(x) (i) The Company and each of its subsidiaries have complied and are presently in compliance, each in all material respects, with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data or information (“Data Security Obligations”, and such data and information, “Personal Data”); (ii) the Company and its subsidiaries have not received any notification of or complaint regarding and are unaware of any other facts that, individually or in the aggregate, would reasonably indicate non-compliance with any Data Security Obligation by the Company or any of its subsidiaries; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the Company’s knowledge, threatened alleging non-compliance with any Data Security Obligation by the Company or any of its subsidiaries.
(y) (i) The Company and its subsidiaries’ respective information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, technology, data and databases (including Personal Data and the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by or on behalf of the Company and its subsidiaries) used in connection with the operation of the Company’s and its subsidiaries’ respective businesses (“IT Systems and Data”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants; (ii) the Company and each of its subsidiaries have taken all technical and organizational measures reasonably necessary to protect the IT Systems and Data, and without limiting the foregoing, the Company and its subsidiaries have used reasonable efforts to establish and maintain, and have established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards and business continuity/disaster recovery and security plans, consistent with industry standards and practices, that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement, misappropriation or modification, or other compromise or misuse of or relating to any IT Systems and Data (“Breach”); and (iii) there has been no such Breach, and the Company and its subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such Breach.
10