Common use of Security Programs Clause in Contracts

Security Programs. Each of the Seller, the Purchased Subsidiary and its Subsidiaries is in compliance in all material respects with all privacy and data security policies, procedures and Legal Requirements applicable to its business and the Purchased Subsidiary, its Subsidiaries and the respective Assets thereof. The Seller, the Purchased Subsidiary and each of its Subsidiaries maintains and is in compliance in all material respects with a written information security policy that implements commercially reasonable security programs that are designed to protect (a) the security, confidentiality, availability and integrity of transactions executed through its computer systems, including encryption and/or other security protocols and techniques when appropriate and (b) the security, confidentiality and integrity of all non-public personal information and other confidential and proprietary data. To the Knowledge of the Seller, neither the Seller nor the Purchased Subsidiary nor any of its Subsidiaries has suffered a security breach with respect to its data or systems and neither the Seller nor the Purchased Subsidiary or its Subsidiaries has notified any customer, policy holder, mortgage borrower or any employee or independent contractor of any information security breach involving such customer's, policy holder's or mortgage borrower's confidential information or such employee's or independent contractor's confidential information.

Appears in 2 contracts

Sources: Stock Purchase Agreement (NMI Holdings, Inc.), Stock Purchase Agreement (NMI Holdings, Inc.)