Common use of Data Privacy and Cybersecurity Clause in Contracts

Data Privacy and Cybersecurity. (a) Except for those matters that have not had and would not reasonably be expected to have, individually or in the aggregate, a Partnership Adverse Impact, Partnership, the Partnership Subsidiaries and the Partnership JVs (and the General Partner with respect to Partnership, its Subsidiaries or any Partnership JV) are in compliance with all applicable Privacy Laws. Partnership, the Partnership Subsidiaries and Partnership JVs (and the General Partner with respect to Partnership, its Subsidiaries or any Partnership JV) have not received any written notice of any claims, actions, suits, investigations or other Proceedings related to, or alleged violations of, or been charged with, violation of any Privacy Laws. (b) The Partnership, the Partnership Subsidiaries and the Partnership JVs (and the General Partner with respect to Partnership, its Subsidiaries or any Partnership JV) have caused to be implemented commercially reasonable administrative, physical, organizational, and technical safeguards, including disaster recovery and incident response plans, (i) to protect the integrity, continuous operation and security of the information technology systems (including hardware, computers, Software, websites, applications networks, systems, servers, and network, telecommunications, and peripheral devices, equipment, assets, systems and services) (collectively, “IT Systems”) owned, leased or used by or on behalf of Partnership or any of the Partnership Subsidiaries or the Partnership JVs (“Partnership IT Systems”), and (ii) to protect the confidentiality, integrity, and availability of all Trade Secrets and the Personal Information stored therein. (c) Except for those matters that have not had and would not reasonably be expected to have, individually or in the aggregate, a Partnership Adverse Impact, since January 1, 2018, (i) to the knowledge of the Partnership. there has been no unauthorized access to any Partnership IT Systems, nor any breach, loss, theft, or unauthorized or unlawful corruption, access to or Processing, or the rendering unavailable or not accessible (including through a ransomware attack) of Trade Secrets or Personal Information Processed by or on behalf of General Partner, Partnership or any Partnership Subsidiary nor (ii) has General Partner, Partnership, any Partnership Subsidiary or any Partnership JV notified, or been required by applicable Privacy Law or contract to notify in writing, any person or entity of any Personal Information or information security-related incident. (d) Except for those matters that have not had and would not reasonably be expected to have, individually or in the aggregate, a Partnership Adverse Impact, the integrity and availability of the Partnership IT Systems have not been compromised and the Partnership IT Systems do not contain any disabling codes or instructions, “time bombs”, “Trojan horses”, “back doors”, “trap doors”, “worms”, viruses, bugs, faults or other Software routines that could (i) significantly disrupt or adversely affect the operation of the businesses or the functionality of any Partnership IT Systems or (ii) enable or assist any Person to access, without authorization, any Partnership IT Systems or the Trade Secrets or Personal Information stored therein.

Appears in 3 contracts

Sources: Merger Agreement (Teekay LNG Partners L.P.), Merger Agreement (Teekay Corp), Merger Agreement (Teekay Corp)