Example ContractsClausesIT Systems
IT Systems
IT Systems contract clause examples

IT Systems. (A)(x) To the Company’s knowledge, there has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and # the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, # the Company and its subsidiaries have complied, and are presently in compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all industry guidelines, standards, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, and # the Company and its subsidiaries have implemented commercially reasonable backup and disaster recovery technology consistent with industry standards and practice, and # neither the Company nor any of its subsidiaries # has received notice of any actual or potential liability under or relating to any applicable law, industry guidelines, standards, internal policies and contractual obligations governing the IT Systems and Data, and # is party to any order, decree or agreement that imposed any obligations or liability under or relating to any applicable law, industry guidelines, standards, internal policies and contractual obligations governing the IT Systems and Data.

The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the Company’s knowledge, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same.

IT Systems. All computer hardware, telecommunications and information technology systems located within the Improvements and/or at the Land necessary for the operation of the Hotel (the “IT Systems”);

IT Systems. (i)(x) To the knowledge of Company, there has been no security breach or other compromise of any of the Company’s information technology and computer systems, networks, hardware, software, data (including the data of the Company’s respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of the Company), equipment or technology (collectively, “IT Systems and Data”) and # the Company has not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; # the Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, have a Material Adverse Effect; and # the Company has implemented backup and disaster recovery technology consistent with industry standards and practices.

Systems. The Stations use certain operating and IT systems and digital arrangements provided by Emmis or its Affiliates. Effective as of Closing, such use shall discontinue, and Sinclair shall cause the LP to replace them with other operating and IT systems and digital arrangements for the Stations. The material systems and arrangements to be replaced are set forth on [Schedule 4.6] attached hereto.

IT Systems. (i)(x)There has been no security breach or attack or other compromise of or relating to any of the Company’s and its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (“IT Systems and Data”), and # the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in any security breach, attack or compromise to their IT Systems and Data, # the Company and each of its subsidiaries have materially complied, and are presently in material compliance with, all applicable laws, statutes or any judgment, order, rule or regulation of any court or arbitrator or governmental or regulatory authority and all internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation, or modification and # the Company and each of its subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practice.

Except as otherwise agreed by the Parties, all information technology and software, including any upgrades, used for the Facility’s operations and the provision of the Services will be handled as set forth on the Operating Services Schedule.

IT Systems. (i)(x) There has been no security breach or other compromise of any of the Partnership’s information technology and computer systems, networks, hardware, software, data (including the data of the Partnership’s customers, employees, suppliers, vendors and any third party data maintained by or on behalf of the Partnership), equipment or technology (collectively, “IT Systems and Data”) and # the Partnership has not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; # the Partnership is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, have a Material Adverse Effect; and # the Partnership has implemented backup and disaster recovery technology consistent with industry standards and practices.

IT Systems. (i)(x) To the knowledge of Company, there has been no security breach or other compromise of any of the Company’s information technology and computer systems, networks, hardware, software, data (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) and # the Company has not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data, except as would not, in the case of this clause (i), individually or in the aggregate, reasonably be expected to have a Material Adverse Effect; and # the Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of this clause (ii), individually or in the aggregate, have a Material Adverse Effect.

IT Systems. With respect to any Personal Property consisting of computer hardware, telecommunications and information technology systems, Seller shall provide Purchaser with a contact name and telephone number of the applicable licensor, vendor or supplier for such Personal Property, and # Purchaser and Seller shall cooperate in obtaining any consents or approvals necessary for the assignment or transfer of such Personal Property from Seller to Purchaser, or a new license for such Personal Property (as the case may be), and # Seller shall pay any fees or expenses charged by the licensor, vendor or supplier of such Personal Property in respect of such assignment or transfer or new license (as the case may be). The provisions of this Section 6.2 shall survive the Closing.

Next results

Draft better contracts
faster with AllDrafts

AllDrafts is a cloud-based editor designed specifically for contracts. With automatic formatting, a massive clause library, smart redaction, and insanely easy templates, it’s a welcome change from Word.

And AllDrafts generates clean Word and PDF files from any draft.