engineering of any software code or other technology owned by the Company or any of its subsidiaries or (B) any software code or other technology owned by the Company or any of its subsidiaries to be (1) disclosed or distributed in source code form, (2) licensed for the purpose of making derivative works or (3) redistributed at no charge.
(aa) Except as would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect, (i) the Company and each of its subsidiaries have complied and are presently in compliance with all of their internal and external privacy policies, contractual obligations relating to privacy, data protection or information security, and applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority, in each case, relating to privacy, data protection, and information security with respect to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its subsidiaries of personal, personally identifiable, household or sensitive data considered “personal information” or “personal data” under applicable laws or regulations (“Data Security Obligations”, and such data, “Data”); (ii) the Company has not received any written notification of or complaint regarding theirnon-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or threatened in writing against the Company or its subsidiaries allegingnon-compliance with any Data Security Obligation.
(bb) Except as would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect, (i) the Company and each of its subsidiaries have taken reasonable technical and organizational measures to protect the information technology systems and Data in their possession, or otherwise in their administrative control, and used in connection with the operation of the Company’s and its subsidiaries’ businesses, including reasonable efforts to establish and maintain, and to have established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach of and unauthorized destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification of any such information technology system or Data (“Breach”); and (ii) there has been no such Breach, and the Company and its subsidiaries have not been notified of any such Breach.
2. Agreements to Sell and Purchase. The Company hereby agrees to sell to the several Underwriters, and each Underwriter, upon the basis of the
11