Cyber Security; Data Protection. Except as would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Change, the Parent Guarantor and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Parent Guarantor and the subsidiaries as currently conducted. The Parent Guarantor and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect the integrity, continuous operation, redundancy and security of all IT Systems and data processed or stored in connection with their businesses, including all personal, personally identifiable, sensitive, confidential or regulated information and data (“Protected Data”). There have been no breaches, violations, outages, or unauthorized uses of or accesses to the IT Systems and Protected Data, except for those that have been remedied without material cost or liability or the duty to notify any other person or any such breaches, violations, outages or unauthorized uses or accesses to the same that would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Change, nor are there any incidents under internal review or investigation relating to the same. The Parent Guarantor and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Protected Data and to the protection of such IT Systems and Protected Data from unauthorized use, access, misappropriation or modification.
Cyber Security; Data Protection. The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of su...
Cyber Security; Data Protection. Each EVO Party and their respective subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of each EVO Party and its subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. Each EVO Party and their respective subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no known material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any known material incidents under internal review or investigations relating to the same. Each EVO Party and their respective subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.
Cyber Security; Data Protection. The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and the subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except in each case as would not, singly or in the aggregate, result in a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except in each case as would not, singly or in the aggregate, result in a Material Adverse Effect.
Cyber Security; Data Protection. The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects in conformance with their specifications or contracted requirements as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the best knowledge of the Company, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, other than those not reasonably expected to have a Material Adverse Effect. The Company and its subsidiaries maintain commercially reasonable risk-based controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all mission critical IT Systems and the integrity redundancy and risk-based security of all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no material breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, material internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
Cyber Security; Data Protection. The Company has taken all commercially reasonable actions to protect and maintain the security, integrity and continuous operation of the information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications and databases used in connection with its business (and the data stored therein or processed thereby), and, except as disclosed in the Disclosure Package and the Prospectus, including any document incorporated by reference therein, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, other than those which, individually or in the aggregate, did not, or are not expected to, have a material adverse effect on the business, property, financial condition or results of operations of the Company and its consolidated subsidiaries taken as a whole; and the Company is in compliance with all currently applicable (and has taken all commercially reasonable actions to prepare to comply with all pending) laws and regulations and all orders, judgments or decrees of any court or governmental agency and its own posted policies and contractual obligations relating to data privacy and security, other than those which, individually or in the aggregate, did not, or are not expected to, have a material adverse effect on the business, property, financial condition or results of operations of the Company and its consolidated subsidiaries taken as a whole.
Cyber Security; Data Protection. The Company and its subsidiaries’ information technology and computer systems, networks, hardware, software, internet web sites, data and databases (including the data of their respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of them), equipment or technology (collectively, “IT Systems and Data”) are adequate for, and operate and perform in all material respects as required in connection with, the operation of the business of the Company and the subsidiaries as currently conducted, except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries have implemented and maintained commercially reasonable information technology, information security, cyber security and data protection controls, policies and procedures, including oversight, access controls, encryption, technological and physical safeguards, business continuity/disaster recovery and incident response to adequately protect and prevent security breaches of, unauthorized access to and other similar compromises of IT Systems and Data in accordance with industry practices and as required by applicable regulatory standards. The Company and its subsidiaries (i) to the knowledge of the Company and the Guarantors, have not experienced and have no knowledge of any cyber-attack, security breach, unauthorized access or other similar compromise to their IT Systems and Data and (ii) are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except, in each case of clauses (i) and (ii), for any such cyber-attack, security breach, unauthorized access or other similar compromise, or noncompliance, that would not, individually or in the aggregate, be reasonably likely to have a Material Adverse Effect.
Cyber Security; Data Protection. Except as would not be expected to have, individually or in the aggregate, a Material Adverse Effect, the Partnership Entities’ and the Operating Subsidiaries’ respective information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Partnership Entities and the Operating Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Partnership Entities and the Operating Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, or any such breaches, violations, outages, or unauthorized uses of or accesses to same that would not have, individually or in the aggregate, a Material Adverse Effect, nor any incidents under internal review or investigations relating to the same. The Partnership Entities and the Operating Subsidiaries are presently in compliance, in all material respects, with all internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
Cyber Security; Data Protection. Except as would not reasonably be expected to result in a Material Adverse Change or as set forth in the Disclosure Package and the Prospectus, (i) the Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications and databases (collectively, “IT Systems”) operate and perform as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, and to the Company’s knowledge, are free and clear of all bugs, errors, defects, malware and other corruptants; (ii) the Company and its subsidiaries maintain commercially reasonable controls, policies, procedures and safeguards to protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored therein, and to the Company’s knowledge, since January 1, 2017, there have been no breaches, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any person; and (iii) the Company and its subsidiaries are in compliance with all applicable laws or statutes, all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data. Any certificate signed by an officer of the Company and delivered to the Representatives or to counsel for the Underwriters shall be deemed to be a representation and warranty by the Company to each Underwriter as to the matters set forth therein.
Cyber Security; Data Protection. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, the Company and its subsidiaries, to the knowledge of the Company, (i) have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) used in connection with their businesses and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, (ii) are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations, in each case relating to the privacy and security of Personal Data and to the protection of such Personal Data from unauthorized use, access, misappropriation or modification, and (iii) have taken all necessary actions to comply with the European Union General Data Protection Regulations.