Examples of IT Systems in a sentence
The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems, Confidential Data, and Personal Data and to the protection of such IT Systems, Confidential Data, and Personal Data from unauthorized use, access, misappropriation or modification.
There have been no material security breaches or attacks, violations, outages, accidental or unlawful destruction, loss, alteration or unauthorized uses or disclosures of or access to any IT Systems or Protected Information, or any other material incidents or compromises of or relating to any IT Systems or Protected Information, nor any notifications by any third parties of any of the foregoing.
The Company and the Subsidiary are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
There have been no actual or likely breaches, violations, material vulnerabilities, outages or unauthorized uses of or accesses to same nor any incidents under internal review or investigations relating to the same, including without limitation, with respect to IT Systems and Confidential Data or, to the knowledge of the Company, any third party service providers of the Company, except as could not reasonably be expected, individually or in the aggregate, to result in a Material Adverse Change.
The Company and its subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data, including all “Personal Data” (as defined below) and all sensitive, confidential or regulated data (“Confidential Data”) used in connection with their businesses.