3.31 Anti-Bribery and Anti-Money Laundering Laws. Each of the Company, its subsidiaries and, to the knowledge of the Company, any of their respective officers, directors, supervisors, managers, agents, or employees are and have at all times been in compliance with and its participation in the offering will not violate: (A) anti-bribery laws, including but not limited to, any applicable law, rule, or regulation of any locality, including but not limited to any law, rule, or regulation promulgated to implement the OECD Convention on Combating Bribery of Foreign Public Officials in International Business Transactions, signed December 17, 1997, including the U.S. Foreign Corrupt Practices Act of 1977, as amended, the U.K. Bribery Act 2010, or any other law, rule or regulation of similar purposes and scope or (B) anti-money laundering laws, including, but not limited to, applicable federal, state, international, foreign or other laws, regulations or government guidance regarding anti-money laundering, including, without limitation, Title 18 US. Code sections 1956 and 1957, the Patriot Act, the Bank Secrecy Act, and international anti-money laundering principles or procedures by an intergovernmental group or organization, such as the Financial Action Task Force on Money Laundering, of which the United States is a member and with which designation the United States representative to the group or organization continues to concur, all as amended, and any executive order, directive, or regulation pursuant to the authority of any of the foregoing, or any orders or licenses issued thereunder.
3.32 Cybersecurity. The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and, to the Company’s knowledge, are free and clear of all material Trojan horses, time bombs, malware and other malicious code. The Company and its subsidiaries have implemented and maintained commercially reasonable physical, technical and administrative controls designed to maintain and protect the confidentiality, integrity, availability, privacy and security of all sensitive, confidential or regulated data (“Confidential Data”) used or maintained in connection with their businesses and Personal Data (defined below), and the integrity, availability continuous operation, redundancy and security of all IT Systems. “Personal Data” has the same meaning as “protected health information” under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act (collectively, “HIPAA”); and (iv) any information that would qualify as “personal data,” “personal information” (or similar term) under the Privacy Laws. To the Company’s knowledge, there have been no breaches, outages or unauthorized uses of or accesses to the Company’s IT Systems, Confidential Data, or Personal Data that would require notification under Privacy Laws (as defined below).
3.33 Compliance with Data Privacy Laws. The Company and its subsidiaries are, and at all prior times were, in material compliance with all applicable state, federal and foreign data privacy and security laws and regulations regarding the collection, use, storage, retention, disclosure, transfer, disposal, or any other processing (collectively “Process” or “Processing”) of Personal Data, including to the extent applicable HIPAA, the EU General Data Protection Regulation (“GDPR”) (Regulation (EU) No. 2016/679), all other local, state, federal, national, supranational and foreign laws relating to the regulation of the Company or its subsidiaries, and
17