SECURITY OF NINTENDO GAME MEDIA Sample Clauses

SECURITY OF NINTENDO GAME MEDIA. You agree to keep the NINTENDO games in a secure location and not to permit any copying of any NINTENDO games.
AutoNDA by SimpleDocs

Related to SECURITY OF NINTENDO GAME MEDIA

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Information Technology The Company’s and the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company, and the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and the Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.

  • Licensed Software Section 3.17(f).......................................27

  • Technology For purposes of this Agreement, “Technology” means all Software, information, designs, formulae, algorithms, procedures, methods, techniques, ideas, know-how, research and development, technical data, programs, subroutines, tools, materials, specifications, processes, inventions (whether or not patentable and whether or not reduced to practice), apparatus, creations, improvements and other similar materials, and all recordings, graphs, drawings, reports, analyses, and other writings, and other embodiments of any of the foregoing, in any form or media whether or not specifically listed herein. Further, for purposes of this Agreement, “Software” means any and all computer programs, whether in source code or object code; databases and compilations, whether machine readable or otherwise; descriptions, flow-charts and other work product used to design, plan, organize and develop any of the foregoing; and all documentation, including user manuals and other training documentation, related to any of the foregoing.

  • Technology and Intellectual Property (a) Schedule 2.22(a) sets forth a complete and correct list of all (i) registered trademarks, service marks, domain names, copyrights and patents; (ii) applications for registration or grant of any of the foregoing; (iii) unregistered trademarks, service marks, trade names, logos and assumed names; and (iv) licenses for any of the foregoing, in each case, owned by or for the benefit of the Company or a Company Subsidiary, or used in or necessary to conduct the Company’s or a Company Subsidiary’s business as presently conducted. The items on Schedule 2.22(a), together with all other trademarks, service marks, trade names, logos, assumed names, patents, copyrights, trade secrets, computer software, licenses, formulae, customer lists or other databases, business application designs and inventions currently used in or necessary to conduct the businesses of the Company or of a Company Subsidiary, constitute the “Intellectual Property.”

  • License for Use of Software and Other Intellectual Property Unless expressly prohibited by the licensor thereof or any provision of applicable law, if any, the Borrower hereby grants to the Administrative Agent on behalf of the Secured Parties a limited license to use, without charge, the Borrower’s and the Servicer’s computer programs, software, printouts and other computer materials, technical knowledge or processes, data bases, materials, trademarks, registered trademarks, trademark applications, service marks, registered service marks, service xxxx applications, patents, patent applications, trade names, rights of use of any name, labels, fictitious names, inventions, designs, trade secrets, goodwill, registrations, copyrights, copyright applications, permits, licenses, franchises, customer lists, credit files, correspondence, and advertising materials or any property of a similar nature, as it pertains to the Borrower Collateral, or any rights to any of the foregoing, only as reasonably required in connection with the collection of the Transferred Receivables and the advertising for sale, and selling any of the Borrower Collateral, or exercising of any other remedies hereto, and the Borrower agrees that its rights under all licenses and franchise agreements shall inure to the Administrative Agent’s benefit (on behalf of the Secured Parties) for purposes of the license granted herein. Except upon the occurrence and during the continuation of a Termination Event, the Administrative Agent and the Lenders agree not to use any such license without giving the Borrower prior written notice.

  • Computer Software All computer applications software, owned or licensed, whether for general business usage (e.g., accounting, word processing, graphics, spreadsheet analysis, etc.), or specific, unique-to-the-business usage, and all computer operating, security or programming software, owned or licensed by Seller and used in the operation of the Business; and

  • Intellectual Property; Software (a) Schedule 4.12 contains a list and description (showing in each case any product, device, process, service, business or publication covered thereby, the registered or other owner, expiration date and number, if any) of all Copyrights, Patent Rights and Trademarks owned by, licensed to or used by the Company.

Time is Money Join Law Insider Premium to draft better contracts faster.