Business IT Systems Clause Samples

The 'Business IT Systems' clause defines the scope and responsibilities related to the information technology infrastructure used by a business, including hardware, software, networks, and data management systems. This clause typically outlines which systems are covered under the agreement, who is responsible for their maintenance and security, and any requirements for system updates or data protection. Its core function is to ensure clarity regarding the management and oversight of IT resources, thereby reducing the risk of misunderstandings or disputes over technology-related obligations.
POPULAR SAMPLE Copied 1 times
Business IT Systems. All Business IT Systems are in good working condition and are sufficient for the operation of the Business as currently conducted. In the past three (3) years, there has been no (i) malfunction, failure, continued substandard performance, or impairment of the Business IT Systems that has resulted or is reasonably likely to result in disruption or damage to the Business. Seller has taken all commercially reasonable steps to safeguard the confidentiality, availability, security, and integrity of the Business IT Systems, including implementing and maintaining appropriate backup, disaster recovery, and software and hardware support arrangements. Additionally, with respect to Seller's Appfolio license, which Seller acknowledges forms a part of the Business IT Systems, Seller agrees that after the Closing Date, Seller shall no longer have rights to such license and that all such rights shall be exclusively retained by Purchaser.
Business IT Systems. All Business IT Systems are in good working condition and are sufficient for the operation of the business of the IA Group Companies as currently conducted. In the past three (3) years, there has been no malfunction, failure or impairment of the Business IT Systems that has resulted or is reasonably likely to result in an IA ▇▇▇▇▇ ▇▇▇▇▇▇▇▇ Adverse Effect. IA Group has taken commercially reasonable steps designed to safeguard the confidentiality, availability, security, and integrity of the Business IT Systems, including implementing and maintaining commercially reasonable backup, disaster recovery, and software and hardware support arrangements.
Business IT Systems. All Business IT Systems are in good working condition and are sufficient for the operation of the Business as currently conducted. In the past three (3) years, there has been no (i) malfunction, failure, continued substandard performance, or impairment of the Business IT Systems that has resulted or is reasonably likely to result in disruption or damage to the Business. Seller has taken all commercially reasonable steps to safeguard the confidentiality, availability, security, and integrity of the Business IT Systems, including implementing and maintaining appropriate backup, disaster recovery, and software and hardware support arrangements.
Business IT Systems. All Business IT Systems are in good working condition and are sufficient for the operation of the FVR Management Business as currently conducted. In the past three (3) years, there has been no malfunction, failure, continued substandard performance, or impairment of the Business IT Systems that has resulted or is reasonably likely to result in material disruption or damage to the Business. The Management Parties have taken all commercially reasonable steps to safeguard the confidentiality, availability, security, and integrity of the Business IT Systems, including implementing and maintaining appropriate backup, disaster recovery, and software and hardware support arrangements.
Business IT Systems. Section 2.6(f) of the Disclosure Letter sets forth an accurate and complete list, as of the date of this Agreement, of all the Business IT Systems. In the past three years, there has been no malfunction, failure, continued substandard performance, denial-of-service, or other cyber incident, including any cyberattack, or other impairment of Business IT Systems, in each case except as would not reasonably be expected to have, individually or in the aggregate, a Material Adverse Effect. The GAME Parties have taken all reasonable best effort steps to safeguard the confidentiality, availability, security, and integrity of Business IT Systems, including implementing and maintaining appropriate backup, disaster recovery, and software and hardware support arrangements, in each case except as would not reasonably be expected to have, individually or in the aggregate, a Material Adverse Effect. With respect to Business IT Systems used or held for use in the business of the GAME Parties, no such Software (or such IT System) contains any undisclosed or hidden device or feature designed to disrupt, disable, or otherwise impair the functioning of any Software or IT System or any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” or other malicious code or routines that permit unauthorized access or the unauthorized disablement or erasure of such or other software or information or data (or any parts thereof) of the GAME Parties or customers of the GAME Parties.
Business IT Systems. All information technology and computer systems, including Software, hardware, networks, interfaces, and related systems, relating to the transmission, storage, maintenance, organization, presentation, generation, processing or analysis of data and information, whether or not in electronic format, used in or necessary to the conduct of the business of Shred-it and its Subsidiaries (collectively, “Business IT Systems”) have been properly maintained, in all material respects, by technically competent personnel, in accordance with standards set by the manufacturers or otherwise in accordance with prudent industry standards, including the Payment Card Industry Data Security Standard, as adopted by the PCI Security Standards Council, LLC (as in effect on the date hereof) (the “PCI DSS”), designed to ensure proper operation, monitoring and use and the security of Personal Data and User Data. The Business IT Systems are in good working condition to effectively perform all information technology operations necessary to conduct the business of Shred-it and its Subsidiaries in all material respects.

Related to Business IT Systems

  • IT Systems Except as would not, individually or in the aggregate, have a Material Adverse Effect, the Company reasonably believes that (i) the Company and the Subsidiaries own or have a valid right to access and use all computer systems, networks, hardware, software, databases, websites, and equipment used to process, store, maintain and operate data, information, and functions used in connection with the business of the Company and the Subsidiaries (the “Company IT Systems”), (ii) the Company IT Systems are adequate for, and operate and perform as required in connection with, the operation of the business of the Company and the Subsidiaries as currently conducted and (iii) the Company and the Subsidiaries have implemented reasonable backup, security and disaster recovery technology consistent with applicable regulatory standards;

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at ▇▇▇▇▇://▇▇▇.▇▇.▇▇▇/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.