Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.
Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:
Data Protection The Administrator shall implement and maintain a comprehensive written information security program that contains appropriate security measures to safeguard the personal information of the Trust’s shareholders, employees, directors and/or officers that the Administrator receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.
Fire Protection All measures shall be taken which are reasonably necessary to protect the Timberland from loss by fire, which measures shall be at least equal to fire-control practices generally followed on timber producing property in the same general area, including the adoption of suitable prevention and control measures, the maintenance of adequate firefighting equipment, the maintenance of fire lanes where needed, the use of fire patrols, proper disposal of slash and full cooperation with Governmental Authorities on matters of fire prevention and control. Each Landholder shall maintain membership in forest protective associations where any of its Timberland fall within a forest protective district under the jurisdiction of any such association, and shall pay as due any forest patrol assessments of any state forester or of such forest protective association.
Lien Protection Lessee shall pay when due all claims for labor or materials furnished or alleged to have been furnished to or for Lessee at or for use on the Premises, which claims are or may be secured by any mechanic's or materialmen's lien against the Premises or any interest therein. Lessee shall give Lessor not less than ten (10) days' notice prior to the commencement of any work in, on, or about the Premises, and Lessor shall have the right to post notices of non-responsibility in or on the Premises as provided by law. If Lessee shall, in good faith, contest the validity of any such lien, claim or demand, then Lessee shall, at its sole expense, defend and protect itself, Lessor and the Premises against the same and shall pay and satisfy any such adverse judgment that may be rendered thereon before the enforcement thereof against the Lessor or the Premises. If Lessor shall require, Lessee shall furnish to Lessor a surety bond satisfactory to Lessor in an amount equal to one and one-half times the amount of such contested lien claim or demand, indemnifying Lessor against liability for the same, as required by law for the holding of the Premises free from the effect of such lien or claim. In addition, Lessor may require Lessee to pay Lessor's attorneys' fees and costs in participating in such action if Lessor shall decide it is to its best interest to do so.
Security and Collateral To secure the payment when due of the Notes and all other obligations of the Company under this Agreement or any Rate Hedging Agreement to the Lenders and the Agent, the Company shall execute and deliver, or cause to be executed and delivered, to the Lenders and the Agent Security Documents granting the following:
Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.
Anti-Dilution Protection For so long as there remains any amount due and owing under this Note (the “AntiDilution Period”), the Commitment Shares issued to the Buyer hereunder shall have the anti-dilution rights (the “Anti-Dilution Rights”) described in this paragraph, such that the Company would be required to issue, from time to time, True-up Shares (defined below) to the Buyer. The Anti-Dilution Rights are based on the percentage that the Commitment Shares bear to 199,885,350 shares (the “4.99% Share Amount”) (199,885,350 shares is 4.99% of 4,005,718,437 currently outstanding shares of Company common stock). The 9,194,726 Commitment Shares represent 4.60% of the 4.99% Share Amount (9,194,726 ÷ 199,885,350 = 4.60%).
PROTECTION OF GOODWILL You acknowledge that the Company is providing you with this Restricted Stock Award in connection with and in consideration for your promises and covenants contained herein. Specifically, in consideration for the Restricted Stock Award, which you acknowledge provides a material incentive for you to grow, develop and protect the goodwill and confidential and proprietary information of the Company, you agree that the Restricted Stock Award (itself and in combination with any other awards made to you) constitutes independent and sufficient consideration for all non-competition, non-solicitation and confidentiality covenants between you and the Company, and agree and acknowledge that you will fully abide by each of such covenants. You further acknowledge that your promise to fully abide by each of the protective covenants referenced above is a material inducement for the Company to provide you with the Restricted Stock Award.