valid, binding upon, and enforceable by or against the parties thereto in accordance with their terms. The Company has complied in all material respects with, and is not in breach nor has received any asserted or threatened claim of breach of any Intellectual Property license, and the Company has no knowledge of any breach or anticipated breach by any other person to any Intellectual Property license. The product candidates described in the Disclosure Documents as under development by the Company fall within the scope of the claims of one or more patent applications owned by the Company.
(x) Trade Secrets. The Company has taken reasonable and customary actions to protect its rights in and to prevent the unauthorized use and disclosure of material trade secrets and confidential business information (including confidential source code, ideas, research and development information, know-how, formulas, compositions, technical data, designs, drawings, specifications, research records, records of inventions, test information, financial, marketing and business data, customer and supplier lists and information, pricing and cost information, business and marketing plans and proposals) owned by the Company, and, there has been no unauthorized use or disclosure.
(y) IT Assets, Data Privacy and Security. The computers, websites, applications, databases, software, servers, networks, data communications lines, and other information technology systems owned, licensed, leased or otherwise used by the Company (including any third party technology or services used by the Company but excluding any public networks) (collectively, the “IT Assets”) are, in all material respects, adequate for, and operate and perform for, the operation of the business of the Company as currently conducted and as proposed to be conducted as described in the Registration Statement, the Pricing Disclosure Package and the Prospectus. To the Company’s knowledge, the IT Assets are free and clear of all viruses, vulnerabilities, bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has at all times implemented and maintained reasonable controls, policies, procedures, and safeguards designed to maintain and protect the privacy, confidentiality, integrity, continuous operation, redundancy and security of all IT Assets and Confidential Data (“Confidential Data” is defined as all Personal Data (defined below), sensitive, confidential, or regulated data) used in connection with its business. There have been no material breaches of, violations of, outages of, or unlawful or unauthorized uses of, destruction of, losses of, alterations of, or accesses to IT Assets and no unlawful or unauthorized uses of, destruction of, losses of, alterations of, or accesses to Confidential Data, nor are any such incidents under internal review or investigation. The Company complies, and has at all times complied in all material respects, with all (i) applicable laws, statutes, regulations, directives, and industry standards concerning the protection, collection, use, disclosure, transfer, storage, disposal, privacy, confidentiality, integrity, security, or other processing of Personal Data (including without limitation, in each case as applicable, the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) as amended by the Health Information Technology for Economic and Clinical Health Act (the “HITECH Act”); the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679); and the California Consumer Privacy Act (“CCPA”) as modified by the California Privacy Rights Act, and other similar state privacy laws (collectively, the “Privacy Laws”)), (ii) all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, (iii) the
12