(xxxvii) Intellectual Property. The Company and its Subsidiaries possess adequate rights to use all material patents, patent applications, trademarks, service marks, trade names, trademark registrations, service mark registrations, copyrights, licenses andknow-how (including trade secrets and other unpatented and/or patentable proprietary or confidential information, systems or procedures) necessary for the conduct of their respective businesses; and the conduct of their respective businesses will not conflict in any material respect with any such rights of others, except where the failure to do so, individually or in the aggregate, would not reasonably be expected to have a Material Adverse Effect; and the Company and its Subsidiaries have not received any written notice of any claim of infringement of, or written notice of any conflict with, any such rights of others, except where such claim of infringement or written notice of any conflict, if adjudicated unfavorably against the Company, has not had or could not reasonably be expected to have, individually or in the aggregate, a Material Adverse Effect.
(xxxviii) Affiliation With Underwriters. Except as disclosed in the Registration Statement, the General Disclosure Package and the Prospectus, the Company does not have any material lending or other relationship with any bank or lending affiliate of any of the Underwriters.
(xxxix) Immunity. Neither the Company nor any of its Subsidiaries nor any of its or their properties or assets has any immunity from the jurisdiction of any court or from any legal process (whether through service or notice, attachment prior to judgment, attachment in aid of execution or otherwise) under the laws of the State of New York.
(xl) Cybersecurity; Data Protection. Except as has not had or could not reasonably be expected to have, individually or in the aggregate, a Material Adverse Effect, (i) the Company’s and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and (ii) to the knowledge of the Company, the IT Systems are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants designed to permit unauthorized access or activity. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to such IT Systems or Personal Data, except for those that have been remedied without material cost to or liability of the Company and its Subsidiaries or the duty of the Company or any of its Subsidiaries to notify any other person, nor are there any incidents under internal review or investigations relating to such IT Systems or Personal Data and the Company and its
16