Protection of Computer Systems Sample Clauses

Protection of Computer Systems. Worker will take all necessary precautions to prevent unauthorized access to or use of Corporation’s computer systems and software and related passwords and access codes to which Worker has access during the term of Worker’s employment by Corporation, including by complying with all of Corporation’s applicable policies and rules regarding access to and use of those computer systems and software in effect and amended from time to time.
AutoNDA by SimpleDocs
Protection of Computer Systems. Each Grantor uses commercially reasonable efforts to protect the confidentiality, integrity and security of the Computer Systems used in the operation of the business of the Loan Parties and to prevent any unauthorized use, access, interruption, or modification of the Computer Systems. Such Computer Systems (i) are sufficient for the immediate and currently anticipated future needs of the Loan Parties, including as to capacity, scalability and ability to process current and anticipated peak volumes in a timely manner, and (ii) are in sufficiently good working condition to effectively perform all information technology operations and include a sufficient number of license seats for all software as necessary for the operation of the business of the Loan Parties as currently conducted. In the last three (3) years, there have been no unauthorized intrusions, failures, breakdowns, continued substandard performance, or other adverse events affecting any such Computer Systems that have caused any substantial disruption of or interruption in or to the use of such Computer Systems. The Loan Parties maintain commercially reasonable disaster recovery and business continuity plans, procedures and facilities in connection with the operation of the business of the Loan Parties, act in compliance therewith, and have taken commercially reasonable steps to test such plans and procedures on a periodic basis, and such plans and procedures have been proven effective upon such testing in all material respects.
Protection of Computer Systems. It is agreed as a condition precedent to the Insurer’s liability under this Insurance that the Insured shall take reasonable measures to maintain and upgrade software which protects against any unauthorised use or access to the Insured’s computer systems or internet website, and to take regular back-up copies of any data, file or programme.
Protection of Computer Systems. Section 7.14 . Each Grantor uses commercially reasonable efforts to protect the confidentiality, integrity and security of the Computer Systems used in the operation of the business of the Loan Parties and to prevent any unauthorized use, access, interruption, or modification of the Computer Systems. Such Computer Systems (i) are sufficient for the immediate and currently anticipated future needs of the Loan Parties, including as to capacity, scalability and ability to process current and anticipated peak volumes in a timely manner, and (ii) are in sufficiently good working condition to effectively perform all information technology operations and include a sufficient number of license seats for all software as necessary for the operation of the business of the Loan Parties as currently conducted. In the last three (3) years, to each Grantor’s knowledge, there have been no unauthorized intrusions, failures, breakdowns, continued substandard performance, or other adverse events affecting any such Computer Systems, in each case, that have caused any substantial disruption of or interruption in or to the use of such Computer Systems, except for the breakdown of a server domain controller that occurred in June 2020 that has been fully remediated and with respect to which there have been no claims or lawsuits as of the Closing Date. The Loan Parties maintain commercially reasonable disaster recovery and business continuity plans, procedures and facilities in connection with the operation of the business of the Loan Parties, act in compliance therewith, and have taken commercially reasonable steps to test such plans and procedures on a periodic basis, and such plans and procedures have been proven effective upon such testing in all material respects.
Protection of Computer Systems 

Related to Protection of Computer Systems

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

Time is Money Join Law Insider Premium to draft better contracts faster.