(ii) Except as would not have a Material Adverse Effect on the Company and its Subsidiaries, taken as a whole, (i) the Company and each of its Subsidiaries have complied and are presently in compliance with all internal and external privacy policies, contractual obligations, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (ii) the Company has not received any notification of or complaint regarding non-compliance with any Data Security Obligation; and (iii) of there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the Knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation.
(iii) The Company and each of its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and each of its Subsidiaries has taken reasonable technical and organizational measures to protect the IT Systems and Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses. Without limiting the foregoing, the Company and its Subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any IT System or Data used in connection with the operation of the Company’s and its Subsidiaries’ businesses (“Breach”). To the Company’s Knowledge, there has been no such material Breach, and the Company and its Subsidiaries have not been notified of and have no Knowledge of any event or condition that would reasonably be expected to result in, any such material Breach.
Section 5.40. No Disqualification Events. None of the Company, any of its predecessors, any affiliated issuer, any director, executive officer, other officer of the Company participating in the offering contemplated hereby, any beneficial owner of 20% or more of the Company’s outstanding voting equity securities, calculated on the basis of voting power, nor any promoter (as that term is defined in Rule 405 under the Securities Act) connected with the Company in any capacity at the time of sale (each, an “Issuer Covered Person”) is subject to any of the “Bad Actor” disqualifications described in Rule 506(d)(1)(i) to (viii) under the Securities Act (a “Disqualification Event”), except for a Disqualification Event covered by Rule 506(d)(2) or (d)(3) under the Securities Act. The Company has exercised reasonable care to determine whether any Issuer Covered Person is subject to a Disqualification Event.
23