(jj) Neither the Company nor any of its subsidiaries nor, to the knowledge of the Company or the Parent Guarantor, any director, officer, agent, employee or other person associated with or acting on behalf of the Company or any of its subsidiaries has (i) used any corporate funds for any unlawful contribution, gift, entertainment or other unlawful expense relating to political activity; (ii) made any direct or indirect unlawful payment to any foreign or domestic government official or employee from corporate funds; (iii) violated or is in violation of any provision of the Foreign Corrupt Practices Act of 1977, as amended (the “FCPA”), or any other law, statute, or regulation concerning anti-corruption or anti-bribery, applicable to the Company and its subsidiaries, or the Parent Guarantor; or (iv) made any bribe, rebate, payoff, influence payment, kickback or other unlawful payment. The Company and the Parent Guarantor and, to the knowledge of the Company, their affiliates (which, for purposes of this Section 2(jj), shall not include any affiliates of any joint venture partner of the Company or any of its subsidiaries) have conducted their businesses in compliance with the FCPA and any other law, statute, or regulation concerning anti-corruption or anti-bribery, applicable to the Company and its subsidiaries, or the Parent Guarantor, and have instituted and maintain policies and procedures reasonably designed to ensure compliance therewith.
(kk) The operations of the Company and its subsidiaries are and have been conducted at all times in material compliance with applicable financial recordkeeping and reporting requirements of the Currency and Foreign Transactions Reporting Act of 1970, as amended, the money laundering statutes of all jurisdictions, the rules and regulations thereunder and any related or similar rules, regulations or guidelines, issued, administered or enforced by any governmental agency (collectively, the “Money Laundering Laws”) and no action, suit or proceeding by or before any court or governmental agency, authority or body or any arbitrator involving the Company or any of its subsidiaries with respect to the Money Laundering Laws is pending or, to the knowledge of the Company or the Parent Guarantor, threatened.
(ll) (A) There has been no security breach or incident, unauthorized access or disclosure, or other compromise of or relating to the Company’s or its subsidiaries’ information technology and computer systems, networks, hardware, software, data and databases (including the data and information of their respective customers, employees, suppliers, vendors and any third party data maintained, processed or stored by the Company and its subsidiaries, and any such data processed or stored by third parties on behalf of the Company and its subsidiaries), equipment or technology (collectively, “IT Systems and Data”); (B) neither the Company nor its subsidiaries have been notified of, and each of them have no knowledge of any event or condition that could result in, any security breach or incident, unauthorized access or disclosure or other compromise to their IT Systems and Data; and (C) the Company and its subsidiaries have implemented appropriate controls, policies, procedures, and technological safeguards to maintain and protect the integrity, continuous operation, redundancy and security of their IT Systems and Data reasonably consistent with industry standards and practices, or as required by applicable regulatory standards, except with respect to clauses (A) and (B), for any such security breach or incident, unauthorized access or disclosure, or other compromises, as would not, individually or in the aggregate, have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification.
-14-