Examples of Acquired Company IT Systems in a sentence
The Acquired Companies practice reasonable information security measures that: (i) include administrative, technical and physical safeguards designed to safeguard the security, confidentiality and integrity of transactions and Acquired Company Data and (ii) are designed to protect against unauthorized access to the Acquired Company IT Systems or Acquired Company Data and the systems of any third party service providers that have access to Acquired Company Data or Acquired Company IT Systems.
All Acquired Company IT Systems have been regularly maintained by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with standards prudent in the industry, to ensure proper operation; provided, however, that with respect to any Acquired Company IT Systems operated by third parties, the foregoing representation in this Section 2.13(o) is qualified as to the Knowledge of the Company.
Except as set forth in Section 2.11(a) of the Disclosure Schedule, the Acquired Companies have not experienced within the past three years any material disruption to, or material interruption in, the conduct of business attributable to a defect, bug, breakdown or other failure or deficiency of the Acquired Company IT Systems.
The Acquired Company IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct the business of the Acquired Companies.
All Acquired Company IT Systems, to the extent maintained and controlled by any Acquired Company, are configured in accordance with and perform, in all material respects, in compliance with industry accepted security standards in the respective industry in which each of the Acquired Companies is operating.
P3K and each Acquired Company has taken all commercially reasonable steps to safeguard the confidentiality, availability, security, and integrity of the Acquired Company IT Systems, including implementing and maintaining appropriate backup, disaster recovery, and Software and hardware support arrangements.
All Acquired Company IT Systems (including all computer hardware and software, including rented, leased and borrowed hardware and all programs available on and run by the computer systems), are functional in all material respects and no material errors or defects which have not been fully remedied have been discovered therein.
The Acquired Company IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct the business of the Acquired Companies as it is currently conducted and currently planned by the Acquired Companies to be conducted.
The Acquired Companies have been, and are, in compliance, in all material respects, with all Privacy Laws and all other relevant Laws and contractual obligations concerning the security and privacy of Acquired Company IT Systems and information contained therein (including all Acquired Company Data) in all respects.
The Acquired Companies’ rights with respect to the Acquired Company IT Systems will not be lost or rendered liable to termination by virtue of the performance of this Agreement.