Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.
Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.
Critical Infrastructure Subcontracts For purposes of this Paragraph, the designated countries are China, Iran, North Korea, Russia, and any countries lawfully designated by the Governor as a threat to critical infrastructure. Pursuant to Section 113.002 of the Business and Commerce Code, Contractor shall not enter into a subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business and Commerce Code, in this state, other than access specifically allowed for product warranty and support purposes to any subcontractor unless (i) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is majority owned or controlled by citizens or governmental entities of a designated country; and (ii) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is headquartered in a designated country. Contractor will notify the System Agency before entering into any subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business & Commerce Code, in this state.
Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:
Acquisition Services (i) Serve as the Company’s investment and financial advisor and provide relevant market research and economic and statistical data in connection with the Company’s assets and investment objectives and policies; (ii) Subject to Section 4 hereof and the investment objectives and policies of the Company: (a) locate, analyze and select potential investments; (b) structure and negotiate the terms and conditions of transactions pursuant to which investments in Properties, Loans and other Permitted Investments will be made; (c) acquire, originate and dispose of Properties, Loans and other Permitted Investments on behalf of the Company; (d) arrange for financing and refinancing and make other changes in the asset or capital structure of investments in Properties, Loans and other Permitted Investments; and (e) enter into leases, service contracts and other agreements for Properties, Loans and other Permitted Investments; (iii) Perform due diligence on prospective investments and create due diligence reports summarizing the results of such work; (iv) Prepare reports regarding prospective investments that include recommendations and supporting documentation necessary for the Directors to evaluate the proposed investments; (v) Obtain reports (which may be prepared by the Advisor or its Affiliates), where appropriate, concerning the value of contemplated investments of the Company; (vi) Deliver to or maintain on behalf of the Company copies of all appraisals obtained in connection with the Company’s investments; and (vii) Negotiate and execute approved investments and other transactions, including prepayments, maturities, workouts and other settlements of Loans and other Permitted Investments.
Information Systems The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.
Information Services The Custodian may rely upon information received from issuers of Securities or agents of such issuers, information received from Subcustodians or depositories, information from data reporting services that provide detail on corporate actions and other securities information, and other commercially reasonable industry sources; and, provided the Custodian has acted in accordance with the standard of care set forth in Section 6 (a), the Custodian shall have no liability as a result of relying upon such information sources, including but not limited to errors in any such information.
Additional Financial Information The Company shall provide Parent with the Company’s audited financial statements for the twelve month periods ended December 31, 2022 and 2021 consisting of the audited consolidated balance sheets as of such dates, the audited consolidated income statements for the twelve month period ended on such date, and the audited consolidated cash flow statements for the twelve month period ended on such date (the “Year End Financials”). Subsequent to the delivery of the Year End Financials, the Company’s consolidated interim financial information for each quarterly period thereafter shall be delivered to Parent no later than forty (40) calendar days following the end of each quarterly period and consolidated interim monthly information for each month thereafter shall be delivered to Purchaser no later than 20 days following the end of each month (the “Required Financial Statements”). All of the financial statements to be delivered pursuant to this Section 7.3, shall be prepared under U.S. GAAP in accordance with requirements of the PCAOB for public companies. The Required Financial Statements shall be accompanied by a certificate of the Chief Executive Officer of the Company to the effect that all such financial statements fairly present the financial position and results of operations of the Company as of the date or for the periods indicated, in accordance with U.S. GAAP, except as otherwise indicated in such statements and subject to year-end audit adjustments. The Company will promptly provide with additional Company financial information reasonably requested by Parent for inclusion in the Proxy Statement and any other filings to be made by Parent with the SEC.
INFORMATION ASSURANCE (a) Information provided by LOCKHEED XXXXXX to SELLER remains the property of LOCKHEED XXXXXX. SELLER shall comply with the terms of any proprietary information agreement with LOCKHEED XXXXXX and comply with all proprietary information markings and restrictive legends applied by LOCKHEED XXXXXX to anything provided hereunder to SELLER. SELLER shall not use any LOCKHEED XXXXXX provided information for any purpose except to perform this Contract and shall not disclose such information to third parties without the prior written consent of LOCKHEED XXXXXX. SELLER shall maintain data protection processes and systems sufficient to adequately protect LOCKHEED XXXXXX provided information and comply with any law or regulation applicable to such information. (b) If SELLER becomes aware of any compromise of information used in the performance of this Contract or provided by LOCKHEED XXXXXX to SELLER, its officers, employees, agents, suppliers, or subcontractors (an “Incident”), SELLER shall take appropriate immediate actions to investigate and contain the Incident and any associated risks, including notification within seventy-two (72) hours to LOCKHEED XXXXXX after learning of the Incident. As used in this clause, “compromise” means that information has been exposed to unauthorized access, inadvertent disclosure, known misuse, loss, destruction, or alteration other than as required to perform the Work. SELLER shall provide reasonable cooperation to LOCKHEED XXXXXX in conducting any investigation regarding the nature and scope of any Incident. Any costs incurred in investigating or remedying Incidents shall be borne by SELLER. (c) Any LOCKHEED XXXXXX provided information identified as proprietary or subject to restrictions on public disclosure by law or regulation shall be encrypted (i) if transmitted via the Internet, or (ii) during electronic storage if potentially accessible by the Internet or otherwise by non-authorized users. (d) The provisions set forth above are in addition to and do not alter, change or supersede any obligations contained in a proprietary information agreement between the parties.