| (kk) | The information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) of the Company and its subsidiaries operate and perform in all material respects in conformance with their specifications or contracted requirements in connection with the operation of the business of each of the Company and its subsidiaries as currently conducted, and, to the knowledge of the Company and the Guarantors, free and clear of all material bugs, errors, defects, trojan horses, time bombs, malware and other corruptants, other than those not reasonably expected, individually or in the aggregate, to have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and to the knowledge of the Company and the Guarantors, except as set forth in the Pricing Disclosure Package and the Offering Memorandum, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability, nor any incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification. |