arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal, disclosure or other processing by the Company or any of its subsidiaries of personal, personally identifiable , confidential or regulated data and information (“Data Security Obligations”, and such data and information, “Personal Data”); (ii) neither the Company nor any of its subsidiaries have received any notification of or complaint regarding or are otherwise aware of any facts that, individually or in the aggregate, would reasonably indicate, material non-compliance by the Company and its subsidiaries with any Data Security Obligation; and (iii) there is no action, suit, investigation or proceeding against the Company or any of its subsidiaries by or before any court or governmental agency, authority or body pending or, to the Company’s knowledge threatened, alleging non-compliance by the Company or any of its subsidiaries with any Data Security Obligation.
(z) The Company’s and its subsidiaries’ respective information technology assets and equipment, computers, systems, networks, hardware, software, internet websites, applications and data and databases (including the Personal Data and data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of the Company and its subsidiaries) (collectively, “IT Systems and Data”) are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company and its subsidiaries as currently conducted. The IT Systems and Data are, to the Company’s knowledge, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and each of its subsidiaries have taken commercially reasonable technical, physical and administrative measures designed to protect the IT Systems and Data under their control and used in connection with the operation of the Company’s and its subsidiaries’ businesses. Without limiting the foregoing, the Company and its subsidiaries have used commercially reasonable efforts to establish and maintain, and have established, maintained, implemented and materially complied with, commercially reasonable information technology, information security, cyber security and data protection controls, policies and procedures consistent with industry standards and practices, that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any IT Systems and Data (“Breach”). There has been no material Breach, and the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that has resulted in any such Breach.
(aa) No material labor dispute with the employees of the Company or any of its subsidiaries exists, or, to the knowledge of the Company, is imminent; and the Company is not aware of any existing, threatened or imminent labor disturbance by the employees of any of its principal suppliers, manufacturers or contractors that, singly or in the aggregate, would reasonably be expected to have a material adverse effect on the Company and its subsidiaries, taken as a whole.
10