(xxxix) The Company and its subsidiaries have conducted and will conduct their businesses in compliance with the Anti-Corruption Laws, the Anti-Money Laundering Laws, and Sanctions, and no investigation, inquiry, action, suit or proceeding by or before any court or governmental agency, authority or body or any arbitrator involving the Company or any of its subsidiaries with respect to the Anti-Corruption Laws, the Anti-Money Laundering Laws or Sanctions is pending or, to the knowledge of the Company, threatened. The Company and its subsidiaries and affiliates have instituted and maintained and will continue to maintain policies and procedures reasonably designed to promote and achieve compliance with the Anti-Corruption Laws, the Anti-Money Laundering Laws, Sanctions, and with the representations and warranties contained herein.
(xl) The Company and the Subsidiaries have complied and are presently in compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or the Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”), except, in each case, as would not reasonably be expected to, individually or in the aggregate, have a Material Adverse Effect; (ii) the Company has not received any notification of or complaint regarding and is unaware of any other facts that, individually or in the aggregate, would reasonably indicate non-compliance with any Data Security Obligation; and (iii) the Company is not aware of any action, suit or proceeding by or before any court or governmental agency, authority or body pending or threatened alleging non-compliance with any Data Security Obligation.
(xli) The Company and the Subsidiaries have taken all technical and organizational measures reasonably necessary to protect the information technology systems and Data used in connection with the operation of the Company’s and the Subsidiaries’ businesses. Without limiting the foregoing, the Company and the Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any information technology system or Data used in connection with the operation of the Company’s and the Subsidiaries’ businesses (“Breach”). There has been no such Breach, and the Company and the Subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach.
(xlii) The Company’s wholly-owned, small business investment company subsidiary, Hercules Capital IV, L.P. has been organized and operated as, and currently are organized and operated, in material conformance with the requirements of the Small Business Investment Act of 1958 and the rules and regulations promulgated thereunder applicable to small business investment companies.
(xliii) Except for Gibraltar Business Capital LLC and Gibraltar Equipment Finance, LLC, the Subsidiaries of the Company do not have employees or employ personnel.
10