(y) Except as described in the Registration Statement, the Time of Sale Prospectus or the Prospectus, (i) the Company and each of its subsidiaries have complied, and are presently in compliance, in all material respects with all applicable internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal, disclosure or other processing by any of the Company or any of its subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data and information, “Personal Data”); (ii) none of the Company or any of its subsidiaries have received any notification of or complaint regarding, and are unaware of any other facts that, individually or in the aggregate, would reasonably indicate, non-compliance in any material respect with any Data Security Obligation; and (iii) there is no action, suit, proceeding or claim by or before any court or governmental agency, authority or body pending, or to the knowledge of the Company threatened, alleging non-compliance with any Data Security Obligation.
(z) Except as described in the Registration Statement, the Time of Sale Prospectus or the Prospectus or as would not, singly or in the aggregate, have a material adverse effect on the Company and its subsidiaries taken as a whole, (i) the Company’s and each of its subsidiaries’ respective information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, technology, data and databases (including Personal Data and the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by or on behalf of any of the Company or any of its subsidiaries) used in connection with the operation of any of their businesses (“IT Systems and Data”) are adequate for, and operate and perform as reasonably required in connection with, the operation of such businesses as they are currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants; (ii) the Company and its subsidiaries have taken all commercially reasonable technical and organizational measures necessary to protect the IT Systems and Data, and without limiting the foregoing, the Company and its subsidiaries have used commercially reasonable efforts in accordance with customary industry practice to establish and maintain, and have established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans, consistent with industry standards and practices, that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any of the IT Systems and Data (“Breach”) and (iii) there has been no Breach, and the Company and its subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any Breach.
10