| (gg) | Data Protection and Security. Except as would not reasonably be expected to have a Material Adverse Effect on the Company, (A) the Company and each of the Subsidiaries have complied and are presently in compliance with all internal and external privacy policies and information notices, contractual obligations, industry standards, regulatory guidelines, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal, disclosure and any other processing (“Processing”) by the Company or its Subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations”, and such data, “Data”); (B) the Company and each of its Subsidiaries have taken all reasonably steps to comply with Data Security Obligations; (C) none of the Company or the Subsidiaries has (i) received any notification of or complaint regarding, or (ii) is aware of any other facts that, individually or in the aggregate, would reasonably indicate, non-compliance with any Data Security Obligation; (D) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or threatened alleging the Company’s or the Subsidiaries’ non-compliance with any Data Security Obligation; (E) the Company and each of the Subsidiaries have implemented and maintained all technical and organizational measures necessary to protect and ensure the security and integrity of the Data used in connection with the operation of the Company’s and each of its Subsidiaries’ businesses; (F) without limiting the foregoing, the Company and each of the Subsidiaries have used all reasonable efforts to establish and maintain, and have established, maintained, implemented and complied with, reasonable Information Technology, information security, cybersecurity and data protection controls, policies and procedures, including oversight, access controls, encryption, technological, organizational and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized or unlawful distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any Data used in connection with the operation of the Company’s or each of its Subsidiaries’ businesses (“Breach”); (G) there has been no such Breach, and neither the Company or any of its Subsidiaries has been notified of or has any knowledge of any event or condition that would reasonably be expected to result in, any such Breach. Information Technology” means computer hardware, software, databases, networks and/or other information or communications technology (including any information or data stored therein) and any asset which contains computer hardware, software, databases, networks and/or other information or communications technology (including any information and data stored therein), whether embedded or otherwise. |