subsidiaries have used such Open Source Materials in material compliance with the license terms applicable to such Open Source Materials; neither the Company nor any of its subsidiaries has used or distributed any Open Source Materials in a manner that requires or has required (A) the Company or any of the subsidiaries to permit reverse engineering of any products or services of the Company or any of the subsidiaries, or any software code or other technology owned by the Company or any of the subsidiaries or (B) any products or services of the Company or any of the subsidiaries, or any software code or other technology owned by the Company or any of the subsidiaries, to be (i) disclosed or distributed in source code form, (ii) licensed for the purpose of making derivative works, or (iii) redistributed at no charge, except, in the case of each of (A) and (B) above, such as would not have a Material Adverse Effect;
(xxxv) The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) to the knowledge of the Company operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries: have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards (including, without limitation, an industry-standard information security program), designed to control risks and to maintain and protect their material confidential information and the integrity, availability, and security of all IT Systems and Data (as such term is defined below) and that protect against unauthorized access to the IT Systems and Data and, to the knowledge of the Company, there: (i) have been: no breaches, violations, outages or unauthorized uses of or access to same, and (ii) no incidents under internal review or investigations relating to the same, except as otherwise would not, in each case of (i) or (ii), reasonably be expected to have a Material Adverse Effect;
(xxxvi) Neither the Company, nor its subsidiaries, nor any of their respective officers, directors and employees, nor any of their respective agents, contractors or licensees (if any), nor any of their respective business operations, is, or has ever been, in violation of any applicable privacy or cybersecurity laws except where the failure to so comply would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries (A) have operated their businesses in a manner compliant, and are presently in compliance, with all privacy and data protection laws, regulations, and industry standards applicable to the Company’s and its subsidiaries’ collection, use, transfer, protection, disposal, disclosure, handling, and storage of all sensitive and confidential data, including any personal information; (B) have and are in material compliance with policies and procedures that ensure the integrity and security of the data collected, handled or stored by the Company and its subsidiaries in connection with the delivery of its product offerings, (C) have and are in compliance with policies and procedures that (1) ensure privacy and data protection laws are complied with, (2) are designed to safeguard the security, confidentiality, integrity and availability of IT Systems and Data (as defined below) against unauthorized access; and (3) include notification procedures in the case of any breach of security compromising data containing personally identifiable information and (D) have not: (i) experienced any security breaches or other material compromises or outages of any of the Company’s information technology and computer systems, networks, hardware, software, sensitive data (including the sensitive, proprietary, or personal data of its customers, employees, suppliers, and vendors maintained by or on behalf of the Company), equipment or technology (collectively, “IT Systems and Data”), and (ii) been notified of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other material compromise to its IT Systems and Data, except in the case of each of (A), (B), (C), and (D) where the failure to so comply would not reasonably be expected to have a Material Adverse Effect;
10