“Information Systems” means all computers and devices, systems, networks, servers, switches, endpoints, software (including APIs), policy as code, platforms, electronics, websites, modules, communication systems, storage, firmware, middleware, routers, hubs, hardware, and other information technology and infrastructure, whether owned, licensed, leased or outsourced (including cloud computing arrangements), and all electronic connections between them.
“Intellectual Property” means (a) all United States, international and foreign patents and applications therefor and all reissues, divisions, divisionals, renewals, re-examinations, extensions, provisionals, continuations and continuations-in-part thereof; (b) all inventions (whether or not patentable), trade secrets, know how, data and databases, business methods, technical data and customer lists and other proprietary information; (c) all copyrights and copyright registrations, including in computer software, throughout the world, mask works and mask work registrations; (d) all industrial designs and any registrations and applications therefor throughout the world; and (e) all trade names, logos, common law trademarks and service marks, domain names, URLs, social media accounts, and trademark and service mark registrations and applications therefor and the goodwill associated therewith throughout the world.
“Internal Controls” has the meaning set forth in Section 4.07(d).
“Intervening Event” means a change, effect, event, circumstance, occurrence, development or other matter that materially affects the business, assets or operations of the Company and its Subsidiaries, taken as a whole (other than any change, effect, event, circumstance, occurrence, development or other matter primarily resulting from a breach of this Agreement by the Company) occurring or arising after the date of this Agreement that was not known to the board of directors of the Company or any committee thereof as of the date of this Agreement, nor reasonably foreseeable as of the date of this Agreement, which change, effect, event, circumstance, occurrence, development or other matter becomes known to the board of directors of the Company or any committee thereof prior to the date on which the Company Stockholder Approval is obtained; provided, however, that in no event will (i) any Acquisition Proposal, (ii) any change in the Company Stock price, in and of itself, or (iii) the fact, in and of itself, that the Company exceeds any internal or published projections, estimates or expectations of the Company’s revenue, earnings or other financial performance or results of operations for any period constitute an Intervening Event (however, the underlying reasons for such changes or events described in clauses (ii) and (iii) may constitute an Intervening Event).
“Key Employee” means a participant in the Executive Severance Plan.
“knowledge” of any Person that is not an individual means the actual knowledge of such Person’s executive officers; provided, however, that “knowledge” of the Company means the actual knowledge, after due inquiry, of the individuals listed in Section 1.01(a) of the Company Disclosure Letter.
“Law” means, with respect to any Person, any federal, state or local statute, law (including common law), ordinance, code, rule, regulation, order, injunction, judgment, decree, ruling or other similar requirement enacted, adopted, promulgated or applied by a Governmental Authority that is legally binding upon and applicable to such Person.
“Leased Real Property” has the meaning set forth in Section 4.15(c).
“Lien” means, with respect to any property or asset, any mortgage, lien, pledge, charge, security interest, encumbrance or other adverse claim of any kind in respect of such property or asset, other than a Permitted Lien.
“Malicious Code” means (i) any virus, malware, ransomware, Trojan horse, worm, back door, time bomb, drop dead device, spyware or adware and (ii) any similar program, routine, instruction, device, code, contaminant, logic or effect designed or intended to disable, disrupt, erase, harm, or otherwise impede the operation of, or enable any Person to access without authorization, or otherwise materially and adversely affect the functionality of, any Information System (or portion thereof).
A-9