(ff) Compliance with Anti-Corruption Laws. None of the Company, any of its Significant Subsidiaries, and, to the knowledge of the Company, any director, officer or employee of the Company or any of its Significant Subsidiaries, has (i) used any corporate funds for any unlawful contribution, gift, entertainment or other unlawful expense relating to political activity; (ii) made or taken an act in furtherance of any direct or indirect unlawful payment or benefit to any foreign or domestic government or regulatory official or employee, including of any government-owned or controlled entity or of a public international organization, or any person acting in an official capacity for or on behalf of any of the foregoing, or any political party or party official or candidate for political office from corporate funds; (iii) violated or is in violation of any provision of the Foreign Corrupt Practices Act of 1977, as amended (the “FCPA”), and the rules and regulations thereunder; (iv) violated or is in violation of any provision of the UK Bribery Act 2010, or any other applicable anti-bribery or anti-corruption laws; or (v) made, offered, agreed, requested or taken an act in furtherance of any unlawful bribe or other unlawful benefit including, without limitation, any bribe, rebate, payoff, influence payment, kickback or other unlawful payment. The Company and the Significant Subsidiaries have instituted, and maintain and enforce, policies and procedures designed to promote and ensure compliance with the FCPA, UK Bribery Act and any anti-corruption laws and regulations that would be applicable to it in the jurisdictions in which the Company operates.
(gg) XBRL Data. The interactive data in the eXtensible Business Reporting Language (“XBRL”) included as an exhibit to the Registration Statement fairly presents the information called for in all material respects and has been prepared in accordance with the Commission’s rules and guidelines applicable thereto.
(hh) Cybersecurity; Data Protection. The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects in conformance with their specifications or contracted requirements as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the best knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, other than those not reasonably expected to have a Material Adverse Effect. The Company and its subsidiaries maintain commercially reasonable risk-based controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all mission critical IT Systems and the integrity redundancy and risk-based security of all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no material breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, material internal policies and contractual
12