Technology Security Systems. (a) Each Credit Party and each of its Subsidiaries has implemented and maintains adequate administrative, physical, and technical security measures and procedures (consistent with industry standards for companies and businesses of similar size in similar industries) to protect the confidentiality, integrity, and security of (i) its computers, computer systems, servers, hardware, software, websites, databases, networks, and all other information technology equipment and systems, including any hosted locations and other outsourced systems and processes (all of the foregoing in this clause (i), “Credit Party Systems”) and (ii) all individually identifiable information, including sensitive and confidential information, accessed, collected, used, processed, stored, transferred or disclosed by or on behalf of any Credit Party or any Subsidiary of any Credit Party (all such data and information referred to in this clause (ii), “Credit Party Data”), in all cases including from theft, destruction, corruption, loss or unauthorized use, access, interruption, deletion, alteration or modification by any Person except, in each case of this clause (a), as has not had, and would not reasonably be expected to have, individually or in the aggregate, a Material Adverse Effect. All Credit Party Systems necessary to the operation of Credit Party’s business are operational in all material respects and have adequate backups and disaster recovery arrangements that are at least reasonable and at least consistent with, as protective as, and no less rigorous than, industry standards for companies and businesses of similar size in similar industries. Without limiting the generality of the foregoing, each Credit Party and each of its Subsidiaries (x) takes commercially reasonable efforts to securely store applicable equipment and software that is material to its business, (y) utilizes industry-accepted virus and intrusion checking software and firewalls, and (z) limits access to Credit Party Data to only those employees and agents who need such access for the conduct of the business of the Credit Parties and their Subsidiaries. (b) No Credit Party or any Subsidiary of any Credit Party has experienced any (i) security incidents, data breaches, intrusions or unauthorized access, use or compromise of any of the Credit Party Systems, (ii) unauthorized collection, access, use, processing, loss, compromise, interruption, deletion, modification or disclosure of any Credit Party Data or trade secrets of any Credit Party or any Subsidiary of any Credit Party or (iii) cyber, social engineering, spoofing, phishing, r▇▇▇▇▇, viral or other attack, theft or intrusion (all of the foregoing clauses (i), (ii) and (iii), “Security Breaches”) that has allowed an unauthorized Person to access, copy, encrypt or otherwise use any Credit Party Data, in each case, which could reasonably be expected to cause a Material Adverse Effect. Each Credit Party and each of its Subsidiaries is in material compliance with all Requirements of Laws regarding the privacy or security of all Credit Party Data. Except as set forth on Schedule 5.33(b), no Credit Party or any Subsidiary of any Credit Party has received or is aware of any notice, allegation, complaint or other communication, and to the knowledge of the Credit Parties there is no pending investigation by any Governmental Authority or other Person regarding any actual or possible violation of any Requirements of Laws regarding the privacy or security of any Credit Party Data.
Appears in 2 contracts
Sources: Credit Agreement (Rent the Runway, Inc.), Exchange Agreement (Rent the Runway, Inc.)