Examples of Acquired Company IT Systems in a sentence
Except as set forth on S chedule 2.17, since January 1, 2013, to the Knowledge of the Company, there have been no (1) security breaches, including unauthorized access to or unauthorized disclosure, use, or transfer, of any Personal Data, (2) security breaches of any Acquired Company IT Systems or (3) material violations of any Legal Requirements regarding Personal Data.
The Acquired Company IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct the business of the Acquired Companies.
As of and immediately following the Effective Time, the Acquired Company IT Systems owned or controlled by each Acquired Company and each of its Affiliates shall be in the possession, custody or control of the Acquired Companies, along with all tools, documentation and other materials relating thereto, as existing immediately prior to the Effective Time.
All Acquired Company IT Systems have been regularly maintained by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the industry, to ensure proper operation; provided, however, that with respect to any Acquired Company IT Systems operated by third parties, the foregoing representation in this Section 2.13(o) is qualified as to the Knowledge of the Company.
Each Acquired Company and each of its Affiliates controls access to its respective Acquired Company IT Systems owned or controlled by such Acquired Company or its Affiliates through the utilization of industry-standard or better security measures that are designed to prevent unauthorized access to such Acquired Company IT Systems.
Except as set forth in Section 2.11(a) of the Disclosure Schedule, the Acquired Companies have not experienced within the past three years any material disruption to, or material interruption in, the conduct of business attributable to a defect, bug, breakdown or other failure or deficiency of the Acquired Company IT Systems.
The Acquired Companies practice reasonable information security measures that: (i) include administrative, technical and physical safeguards designed to safeguard the security, confidentiality and integrity of transactions and Acquired Company Data and (ii) are designed to protect against unauthorized access to the Acquired Company IT Systems or Acquired Company Data and the systems of any third party service providers that have access to Acquired Company Data or Acquired Company IT Systems.