(y) The Company Parties’ and each of their respective subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications and databases, and any other information technology systems owned, licensed, leased, or otherwise used by the Company Parties, and any such equipment or technology maintained or provided by any third parties to Company Parties or each of their respective subsidiaries (collectively, “IT Systems”) are (i) adequate for, and operate and perform in all material respects as necessary for the operation of the business of the Company Parties and each of their respective subsidiaries as currently conducted as described in the Registration Statement, the Disclosure Package and the Prospectus, and, (ii) to the Company Parties’ knowledge, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware, harmful code, and other corruptants. The Company Parties and each of their respective subsidiaries have at all times since October 18, 2021 implemented and maintained commercially reasonable controls, policies, procedures and safeguards to maintain and protect the privacy, confidentiality, integrity, availability, continuous operation, redundancy and security of all IT Systems and data (including all information that relates to an identified or identifiable individual or is regulated as “personal information,” “personally identifiable information,” “personal data,” or any similar information governed by laws relating to privacy, data protection, or data security (“Personal Data”), and any confidential, sensitive, or proprietary data (collectively, “Protected Information”)) used in connection with the business of the Company Parties or each of their respective subsidiaries. The Company Parties and each of their respective subsidiaries have at all times since October 18, 2021 established and maintained commercially reasonable disaster recovery and security plans, procedures and facilities for their business, including, without limitation, for the IT Systems, Protected Information and data held or used by or for the Company Parties and each of their respective subsidiaries. The information security programs of the Company Parties and each of their respective subsidiaries are currently in material compliance with, and, and at all times in the past have materially complied, with all applicable Data Protection Requirements (defined below). To the company Parties’ knowledge, there have been no actual or reasonably suspected violations of, outages of, or unlawful or unauthorized uses of, destruction of, losses of, alterations of, or accesses to IT Systems and no unlawful or unauthorized uses of, destruction of, losses of, alterations of, or accesses to Protected Information (collectively, a “Breach”). There are no material Breaches under internal review, or investigations relating to the same. The Company Parties and each of their respective subsidiaries have not been notified of, and have no knowledge of, any fact or circumstance that would reasonably be expected to result in a material Breach.
(z) The Company Parties and each of their respective subsidiaries have at all times since October 18, 2021 materially complied and are presently in material compliance with all (i) applicable laws, statutes, regulations, directives, self-regulatory guidelines and standards concerning the protection, collection, use, disclosure, transfer, storage, disposal, confidentiality, integrity, availability, privacy, and security of IT Systems and Protected Information (including but not limited to the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); the United Kingdom General Data Protection Regulation (“UK GDPR”); the California Consumer Privacy Act (“CCPA”); and Canada’s Personal Information Protection and Electronic Documents Act (“PIPEDA”)); and (ii) all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Protected Information and to the protection of such IT Systems and Protected Information from unauthorized use, access, misappropriation or modification (collectively, the “Data Protection Requirements”).
8