(aaa) (i) there has been no security breach or incident, unauthorized access or disclosure, ransomware incident, or other compromise of or relating to the Company, or its Subsidiaries, information technology and computer systems, networks, hardware, software, websites, data and databases (including the data and information of their respective customers, employees, suppliers, vendors, and any third party data maintained, processed or stored by the Company and its Subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its Subsidiaries), equipment, or technology (collectively, “IT Systems and Data”), (ii) neither the Company nor its Subsidiaries have been notified of, and each of them have no knowledge of any event or condition that could result in, any security breach or incident, unauthorized access or disclosure, ransomware incident, or other compromise to their IT Systems and Data and (iii) the Company and its Subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy, and security of their IT Systems and Data reasonably consistent with industry standards and practices, and as required by all applicable regulatory standards. The Company and its Subsidiaries are presently, and at all times have been, in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data, and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification;
(bbb) the IT Systems and Data (i) operate and perform in all material respects in accordance with their documentation and functional specifications, and otherwise as required by the Company’s and its Subsidiaries’ respective businesses as currently conducted, (ii) have not materially malfunctioned or failed since the Company’s inception, and (iii) are free of any viruses, “back doors,” “Trojan horses,” “time bombs,” “worms,” “drop dead devices,” or other software or hardware components that are designed to interrupt use of, permit unauthorized access to, or disable, damage or erase, any software material to the business of the Company or any of its Subsidiaries;
(ccc) the Company and its Subsidiaries (i) operate and have at all times operated their respective businesses in a manner compliant with all privacy, data security, and data protection laws and regulations (collectively “Privacy Laws”) applicable to the Company’s and its Subsidiaries’ receipt, collection, handling, processing, sharing, transfer, usage, disclosure, or storage of all user data and all other information, including personally identifiable information, financial data, IP addresses, mobile device identifiers, and website usage activity (“Personal and Device Data”), all policies and statements of the Company and its Subsidiaries, all contractual obligations entered into by the Company and its Subsidiaries and all industry standards binding upon the Company, (ii) have implemented, maintain, and are in compliance with policies and procedures designed to ensure the privacy, integrity, security, and confidentiality of all Personal and Device Data handled, processed, collected, shared, transferred, used, disclosed, and/or stored by the Company or its Subsidiaries in connection with the Company’s and its Subsidiaries’ operation of their respective businesses, (iii) have and are in compliance with policies and procedures designed to ensure all Privacy Laws are
21