regulations of the Cayman Islands or any political subdivision or taxing authority thereof or therein and will otherwise be free and clear of any other tax, duty, withholding or deduction in the Cayman Islands or any political subdivision or taxing authority thereof or therein and without the necessity of obtaining any governmental authorization in the Cayman Islands or any political subdivision or taxing authority thereof or therein.
(rrr) (A) To the knowledge of the Company, there has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company’s information technology and computer systems, networks, hardware, software, websites, applications, data (including all personal, personally identifiable, household, sensitive, confidential or regulated data (including protected health information) (“Personal Data”)) and databases (including, without limitation, the data and information of its customers, employees, suppliers and vendors, and any third party data maintained, processed or stored by the Company, and any such data processed or stored by third parties on behalf of the Company), equipment or technology (collectively, “IT Systems and Data”); (B) to the knowledge of the Company, the IT Systems and Data of the Company are adequate for, and operate and perform in all material respects as required in connection with operation of the business of the Company free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants; (C) the Company has not been notified of, and has no knowledge of any event or condition that would result in, any security breach or incident, unauthorized access or disclosure or other compromise to its IT Systems and Data; and (D) the Company has used reasonable efforts to establish and maintain, and has established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies, procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that protect against and prevent breach, destruction, loss, unauthorized distribution, use, assess, disablement, misappropriation or modification, or other compromise or misuse of or relating to its IT Systems and Data and to maintain and protect the integrity, continuous operation, redundancy and security of its IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards and, to its knowledge, the Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification.
Any certificate signed by any officer or director of the Company and delivered to the Representative or counsel for the Underwriters in connection with the Offering shall be deemed a representation and warranty by the Company, as to matters covered thereby, to each Underwriter.
2. PURCHASE AND SALE.
(a) Subject to the terms and conditions and in reliance upon the representations and warranties herein set forth, the Company agrees to sell to each Underwriter, and each Underwriter agrees, severally and not jointly, to purchase from the Company, at a purchase price of $9.80 per Unit, the amount of the Underwritten Securities set forth opposite such Underwriter’s name in Schedule I hereto.
16