the Company or any of its subsidiaries; and there has been no unauthorized or illegal use of or access to any Company IT Asset or Sensitive Company Data by any unauthorized third party. The Company and its subsidiaries have not been required to notify any individual of any information security breach, compromise or incident involving Sensitive Company Data.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to:

Time is Money Join Law Insider Premium to draft better contracts faster.