Software and IT Sample Clauses

Software and IT. (a) The Company’s Systems are in good working order and condition and are sufficient in all material respects for the purposes for which they are used in the conduct of the Business and include sufficient licensed capacity (whether in terms of authorized sites, units, users, seats or otherwise) for material software, in each case as necessary for the conduct of the Business as currently conducted. (b) To the Knowledge of the Company, in the last three (3) years, there has been no unauthorized access, use, intrusion or breach of security, or material failure, breakdown, performance reduction or other adverse event affecting any of the Company’s Systems, that has caused or could reasonably be expected to cause any: (i) substantial disruption of or interruption in or to the use of such Systems or the conduct of the Business of the other Company Entities; or (ii) loss, destruction, damage or harm to any Company Entity or any of their operations, personnel, property or other assets. Each Company Entity has taken all reasonable actions, consistent with industry practices, to protect the integrity and security of the Company’s Systems and the data and other information stored thereon. (c) The Company Entities maintain commercially reasonable back-up and data recovery, disaster recovery and business continuity plans, procedures and facilities and test such plans and procedures on a regular basis, and such plans and procedures have been proven effective upon such testing.
AutoNDA by SimpleDocs
Software and IT. (a) The Company’s Systems are reasonably sufficient for the immediate and anticipated needs of its business, including as to capacity, scalability, and ability to process current and anticipated peak volumes in a timely manner. The Company’s Systems are in sufficiently good working condition to perform all information technology operations and include sufficient licensed capacity (whether in terms of authorized sites, units, users, seats or otherwise) for all software, in each case as necessary for the conduct of its business. (b) In the last five years, there has been no unauthorized access, use, intrusion or breach of security, or material failure, breakdown, performance reduction or other adverse event affecting any of the Company’s Systems, that has caused or would reasonably be expected to cause any: (i) substantial disruption of or interruption in or to the use of such Systems or the conduct of the business of the Company or its Subsidiaries; (ii) loss, destruction, damage or harm of the Company or any Subsidiary or any of their business or operations, personnel, property or other assets; or (iii) liability of any kind to the Company or its Subsidiaries or their business. The Company (including its Subsidiaries) has taken commercially reasonable actions, consistent with applicable industry best practices, to protect the integrity and security of its Systems and the data and other information stored thereon. (c) The Company and its Subsidiaries maintain commercially reasonable back-up and data recovery, disaster recovery and business continuity plans, procedures and facilities, act in material compliance therewith, and test such plans and procedures on a regular basis, and such plans and procedures have been proven effective upon such testing.
Software and IT. (a) The Company Entities’ Systems are reasonably sufficient in all material respects for the current needs of the Business, including as to capacity, scalability, and ability to process current peak volumes in a timely manner. The Company Entities’ Systems are in sufficiently good working condition to perform all information technology operations and include sufficient licensed capacity (whether in terms of authorized sites, units, users, seats or otherwise) for all material software, in each case as necessary for the conduct of the Business, except as would not reasonably be expected to be material to the Company Entities, taken as a whole. (b) To The Company’s Knowledge, in the last two (2) years, there has been no unauthorized access, use, intrusion or breach of security, or material failure, breakdown, performance reduction or other material adverse event affecting any of the Company Entities’ Systems, in each case that has caused or would reasonably be expected to cause any: (i) substantial disruption of or interruption in the conduct of the Business of the Company Entities; (ii) substantial loss, destruction, damage or harm of any Company Entity or any of their Business or operations, personnel, property or other assets; or (iii) material liability of any kind to the Company Entities or their Business. Each Company Entity has taken commercially reasonable actions to protect the integrity and security of the Company Entities’ Systems and the data and other information stored thereon. (c) The Company Entities maintain commercially reasonable back-up and data recovery, disaster recovery and business continuity plans, procedures and facilities, and act in material compliance therewith.
Software and IT. (a) The Company Entities’ Systems are reasonably sufficient in all material respects for the current needs of the Business, including as to capacity, scalability, and ability to process current peak volumes in a timely manner. In all material respects, the Company Entities’ Systems are in sufficiently good working condition to perform all information technology operations and include sufficient licensed capacity (whether in terms of authorized sites, units, users, seats or otherwise) for all material software, in each case as necessary for the conduct of the Business. (b) To Shift’s Knowledge, in the last two (2) years, there has been no unauthorized access, use, intrusion or breach of security, or material failure, breakdown, performance reduction or other adverse event affecting any of the Company Entities’ Systems, that has caused or would reasonably be expected to cause any: (i) substantial disruption of or interruption in the conduct of the Business of the Company Entities; (ii) substantial loss, destruction, damage or harm of any Company Entity or any of their Business or operations, personnel, property or other assets; or (iii) material liability of any kind to the Company Entities or their Business. Each Company Entity has taken commercially reasonable actions to protect the integrity and security of the Company Entities’ Systems and the data and other information stored thereon. (c) The Company Entities maintain commercially reasonable back-up and data recovery, disaster recovery and business continuity plans, procedures and facilities, act in material compliance therewith.
Software and IT. (a) The Company Entities’ Systems are reasonably sufficient and in sufficiently good working condition in all material respects for the current needs of the Business, including as to capacity, scalability, and ability to process current peak volumes in a timely manner, and to the Knowledge of the Company, are free from material viruses, worms, time bombs, key locks, malware and other corruptants. (b) In the last three (3) years, there has been no unauthorized access, use, intrusion or breach of security, or material failure, breakdown, performance reduction or other adverse event affecting any of the Company Entities’ Systems, that has caused any: (i) material disruption of or interruption in the conduct of the Business of the Company Entities; (ii) substantial loss, destruction, damage or harm of any Company Entity or any of their Business or operations, personnel, property or other assets; or (iii) to the Knowledge of the Company, material liability of any kind to the Company Entities or their Business or the statutory duty to notify any Person. Each Company Entity has taken commercially reasonable actions, taking into account the size and complexity of the Company, to protect the integrity, security and continuous operation of the Company Entities’ Systems and the data and other information stored thereon or processed thereby. (c) The Company Entities maintain back-up and data recovery, disaster recovery and business continuity plans and procedures, and, to the Knowledge of the Company, act in material compliance therewith.
Software and IT. (a) The Company’s software and information technology systems (“Systems”) are in good working order and condition and are sufficient in all material respects for the purposes for which they are used in the conduct of the business of the Company and include sufficient licensed capacity (whether in terms of authorized sites, units, users, seats or otherwise) for material software, in each case as necessary for the conduct of the business of the Company as currently conducted. (b) To the Knowledge of the Company and the Seller, in the last three (3) years, there has been no material unauthorized access, use, intrusion or breach of security, or material failure, breakdown, performance reduction or other materially adverse event affecting any of the Company’s Systems, that has caused or could reasonably be expected to cause any substantial: (i) disruption of or interruption in or to the use of such Systems or the conduct of the business of the Company; or (ii) loss, destruction, damage or harm to the Company or any of their operations, personnel, property or other assets. The Company has taken all reasonable actions, consistent with industry practices, to protect the integrity and security of the Systems and the data and other information stored thereon. (c) The Company maintains commercially reasonable back-up and data recovery, disaster recovery and business continuity plans, procedures and facilities and tests such plans and procedures on a regular basis.
Software and IT. (a) Target’s Systems are reasonably sufficient for the current needs of the Business, including as to capacity and ability to process current and anticipated peak volumes in a timely manner. Target’s Systems are in sufficiently good working condition to perform all information technology operations and include sufficient licensed capacity (whether in terms of authorized sites, units, users, seats or otherwise) for all material software, in each case as necessary for the conduct of the Business. (b) In the last five (5) years, there has been no unauthorized access, use, intrusion or breach of security, or material failure, breakdown, performance reduction or other adverse event affecting any of Target’s Systems, that has caused or would reasonably be expected to cause any: (i) substantial disruption of or interruption in or to the use of Target’s Systems or the conduct of the Business of Target; (ii) loss, destruction, damage or harm of Target or any of its Business or operations, personnel, property or other assets; or (iii) liability of any kind to Target or its Business. Target has used commercially reasonable best efforts, consistent with applicable industry best practices, to protect the integrity and security of Target Systems and the data and other information stored thereon. (c) Target maintains commercially reasonable back-up and data recovery, disaster recovery and business continuity plans, procedures and facilities, act in material compliance therewith, and test such plans and procedures on a regular basis, and such plans and procedures have been proven effective upon such testing.
AutoNDA by SimpleDocs
Software and IT. (a) The Company’s Systems are reasonably sufficient and in sufficiently good working condition in all material respects for the current needs of the Business, including as to capacity, and ability to process current peak volumes in a timely manner, and to the Knowledge of the Company, are free from viruses, worms, time bombs, key locks, malware and other corruptants. (b) In the last three (3) years, to the Knowledge of the Company, there has been no unauthorized access, use, intrusion or breach of security, or material failure, breakdown, performance reduction or other adverse event affecting any of the Company’s Systems, that has caused any: (i) material disruption of or interruption in the conduct of the Business; (ii) substantial loss, destruction, damage or harm of the Company or any of their Business or operations, personnel, property or other assets; or (iii) material Liability of any kind to the Company or its Business or the legal obligation to notify any Person. The Company taken commercially reasonable actions, taking into account the size and complexity of the Company, to protect the integrity, security and continuous operation of the Company’s Systems and the confidential data and other confidential information stored thereon or processed thereby. (c) The Company maintains reasonable, taking into account the size and complexity of the Company, back-up and data recovery, disaster recovery and business continuity plans and procedures, and, to the Knowledge of the Company, act in material compliance therewith.
Software and IT. (a) The Company Entities’ Systems are reasonably sufficient and in sufficiently good working condition in all material respects for the current needs of the Business, including as to capacity, scalability, and ability to process current peak volumes in a timely manner. (b) To the Knowledge of the Company, in the last two (2) years, there has been no unauthorized access, use, intrusion or breach of security, or material failure, breakdown, performance reduction or other adverse event affecting any of the Company Entities’ Systems, that has caused any: (i) material disruption of or interruption in the conduct of the Business of the Company Entities; (ii) substantial loss, destruction, damage or harm of any Company Entity or any of their Business or operations, personnel, property or other assets; or (iii) material liability of any kind to the Company Entities or their Business. Each Company Entity has taken commercially reasonable actions, taking into account the size and complexity of the Company, to protect the integrity and security of the Company Entities’ Systems and the data and other information stored thereon. (c) The Company Entities maintain back-up and data recovery, disaster recovery and business continuity plans and procedures, and, to the Knowledge of the Company, act in material compliance therewith.

Related to Software and IT

  • Hardware and Software In order to use the Services, you must obtain and maintain, at your expense, compatible hardware and software as specified by Credit Union from time to time. Credit Union is not responsible for any third party software you may need to use the Services. Any such software is accepted by you as is and is subject to the terms and conditions of the software agreement you enter into directly with the third party software provider at time of download and installation.

  • Software and Documentation Licensee may make as many copies of the Software necessary for it to use the Software as licensed. Each copy of the Software made by Licensee must contain the same copyright and other notices that appear on the original copy. Licensee will not modify the Documentation. Documentation may: (a) only be used to support Licensee’s use of the Software; (b) not be republished or redistributed to any unauthorized third party; and (c) not be distributed or used to conduct training for which Licensee, or any other party, receives a fee. Licensee will not copy any system schema reference document related to the Software.

  • Required hardware and software The minimum system requirements for using the DocuSign system may change over time. The current system requirements are found here: xxxxx://xxxxxxx.xxxxxxxx.xxx/guides/signer-guide- signing-system-requirements.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Software Inclusions Restrictions

  • Care and Maintenance The Real Estate shall be preserved in its present condition and delivered intact at the time of closing.

  • Software Products Save as otherwise set forth in the Agreement, the right to use any Software Product is personal to the Licensee, for its own internal use, and is non-transferable, except with the Licensor’s prior written consent, in which case the Licensee shall cause the assignee or sub-licensee to agree to the terms of this Software License.

  • Software Maintenance Subrecipient shall apply security patches and upgrades in a timely manner and keep virus software up-to-date on all systems on which State data may be stored or accessed.

  • Software Licensing Contractor represents and warrants that the software, if any, as delivered to City, does not contain any program code, virus, worm, trap door, back door, time or clock that would erase data or programming or otherwise cause the software to become inoperable, inaccessible, or incapable of being used in accordance with its user manuals, either automatically, upon the occurrence of licensor-selected conditions or manually on command. Contractor further represents and warrants that all third party software, delivered to City or used by Contractor in the performance of the Contract, is fully licensed by the appropriate licensor.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!