IT Systems and Personal Data Clause Samples

The 'IT Systems and Personal Data' clause governs how information technology systems are used and how personal data is handled within the context of the agreement. It typically outlines the responsibilities of each party regarding the protection, processing, and storage of personal data, and may require compliance with relevant data protection laws such as GDPR. This clause ensures that both parties understand their obligations to safeguard sensitive information, thereby reducing the risk of data breaches and ensuring legal compliance.
IT Systems and Personal Data. (i)(x) To the Company’s knowledge, there has been no security breach or other compromise of or relating to any of the Company’s or its subsidiaries’ information technology and computer systems, networks, hardware, software, data (including personal data of their respective customers, employees, suppliers, vendors and any third-party personal data processed by or on behalf of any of the Company´s or its subsidiaries´ contractors), equipment or technology (collectively, “IT Systems and Personal Data”) and (y) to the Company’s knowledge, the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Personal Data, (ii) the Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except as would not, in the case of clause (i) and (ii), individually or in the aggregate, have a Material Adverse Effect, and (iii) the Company and its subsidiaries have implemented security, backup and disaster recovery technology consistent in all material respects with industry standards and practices. Any certificate signed by any officer or representative of the Company or any of its subsidiaries and delivered to the Agent or counsel for the Agent in connection with an issuance of Shares shall be deemed a representation and warranty by the Company to the Agent as to the matters covered thereby on the date of such certificate set forth therein. The Company acknowledges that the Agent and, for purposes of the opinions to be delivered pursuant to Section 4(m) hereof, counsel to the Company and counsel to the Agent, will rely upon the accuracy and truthfulness of the foregoing representations and hereby consents to such reliance.
IT Systems and Personal Data. The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the knowledge of the Company are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, including the European Union General Data Protection Regulation.

Related to IT Systems and Personal Data

  • Privacy and Personal Information We respect Your privacy and will only use and disclose Your personal information in accordance with the Australian Privacy Principles as set out in the Privacy Act 1988 (Cth) and in accordance with Our Privacy Policy. We will otherwise comply with all relevant privacy legislation in relation to Your personal information. Unless We are permitted to do otherwise under this Contract, We will keep Your information confidential. In particular We will keep Your information confidential unless: a) We have Your prior written consent; or b) the Law (including any regulatory, accounting, governmental, Ministerial or stock exchange requirement) requires or permits Us to disclose certain information; or c) We need to use the information for Our regulatory reporting or compliance, or in any legal or regulatory proceedings; or d) the information is already in the public domain; or e) We believe You have used electricity illegally and, as a result, We provide relevant information to the Economic Regulation Authority or the Director of Energy Safety; or f) We use the information for business purposes. g) You have not paid Your electricity bill, and We disclose information to a credit reporting agency, but We will not provide information about a default to a credit reporting agency if: (i) You have made a complaint in good faith about the default and the complaint has not been resolved; or (ii) You have requested Us to review Your electricity bill and the review is not yet completed. To ensure your information remains confidential, we will: 1) Provide Our staff with training around Australian Privacy Principles to ensure Your privacy is maintained; 2) Maintain up to date protection software for all electronically stored information; 3) Where possible, hold Your information on Our internal company network to minimise the risk of an electronic breach, or alternatively use secure, encrypted data centres; 4) Protect all of Our electronic data which contains Your information with passwords. The availability of these passwords will only be provided to staff that require access to the information for ongoing operational purposes; 5) Request that any third parties who require access to Your information provide assurances that they will comply with the Privacy Act; 6) Once no longer required for Our business or compliance purposes, We will destroy Your information as soon as practicable. For more information about Our Privacy Policy, visit Our website or call Us.

  • Processing Personal Data This ▇▇▇▇▇ shall be completed by the Controller, who may take account of the view of the Processors, however the final decision as to the content of this Annex shall be with the Buyer at its absolute discretion.

  • Personal Data Registry Operator shall (i) notify each ICANN-­‐accredited registrar that is a party to the registry-­‐registrar agreement for the TLD of the purposes for which data about any identified or identifiable natural person (“Personal Data”) submitted to Registry Operator by such registrar is collected and used under this Agreement or otherwise and the intended recipients (or categories of recipients) of such Personal Data, and (ii) require such registrar to obtain the consent of each registrant in the TLD for such collection and use of Personal Data. Registry Operator shall take reasonable steps to protect Personal Data collected from such registrar from loss, misuse, unauthorized disclosure, alteration or destruction. Registry Operator shall not use or authorize the use of Personal Data in a way that is incompatible with the notice provided to registrars.

  • Shared Personal Data This clause sets out the framework for the sharing of personal data between the parties as data controllers. Each party acknowledges that one party (the Data Discloser) will regularly disclose to the other party (the Data Recipient) Shared Personal Data collected by the Data Discloser for the Agreed Purposes.

  • Processing of Customer Personal Data 3.1 UKG will: 3.1.1 comply with all applicable Data Protection Laws in the Processing of Customer Personal Data; and 3.1.2 not Process Customer Personal Data other than for the purpose, and in accordance with, the relevant Customer’s instructions as documented in the Agreement and this DPA, unless Processing is required by the Data Protection Laws to which the relevant UKG Processor is subject, in which case UKG to the extent permitted by the Data Protection Laws, will inform Customer of that legal requirement before the Processing of that Customer Personal Data. 3.2 Customer hereby: 3.2.1 instructs UKG (and authorizes UKG to instruct each Subprocessor) to: (a) Process Customer Personal Data; and (b) in particular, transfer Customer Personal Data to any country or territory subject to the provisions of this DPA, in each case as reasonably necessary for the provision of the Services and consistent with the Agreement. 3.2.2 warrants and represents that it is and will at all relevant times remain duly and effectively authorized to give the instructions set out in Section 3.2.1 on behalf of each relevant Customer Affiliate; and 3.2.3 warrants and represents that it has all necessary rights in relation to the Customer Personal Data and/or has collected all necessary consents from Data Subjects to Process Customer Personal Data to the extent required by Applicable Law. 3.3 Schedule 1 to this DPA sets out certain information regarding UKG’s Processing of Customer Personal Data as required by Article 28(3) of the GDPR (and equivalent requirements of other Data Protection Laws).