Technology Security Systems Clause Samples
Technology Security Systems. (i) Each Loan Party and each of its Subsidiaries has implemented and maintains adequate administrative, physical, and technical security measures and procedures to protect the confidentiality, integrity, and security of (A) its computers, computer systems, servers, hardware, software, websites, databases, networks, and all other information technology equipment and systems, including any hosted locations and other outsourced systems and processes (all of the foregoing in this clause (A), “Loan Party Systems”) and (B) all individually identifiable information, including protected health information and other sensitive and confidential information, accessed, collected, used, processed, stored, transferred or disclosed by or on behalf of any Loan Party or any Subsidiary of any Loan Party (all such data and information referred to in this clause (B), “Loan Party Data”), in all cases including from theft, destruction, corruption, loss or unauthorized use, access, interruption, deletion, alteration or modification by any Person. All Loan Party Systems are operational and have adequate backups and disaster recovery arrangements that are at least reasonable and at least consistent with, as protective as, and no less rigorous than, industry standards for companies and businesses of similar size in similar industries. Without limiting the generality of the foregoing, each Loan Party and each of its Subsidiaries (x) maintains applicable equipment and software in physically secure premises, (y) utilizes industry-accepted virus and intrusion checking software and firewalls, and (z) limits access to Loan Party Data to only those employees and agents who need such access for the conduct of the business of the Loan Parties and their Subsidiaries.
(ii) No Loan Party or any Subsidiary of any Loan Party has experienced any (A) material security incidents, data breaches, intrusions or unauthorized access, use or compromise of any of the Loan Party Systems, (B) material unauthorized collection, access, use, processing, loss, compromise, interruption, deletion, modification or disclosure of any Loan Party Data or trade secrets of any Loan Party or any Subsidiary of any Loan Party or (C) material cyber, social engineering, spoofing, phishing, ▇▇▇▇▇▇, viral or other attack, theft or intrusion that that has allowed an unauthorized Person to access, copy, encrypt or otherwise use any Loan Party Data (all of the foregoing clauses (A), (B) and (C), “Security Breaches”). Each Loan Par...
Technology Security Systems. (i) Each Loan Party and each of its Subsidiaries has implemented and maintains commercially reasonable administrative, physical, and technical security measures and procedures, as applicable, intended to protect the confidentiality, integrity, and security of (A) its computers, computer systems, servers, hardware, software, websites, databases, networks, and all other information technology equipment and systems owned, operated, or controlled by such Loan Party or Subsidiary, including any hosted locations and other outsourced systems and processes (all of the foregoing in this clause (A), “Loan Party Systems”) and (B) Personal Information accessed, collected, used, processed, stored, transferred or disclosed by or on behalf of any Loan Party or any Subsidiary of any Loan Party (all such data and information referred to in this clause (B), “Loan Party Data”), including from theft, destruction, corruption, loss or unauthorized use, access, interruption, deletion, alteration or modification by any Person. All Loan Party Systems are operational and have adequate backups and disaster recovery arrangements that are at least commercially reasonable and consistent with applicable industry standards. Without limiting the generality of the foregoing, each Loan Party and each of its Subsidiaries (x) maintains physical security measures intended to protect applicable equipment and software, (y) utilizes commercially reasonable virus and intrusion checking software and firewalls, and (z) where reasonably necessary, limits access to Loan Party Data to only those employees and agents who need such access for the conduct of the business of the Loan Parties and their Subsidiaries.
(ii) No Loan Party or any Subsidiary of any Loan Party, at any time within the last three years, has experienced any (A) material security incidents, data breaches, intrusions or unauthorized access, use or compromise of any of the Loan Party Systems, (B) material unauthorized collection, access, use, processing, loss, compromise, interruption, deletion, modification or disclosure of any Loan Party Data or trade secrets of any Loan Party or any Subsidiary of any Loan Party or (C) material cyber, social engineering, spoofing, phishing, ransom, viral or other attack, theft or intrusion that that has allowed an unauthorized Person to access, copy, encrypt or otherwise use any Loan Party Data (all of the foregoing clauses (A), (B) and (C), “Security Breaches”). Each Loan Party and each of its Subsid...
Technology Security Systems. (a) Each Credit Party and each of its Subsidiaries has implemented and maintains adequate administrative, physical, and technical security measures and procedures (consistent with industry standards for companies and businesses of similar size in similar industries) to protect the confidentiality, integrity, and security of (i) its computers, computer systems, servers, hardware, software, websites, databases, networks, and all other information technology equipment and systems, including any hosted locations and other outsourced systems and processes (all of the foregoing in this clause (i), “Credit Party Systems”) and (ii) all individually identifiable information, including sensitive and confidential information, accessed, collected, used, processed, stored, transferred or disclosed by or on behalf of any Credit Party or any Subsidiary of any Credit Party (all such data and information referred to in this clause (ii), “Credit Party Data”), in all cases including from theft, destruction, corruption, loss or unauthorized use, access, interruption, deletion, alteration or modification by any Person except, in each case of this clause (a), as has not had, and would not reasonably be expected to have, individually or in the aggregate, a Material Adverse Effect. All Credit Party Systems necessary to the operation of Credit Party’s business are operational in all material respects and have adequate backups and disaster recovery arrangements that are at least reasonable and at least consistent with, as protective as, and no less rigorous than, industry standards for companies and businesses of similar size in similar industries. Without limiting the generality of the foregoing, each Credit Party and each of its Subsidiaries (x) takes commercially reasonable efforts to securely store applicable equipment and software that is material to its business, (y) utilizes industry-accepted virus and intrusion checking software and firewalls, and (z) limits access to Credit Party Data to only those employees and agents who need such access for the conduct of the business of the Credit Parties and their Subsidiaries.
(b) No Credit Party or any Subsidiary of any Credit Party has experienced any (i) security incidents, data breaches, intrusions or unauthorized access, use or compromise of any of the Credit Party Systems, (ii) unauthorized collection, access, use, processing, loss, compromise, interruption, deletion, modification or disclosure of any Credit Party Data or trade...
Technology Security Systems. (i) Each Loan Party and each of its Subsidiaries has implemented and maintains administrative, physical, and technical security measures and procedures (consistent with industry standards for companies and businesses of similar size in similar industries) to protect the confidentiality, integrity, and security of (A) its computers, computer systems, servers, hardware, software, websites, databases, networks, and all other information technology equipment and systems, including any hosted locations and other outsourced systems and processes (all of the foregoing in this clause (A), “Loan Party Systems”) and (B) all individually identifiable information, including protected health information and other sensitive and confidential information, accessed, collected, used, processed, stored, transferred or disclosed by or on behalf of any Loan Party or any Subsidiary of any Loan Party (all such data and information referred to in this clause (B), “Loan Party Data”), in all cases including from theft, destruction, corruption, loss or unauthorized use, access, interruption, deletion, alteration or modification by any Person. All Loan Party Systems are operational in all material respects and have adequate backups and disaster recovery arrangements that are at least reasonable and at least consistent with, as protective as, and no less rigorous than, industry standards for companies and businesses of similar size in similar industries. Without limiting the generality of the foregoing, each Loan Party and each of its Subsidiaries (x) maintains applicable equipment and software that is material to its business in physically secure premises, (y) utilizes industry-accepted virus and intrusion checking software and firewalls, and (z) limits access to Loan Party Data to only those employees and agents who need such access for the conduct of the business of the Loan Parties and their Subsidiaries.
(ii) No Loan Party or any Subsidiary of any Loan Party has experienced any (A) material security incidents, data breaches, intrusions or unauthorized access, use or compromise of any of the Loan Party Systems, (B) material unauthorized collection, access, use, processing, loss, compromise, interruption, deletion, modification or disclosure of any Loan Party Data or trade secrets of any Loan Party or any Subsidiary of any Loan Party or (C) material cyber, social engineering, spoofing, phishing, ▇▇▇▇▇▇, viral or other attack, theft or intrusion that that has allowed an unauthorized...
