(xli) Related-Party Transactions. There are no relationships or related-party transactions involving the Company, any of its subsidiaries, or any other person required to be described in the Registration Statement, the General Disclosure Package and the Prospectus which have not been described as required.
(xlii) Cybersecurity. Except as described in the Registration Statement, the General Disclosure Package and the Prospectus, to the Company’s knowledge, there has been no security breach or incident, loss or destruction of or damage to, unauthorized use, access, modification, or disclosure, or other compromise of or relating to the information technology and computer systems, networks, hardware, software, equipment, technology, facilities, data and databases used in the business or operations of the Company and its subsidiaries (including data and personally identifiable information of or relating to their respective customers, employees, suppliers, vendors, and any third party data maintained, processed or stored by or for the Company or its subsidiaries (collectively, “IT Systems and Data”). The IT Systems and Data are sufficient for, and operate and perform, in each case, in all material respects as required by, the operation of the businesses of the Company and its subsidiaries and in accordance with their documentation and functional specifications. The Company has implemented industry standard measures that are designed to ensure that the IT Systems and Data are free of any viruses, “back doors,” “Trojan horses,” “time bombs, “worms,” “drop dead devices” or other similar undocumented Software or hardware components that are designed to interrupt use of, permit unauthorized access to, or disable, damage or erase, any Software material to the business of the Company or any of its subsidiaries (“Contaminants”), and to the Company’s knowledge, the IT Systems and Data are free from any such Contaminants. The Company and its subsidiaries have at all times implemented and maintained commercially reasonable and appropriate controls, policies, procedures, and technological safeguards designed to maintain and protect the integrity, continuous operation, redundancy and security of all IT Systems and Data, including commercially reasonable backup, business continuity, and disaster recovery plans, procedures, and measures. Such controls, policies, procedures, and safeguards have been implemented and maintained by the Company and its subsidiaries in a manner consistent with applicable industry standards and practices and compliant in all material respects with applicable laws, regulations, all judgments, orders, rules and regulations of any court or arbitrator, any governmental or regulatory authority, and all applicable policies and contractual obligations, in each case, relating to privacy, information security, and the use and processing of data, and the protection of such IT Systems and Data from loss, destruction, damage, and unauthorized use, access, modification, disclosure, or other compromise.
(xliii) Data Privacy and Security Legal Obligations. The Company and its subsidiaries (A) have operated their respective businesses in a manner compliant in material respects with all applicable laws, regulations, generally adopted industry standards, and contractual obligations applicable to the receipt, collection, handling, sharing, transfer, usage, security, disclosure, storage, or other processing of all user and customer data, personally identifiable information, financial data, IP addresses, device identifiers and website and online service usage activity and device data (“Personal and Device Data”) by or for the Company and its subsidiaries (“Privacy Legal Obligations”), (B) have implemented, maintained, and complied with, and are in compliance with policies and procedures designed to ensure the Company’s and its subsidiaries’ compliance with Privacy Legal Obligations and the privacy, integrity, security and confidentiality of all Personal and Device Data received, collected, handled, shared, transferred, used, secured, disclosed, stored and/or otherwise processed by or for the Company and its subsidiaries in connection with the Company’s and its subsidiaries’ operation of their respective businesses, and (C) have required and do require all third parties to which they provide, or that they permit to collect, maintain or otherwise process any Personal and Device Data (“Data Processors”) to maintain the privacy and security of such Personal and Device Data to the extent required by applicable Privacy Legal
15