Common use of Information Technology and Cybersecurity Clause in Contracts

Information Technology and Cybersecurity. Except as would not reasonably be expected to have a Material Adverse Effect on the Company: (a) The IT Systems used in the conduct of the Company’s business: (i) operate and perform in accordance with their documentation and functional specifications; (ii) are adequate for, and operate and perform in all material respects as required in connection with, the needs and operation of Company’s business as currently conducted and are fulfilling the purposes for which they were acquired, licensed or established in an efficient manner without material downtime or errors; and (iii) are free from any bugs, computer virus, unauthorized disabling or erasing mechanism, worm, unauthorized software lock, drop dead device, Trojan horse, back door, trap door or time bomb or other software routines or hardware components that permit unauthorized access or the unauthorized disablement or erasure of the IT Systems. There has been no failure or other material substandard performance of any IT Systems which has caused any disruption to the business of the Company. (b) The Company has implemented with respect to the IT Systems used in its business commercially reasonable (i) steps to provide for backup, security and disaster recovery technology consistent with industry practices and (ii) actions (including implementing and monitoring compliance with administrative, technical and physical safeguards, policies, procedures and security measures that conform with all applicable contractual obligations and Privacy Laws) to protect the operation, confidentiality, integrity and security of its IT Systems and the information (including trade secrets and Personal Information) and data stored thereon or transmitted thereby, including from unauthorized use or access by third parties and from viruses and contaminants. The Company has carried out and documented reasonable security and technology audits, investigations, data mapping exercises, impact assessments, and other activities relating to the Company’s information security practices, and no such audits, investigations, assessments and/or reports have identified material risks and/or vulnerabilities in the Company IT Systems. (c) There has been no security breach of, or unauthorized use or access to, the Company IT Systems (including ransomware attacks), including any breach, which resulted in the unauthorized use, misappropriation, modification, encryption, corruption, disclosure or transfer of any information or data contained therein or transmitted thereby (including trade secrets and Personal Information). (d) The Open Source Software used in the Company Software and Proprietary Databases does not have license or other usage terms that require as a condition of how the Company currently uses or has used the Company Software and Proprietary Databases, that any Software or databases or data incorporated into, derived from or distributed with the Company Software and Proprietary Databases be (i) disclosed or, in the case of Software, distributed in source code form; (ii) licensed for the purpose of making derivative works; (iii) redistributable at no charge; or (iv) subject to any other material limitation, restriction or condition on the right or ability of the Company to use or distribute the same. The Company has not used any Company Software or Proprietary Database disseminated by an entity on behalf of the Company that is installed on consumers’ or partners’ device(s) and used by any Person on behalf of the Company to monitor, record or transmit information about activities occurring on the device(s) on which it is installed, or about data that is stored or created on, transmitted from or transmitted to the computers on which it is installed in a manner that violates any applicable Company Privacy Commitments. The Company has not entered in any escrow or other agreements with any Person granting access to any Company Software and Proprietary Databases.

Appears in 1 contract

Sources: Merger Agreement (Nxu, Inc.)

Information Technology and Cybersecurity. Except as would not reasonably be expected to have a Material Adverse Effect on the CompanyAcquiror or Nxu Tech: (a) The IT Systems used in the conduct of the CompanyAcquiror’s business: and Nxu Tech’s business (i) operate and perform in accordance with their documentation and functional specifications; (ii) are adequate for, and operate and perform in all material respects as required in connection with, the needs and operation of CompanyAcquiror’s and Nxu Tech’s business as currently conducted and are fulfilling the purposes for which they were acquired, licensed or established in an efficient manner without material downtime or errors; and (iii) are free from any bugs, computer virus, unauthorized disabling or erasing mechanism, worm, unauthorized software lock, drop dead device, Trojan horse, back door, trap door or time bomb or other software routines or hardware components that permit unauthorized access or the unauthorized disablement or erasure of the IT Systems. There has been no failure or other material substandard performance of any IT Systems which has caused any disruption to the business of the CompanyAcquiror or Nxu Tech. (b) The Company Each of Acquiror and Nxu Tech has implemented with respect to the IT Systems used in its business commercially reasonable (i) steps to provide for backup, security and disaster recovery technology consistent with industry practices and (ii) actions (including implementing and monitoring compliance with administrative, technical and physical safeguards, policies, procedures and security measures that conform with all applicable contractual obligations and Privacy Laws) to protect the operation, confidentiality, integrity and security of its IT Systems and the information (including trade secrets and Personal Information) and data stored thereon or transmitted thereby, including from unauthorized use or access by third parties and from viruses and contaminants. The Company Each of Acquiror and Nxu Tech has carried out and documented reasonable security and technology audits, investigations, data mapping exercises, impact assessments, and other activities relating to the CompanyAcquiror’s and Nxu Tech’s information security practices, and no such audits, investigations, assessments and/or reports have identified material risks and/or vulnerabilities in the Company Acquiror’s or Nxu Tech’s IT Systems. (c) There has been no security breach of, or unauthorized use or access to, the Company Acquiror or Nxu’s IT Systems (including ransomware attacks), including any breach, breach which resulted in the unauthorized use, misappropriation, modification, encryption, corruption, disclosure or transfer of any information or data contained therein or transmitted thereby (including trade secrets and Personal Information). (d) The Open Source Software used in the Company Acquiror and Nxu Tech Software and Proprietary Databases does not have license or other usage terms that require as a condition of how the Company Acquiror or Nxu Tech, as applicable, currently uses or has used the Company Acquiror and Nxu Tech Software and Proprietary Databases, that any Software or databases or data incorporated into, derived from or distributed with the Company Acquiror and Nxu Tech Software and Proprietary Databases be (i) disclosed or, in the case of Software, distributed in source code form; (ii) licensed for the purpose of making derivative works; (iii) redistributable at no charge; or (iv) subject to any other material limitation, restriction or condition on the right or ability of the Company Acquiror or Nxu Tech to use or distribute the same. The Company Neither Acquiror nor Nxu Tech, as applicable, has not used any Company Acquiror or Nxu Tech Software or Proprietary Database disseminated by an entity on behalf of the Company Acquiror or Nxu Tech, as applicable, that is installed on consumers’ or partners’ device(s) and used by any Person on behalf of the Company Acquiror or Nxu Tech, as applicable, to monitor, record or transmit information about activities occurring on the device(s) on which it is installed, or about data that is stored or created on, transmitted from or transmitted to the computers on which it is installed in a manner that violates any applicable Company Acquiror Privacy Commitments. The Company Neither Acquiror nor Nxu Tech has not entered in any escrow or other agreements with any Person granting access to any Company Acquiror and Nxu Tech Software and Proprietary Databases.

Appears in 1 contract

Sources: Merger Agreement (Nxu, Inc.)