Security and integrity of IT Systems Sample Clauses

Security and integrity of IT Systems. Reasonable precautions have been taken to preserve the security and integrity of the IT Systems and during the three years ending on the Signing Date, there has not been any material unauthorised modification of any software or data in the IT Systems or any fraud committed by use or abuse of the IT Systems. So far as the Warrantors are aware, the IT Systems contain no viruses or any code calculated to adversely affect any software or data.
AutoNDA by SimpleDocs

Related to Security and integrity of IT Systems

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Preservation and Protection of Collateral (a) The Administrative Agent shall be under no duty or liability with respect to the collection, protection or preservation of the Collateral, or otherwise, beyond the use of reasonable care in the custody and preservation thereof while in its possession.

  • Technology and Intellectual Property (a) Schedule 2.22(a) sets forth a complete and correct list of all (i) registered trademarks, service marks, domain names, copyrights and patents; (ii) applications for registration or grant of any of the foregoing; (iii) unregistered trademarks, service marks, trade names, logos and assumed names; and (iv) licenses for any of the foregoing, in each case, owned by or for the benefit of the Company or a Company Subsidiary, or used in or necessary to conduct the Company’s or a Company Subsidiary’s business as presently conducted. The items on Schedule 2.22(a), together with all other trademarks, service marks, trade names, logos, assumed names, patents, copyrights, trade secrets, computer software, licenses, formulae, customer lists or other databases, business application designs and inventions currently used in or necessary to conduct the businesses of the Company or of a Company Subsidiary, constitute the “Intellectual Property.”

  • DESCRIPTION OF COLLATERAL AND GUARANTIES Repayment of the Indebtedness is secured by the Collateral as described in the Loan Agreement. Hereinafter, the above-described security documents and guaranties, together with all other documents securing repayment of the Indebtedness shall be referred to as the "Security Documents". Hereinafter, the Security Documents, together with all other documents evidencing or securing the Indebtedness shall be referred to as the "Existing Loan Documents".

  • Accounts and Records Property of Fund State Street acknowledges that all of the accounts and records maintained by State Street pursuant hereto are the property of Fund, and will be made available to Fund for inspection or reproduction within a reasonable period of time, upon demand. State Street will assist Fund's independent auditors, or upon the prior written approval of Fund, or upon demand, any regulatory body, in any requested review of Fund's accounts and records but Fund will reimburse State Street for all reasonable expenses and employee time invested in any such review outside of routine and normal periodic reviews. Upon receipt from Fund of the necessary information or instructions, State Street will supply information from the books and records it maintains for Fund that Fund may reasonably request for tax returns, questionnaires, periodic reports to shareholders and such other reports and information requests as Fund and State Street may agree upon from time to time.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Possession and Use of Collateral Subject to the provisions of the Security Documents, the Issuer and the Guarantors shall have the right to remain in possession and retain exclusive control of and to exercise all rights with respect to the Collateral (other than monies or U.S. government obligations deposited pursuant to Article VIII, and other than as set forth in the Security Documents and this Indenture), to operate, manage, develop, lease, use, consume and enjoy the Collateral (other than monies and U.S. government obligations deposited pursuant to Article VIII and other than as set forth in the Security Documents and this Indenture), to alter or repair any Collateral so long as such alterations and repairs do not impair the creation or perfection of the Lien of the Security Documents thereon, and to collect, receive, use, invest and dispose of the reversions, remainders, interest, rents, lease payments, issues, profits, revenues, proceeds and other income thereof.

  • Perfection and Priority of Liens Receipt by the Administrative Agent of the following:

  • Creation, Perfection and Priority of Liens The execution and delivery of the Collateral Documents by Loan Parties and Sponsors, together with (i) the actions taken on or prior to the date hereof pursuant to subsections 4.1, 4.2, 6.8 and 6.9 and (ii) the delivery to Administrative Agent of any Pledged Collateral not delivered to Administrative Agent at the time of execution and delivery of the applicable Collateral Document (all of which Pledged Collateral has been so delivered) are effective to create in favor of Administrative Agent for the benefit of Lenders, as security for the respective Secured Obligations (as defined in the applicable Collateral Document in respect of any Collateral), a valid and perfected First Priority Lien on all of the Collateral, and all filings and other actions necessary or desirable to perfect and maintain the perfection and First Priority status of such Liens have been duly made or taken and remain in full force and effect, other than the filing of any UCC financing statements or Mortgages delivered to Administrative Agent for filing or recording, as applicable (but not yet filed or recorded) and the periodic filing of UCC continuation statements in respect of UCC financing statements filed by or on behalf of Administrative Agent.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

Time is Money Join Law Insider Premium to draft better contracts faster.