| (oo) | The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, to the best of the Company’s knowledge. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data and including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them) (“Personal Data”) used in connection with their businesses. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, to the best of the Company’s knowledge there have been no breaches, violations, compromises, outages or unauthorized uses of or accesses to the IT Systems or Personal Data, except for those that have been remedied without material cost or liability or the duty to notify any other person (including governmental or regulatory authorities), and the Company and its subsidiaries have not been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems or Personal Data; and |