(x) Except as would not have a material adverse effect on the Company and its subsidiaries,
taken as a whole, (i) the Company and each of its subsidiaries have complied and are presently in compliance with all internal and external privacy policies, contractual obligations, applicable laws, statutes, judgments, orders, rules and
regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the
Company or any of its subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (Data Security Obligations, and such data, Data); (ii) the Company has not received
any notification of or complaint regarding non-compliance with any Data Security Obligation; and (iii) of there is no action, suit or proceeding by or before any court or governmental agency, authority or
body pending or, to the knowledge of the Company, threatened alleging non-compliance with any Data Security Obligation.
(y) The Company and each of its subsidiaries information technology assets and equipment, computers, systems, networks, hardware,
software, websites, applications, and databases (collectively, the IT Systems) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its
subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and each of its subsidiaries have taken reasonable technical and organizational measures
to protect the IT Systems and Data used in connection with the operation of the Companys and its subsidiaries businesses. Without limiting the foregoing, the Company and its subsidiaries have used reasonable efforts to establish and
maintain, and have established, maintained, implemented and complied with, reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls,
encryption, technological and physical safeguards and business continuity/disaster recovery and security plans that are designed to protect against and prevent breach, destruction, loss, unauthorized distribution, use, access, disablement,
misappropriation or modification, or other compromise or misuse of or relating to any IT System or Data used in connection with the operation of the Companys and its subsidiaries businesses (Breach). To the
Companys knowledge, there has been no such material Breach, and the Company and its subsidiaries have not been notified of and have no knowledge of any event or condition that would reasonably be expected to result in, any such material
Breach.
(z) The financial statements included or incorporated by reference in each of the Registration Statement and the Prospectus,
together with the related schedules and notes thereto, comply as to form in all material respects with the applicable accounting requirements of the Securities Act and present fairly in all material respects the consolidated financial position of
the Company and its subsidiaries as of the dates shown and its results of operations and cash flows for the periods shown, and such financial statements have been prepared in conformity with generally accepted accounting principles in the United
States (U.S. GAAP) applied on a consistent basis throughout the periods covered thereby except for any normal year-end adjustments in the Companys quarterly financial statements. The
pro forma financial statements included or incorporated by reference in each of the Registration Statement and the Prospectus
9