(ww) The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and Company and its subsidiaries have taken reasonable technical and organizational measures designed to protect information technology and Personal Data (as defined below) used in connection with the operation of the business of the Company and its subsidiaries as currently conducted and, to the knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained reasonable controls, policies, procedures, and safeguards designed to maintain and protect their confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including “personal data” as defined by the EU General Data Protection Regulations (“GDPR”) (EU 2016 679) and any personal, personally identifiable, household, sensitive, confidential or regulated data (“Personal Data”)) within their control used in connection with their businesses, except to the extent that a failure to do so could not reasonably be expected to have a Material Adverse Effect. To the knowledge of the Company, there have been no material breaches, violations, outages or unauthorized uses of or accesses to any IT System or Personal Data used in connection with the operation of the Company’s and its subsidiaries’ businesses and under their control. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any applicable court or arbitrator or governmental or regulatory authority, the Company’s internal policies and the Company’s contractual obligations relating to the privacy and security of IT Systems and Personal Data, and relating to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
(xx) The Company and each of its subsidiaries are, and at all prior relevant times were, in compliance with all applicable data privacy and security laws, statutes, judgements, orders, rules and regulations of any applicable court or arbitrator or any other governmental or regulatory authority, and all applicable laws regarding the collection, use, transfer, export, storage, protection, disposal or disclosure by the Company and its subsidiaries of Personal Data (collectively, the “Privacy Laws”). The Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to (i) ensure compliance with its privacy policies, all contractual obligations, and applicable industry standards regarding Personal Data; and (ii) reasonably protect the security and confidentiality of all Personal Data (collectively, the “Policies”).
(yy) The Company has provided notice of its privacy policy on its websites, which provides accurate and sufficient notice of the Company’s then-current privacy practices, and such privacy policies do not contain any material omissions of the Company’s then-current privacy practices. Disclosures made or contained in the privacy policies have not been inaccurate, misleading, deceptive or in violation of any applicable Privacy Laws or Policies in effect at that time in any material respect. To the knowledge of the Company, the execution, delivery and performance of this Agreement will not result in a material breach of or violation of any applicable Privacy Laws or Policies. Neither the Company nor any subsidiary has received written notice of
13