(v) There are no material defects in any Company Product and there are no material errors in any published technical documentation, specifications, manuals or user guides associated with or used or produced in the development of any Company Product. All Company Source Code and other documentation concerning Software owned by the Company or its Subsidiaries or contained in any Company Products is correct, complete and documented in a manner that would reasonably enable a software developer of reasonable skill to understand, modify, debug, enhance, compile, support and otherwise utilize the Software without reference to other sources of information. None of the Company Products, Developing Products and other proprietary Software of the Company and its Subsidiaries contains any (1) virus, Trojan Horse, worm or other software routines or hardware components designed to permit unauthorized access, to disable, erase or otherwise harm software, hardware or data, (2) back door or other software routine designed to disable a computer program automatically with the passage of time or under the positive control of a Person other than the user of the program, or (3) other malicious code that is intended to disrupt or disable the software or any information technology system used in connection therewith. There are no performance or functionality problems or issue with respect to any Company Product or Developing Product which adversely affects, or may reasonably be expected to adversely affect, the value, the value, functionality or fitness for the intended purposes of the Company Product or Developing Product. The Company has taken all commercially reasonable steps to ensure that all Company Products or Developing Product are operable on the applicable operating systems on which the Company has publicly stated that the Company Products are currently supported.
(w) Neither the Company nor any of its Subsidiaries participates in any collaborations or standards-setting organization with an educational institution, research center, industry body or consortium or other multi-party special interest group or activity, and no Company-Owned Intellectual Property has been granted, licensed to or otherwise made available to any standards-setting organization, nor has the Company or any of its Subsidiaries agreed to be bound by any rules or standards set by any third-party organization applicable to the industry in which the Company operates.
(x) For a period of three years prior to the date hereof, there has been no unauthorized access, use, intrusion, or breach of security, or material failure, breakdown, performance reduction or other adverse event affecting any Company Technology, that has caused any material disruption of or interruption to the use of such Company Technology or the conduct of the businesses of the Company or its Subsidiaries. The Company and its Subsidiaries maintain commercially reasonable backup and data recovery, disaster recovery, and business continuity plans, procedures, and facilities, acts in material compliance therewith, and tests such plans and procedures on a regular basis with reasonable success.
(y) The Company and its Subsidiaries, and contractors acting on their behalf, have (1) established and complied in all material respects with (A) the Company’s and its Subsidiaries’ published and internal privacy policies, standard operating procedures and guidelines, (B) Contractual obligations with Customers and other third parties to which the Company and its Subsidiaries are bound, and (C) all applicable Laws, in each case, relating to data privacy, data collection, data protection and data security, including with respect to the collection, storage, transmission, transfer (including cross-border transfers), disclosure, sale, and use of Personal Information (including Personal Information relating to Customers, employees, contractors, and third parties who have provided information to the Company or its Subsidiaries), and (2) taken commercially reasonable measures to protect the security and integrity of Personal Information and other material data in the custody or control of the Company or its Subsidiaries, including against loss, damage, and unauthorized access, use, modification, disclosure, or other misuse. There has been no loss, damage, or unauthorized access, use, transmission, modification, disclosure, or other misuse of any such information in the custody or control of the Company or its Subsidiaries, or any of their contractors. No Person (including any Governmental Authority) has made any written claim or commenced any Action or any investigation, or threatened in writing to initiate any claim, Action, or investigation, with respect to loss, damage, or unauthorized access, use, modification, disclosure, or other misuse of any such Personal Information by the Company, or its Subsidiaries or, any of their employees or contractors, and to the knowledge of the Company, there is no basis for any such claim, Action, or investigation. The execution, delivery and performance of this Agreement and the consummation of the Merger complies with the Company’s and its Subsidiaries’ applicable privacy policies and notices concerning Personal Information and will not result in any breaches of, or liabilities in connection with, any contractual obligations or applicable Laws relating to privacy and data security (including any such Laws in the jurisdictions where the applicable information is collected). The Company and its Subsidiaries have sufficient legal basis for their processing of Personal Information, where such basis is required under applicable Laws, and have at all times made all required disclosures to, and obtained any necessary consents from, users, customers, employees, contractors, Governmental Authorities and other applicable Persons required by Laws related to data privacy, data collection, data protection and data security and has filed any required registrations with the applicable data protection authority.
20