Data Processing Agreement

This Data Processing Agreement (“DPA“) forms an integral part of and is subject to the IMGN Terms of Service, entered into by and between the Company accepting the Terms of Service (“Controller“) and IMGN Software Ltd. (“Processor” and the “Agreement“, respectively). Capitalized terms not otherwise defined herein shall have the meaning given to them in the Agreement.

 

Whereas, in connection with the performance of its obligations under the Agreement, Processor may Process Controller Personal Data (both as defined below) on behalf of the Controller; and

 

Whereas, the parties wish to set forth the mutual obligations with respect to the processing of Controller Personal Data by the Processor;

 

Now, therefore, intending to be legally bound, the parties hereby agree as follows:

 

  1.           Definitions. In addition to capitalized terms defined elsewhere in this DPA, the following terms shall have the meanings set forth below:

 

1.1.           Applicable Law” means whichever of the following legal regimes is applicable to the processing of Personal Data under this DPA:

 

1.1.1.      Regulation 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (“GDPR“) and laws implementing or supplementing the GDPR;

 

1.1.2.      The California Consumer Privacy Act of 2018, Cal. Civil Code Title 1.81.5 and the regulations thereunder (collectively, “CCPA“);

 

1.1.3.      The Israel Protection of Privacy Law, 1981, all related regulations enacted thereunder, and the Israel Privacy Protection Authority’s Guidelines and the Israeli Protection of Privacy Regulations (Information Security) – 2017 (collectively, “Israeli Privacy Law“).

 

1.2.           Controller Personal Data” means any Personal Data Processed by Processor on behalf of Controller pursuant to or in connection with the Agreement.

 

1.3.           Data Protection Laws” means Applicable Law and, to the extent applicable, the data protection or privacy laws of any other applicable country where the Services are delivered or as agreed in writing between the Parties.

 

1.4.           Sub Processor” means any person (excluding an employee of Processor) appointed by or on behalf of Processor to Process Controller Personal Data on behalf of the Controller in connection with the Agreement.

 

1.5.           Data Subject” shall mean the person whose Personal Data is Processed and both Data Subject as defined under the GDPR and Consumer as defined under the CCPA.

 

1.6.           Personal Data” shall mean Personal Data as defined under the GDPR, ‘Personal Information’ as defined under the CCPA, and ‘Information’ (‘meida’) as defined under Israeli Privacy Law, in each case, as applicable.

 

1.7.           Processing” shall be as defined in the GDPR, the CCPA, and Israeli Privacy Law, in each case as applicable.

 

1.8.           The terms “Controller“, “Personal Data Breach“, Processor“, and “Supervisory Authority” shall have the meanings ascribed to them in the GDPR.

 

1.9.           The terms “Business“, “Sell“, “Share“, and “Service Provider“, shall have the meanings ascribed to them in the CCPA.

 

  1.           Applicability and Roles of the Parties.

 

2.1.           For Processing subject to the GDPR: When Controller Personal Data is subject to the GDPR, Controller serves as a Controller of such Personal Data and Processor serves as a Processor on its behalf. In such case, the Applicable Law shall be as described in Section 1.1.1 and this DPA shall be interpreted accordingly.

 

2.2.           For Processing subject to the CCPA: When Controller Personal Data is subject to the CCPA, Controller serves as a Business with respect to such Personal Data and Processor serves as a Service Provider on its behalf. In such case, the Applicable Law shall be as described in Section 1.1.2 and this DPA shall be interpreted accordingly.

 

2.3.           For Processing subject to Israeli Privacy Law: When Controller Personal Data is subject to Israeli Law, Controller shall be considered the party controlling the database of Controller Personal Data and Processor serves as an outsourced service provider on its behalf. In such case, the Applicable Law shall be as described in Section 1.1.3 and this DPA shall be interpreted accordingly.

 

  1.           Processing of Controller Personal Data.

 

3.1.           Processor shall Process Controller Personal Data on Controller’s behalf and at Controller’s instructions as specified in the Agreement and in this DPA, including without limitation with regard to transfers of Controller Personal Data to a third country or international organization. Any other Processing shall be permitted only in the event that such Processing is required by any Data Protection Laws to which the Processor is subject. In such event, Processor shall unless prohibited by such Data Protection Laws on important grounds of public interest, inform Controller of that requirement before engaging in such Processing.

 

3.2.           Controller instructs Processor (and authorizes Processor to instruct each Sub Processor) (i) to Process Controller Personal Data for the provision of the services as detailed in the Agreement (“Services“) and as otherwise set forth in the Agreement and in this DPA, and/or as otherwise directed by Controller; and (ii) to transfer Controller Personal Data to any country or territory as reasonably necessary for the provision of the Services and in accordance with Applicable Law.

     

3.3.           Controller sets forth the details of the Processing of Controller Personal Data, as required by Article 28(3) of the GDPR in Schedule 1 (Details of Processing of Controller Personal Data), attached hereto.

 

3.4.           For Processing subject to the CCPA: Processor undertakes that it shall not Sell or Share Personal Data when processing Personal Data as a Service Provider and shall not retain, use, or disclose Personal Data for any commercial purpose other than providing the Services to Controller and as otherwise permitted under the Agreement.

 

  1.           Controller. Controller represents and warrants that it has and shall maintain throughout the term of the Agreement and this DPA, all necessary rights to provide the Controller Personal Data to Processor for the Processing to be performed in relation to the Services and in accordance with the Agreement and this DPA. To the extent required by Data Protection Laws, the Controller is responsible for obtaining any necessary Data Subject consents to the Processing and for ensuring that a record of such consents is maintained throughout the term of the Agreement and this DPA and/or as otherwise required under Data Protection Laws.

 

  1.           Processor Employees. Processor shall take reasonable steps to ensure that access to the Controller Personal Data is limited on a need to know and/or access basis and that all Processor employees receiving such access are subject to confidentiality undertakings or professional or statutory obligations of confidentiality in connection with their access to and use of Controller Personal Data.

 

  1.           Security.

 

6.1.           Processor shall implement appropriate technical and organizational measures to ensure an appropriate level of security of the Controller Personal Data as set forth in the Binding Security Document attached hereto as Schedule 2. In assessing the appropriate level of security, Processor shall take into account the risks that are presented by the nature of the Processing and the information available to the Processor.

 

6.2.           For Processing subject to Israeli Privacy Law: Processor shall implement information security measures and take all necessary measures as per the Israeli Privacy Law, in order to maintain the integrity, availability, confidentiality, survival, and reliability of Controller Personal Data, and comply with all provisions of the Israeli Privacy Law, including, and without limitation, the obligations of an “external party” under section 15 of the Protection of Privacy Regulations (Data Security), 5777-2017, with which a “database owner” must obligate an external party to comply within the framework of an outsourcing agreement (as such terms are defined in the Israeli Privacy Law), and all which are hereby explicitly incorporated in this DPA. If requested, Processor will report to the Controller on the manner in which it is complying with its obligations under the Israeli Privacy Law and this DPA.

 

  1.           Personal Data Breach.

 

7.1.           Processor shall notify Controller without undue delay and, where feasible, not later than within 48 (forty-eight) hours upon Processor becoming aware of a Personal Data Breach affecting Controller Personal Data. In such event, the Processor shall provide Controller with reasonable and available information to assist the Controller in meeting any obligations to inform Data Subjects or Supervisory Authorities of the Personal Data Breach as required under Applicable Law.

 

7.2.           At the written request of the Controller, Processor shall reasonably cooperate with Controller and take such commercially reasonable steps as are agreed by the parties or required under Applicable Law to assist in the investigation, mitigation and remediation of any Personal Data Breach.

 

  1.           Sub Processing.

 

8.1.           Controller authorizes Processor to appoint (and permits each Sub Processor appointed in accordance with this Section 8 to appoint) Sub Processors in accordance with this Section 8. 

8.2.           Processor may continue to use those Sub Processors already engaged by Processor as identified to Controller as of the date of this DPA.

 

8.3.           Processor may appoint new Sub Processors and shall give notice of any such appointment to Controller. If within seven (7) days of such notice, the Controller notifies the Processor in writing of any reasonable objections to the proposed appointment, Processor shall not appoint the proposed Sub Processor for the Processing of Controller Personal Data until reasonable steps have been taken to address the objections raised by Controller and Controller has been provided with a reasonable written explanation of the steps taken. Where such steps are not sufficient to relieve Controller’s reasonable objections, each Controller or Processor may, by written notice to the other party and with immediate effect, terminate the Agreement to the extent that it relates to the services requiring the use of the proposed Sub Processor. In such an event, the terminating party shall not bear any liability for such termination.

 

8.4.           With respect to each new Sub Processor, Processor shall:

 

8.4.1.  Prior to the Processing of Controller Personal Data by Sub Processor, take reasonable steps (for instance by way of reviewing privacy policies as appropriate) to ensure that Sub Processor is committed and able to provide the level of protection for Controller Personal Data required by this DPA; and

 

8.4.2.  ensure that the arrangement between the Processor and the Sub Processor is governed by a written contract, including terms that offer a materially similar level of protection for Controller Personal Data as those set out in this DPA and meet the requirements of Applicable Law.

 

8.5.           Processor shall remain fully liable to the Controller for the performance of any Sub Processor’s obligations.

 

  1.           Data Subject Rights.

 

9.1.           Controller shall be solely responsible for compliance with any statutory obligations concerning requests to exercise Data Subject rights under Data Protection Laws (e.g., for access, rectification, deletion of Controller Personal Data, etc.). Processor shall, at Controller’s sole expense, use commercially reasonable efforts to assist Controller in fulfilling Controller’s obligations with respect to such Data Subject requests, as required under Data Protection Laws.

 

9.2.           Upon receipt of a request from a Data Subject under any Data Protection Laws in respect to Controller Personal Data, Processor shall promptly notify Controller of such request and shall not respond to such request except on the documented instructions of Controller or as required by Data Protection Laws to which the Processor is subject, in which case Processor shall, to the extent permitted by Data Protection Laws, inform Controller of such legal requirement prior to responding to the request.

 

  1.       Data Protection Impact Assessment and Prior Consultation. At Controller’s written request and expense, the Processor and each Sub Processor shall provide reasonable assistance to Controller with respect to any Controller Personal Data Processed by Processor and/or a Sub Processor, with any data protection impact assessments or prior consultations with Supervisory Authorities or other competent data privacy authorities, as required under any Applicable Law.

 

  1.       Deletion or Return of Controller Personal Data. Processor shall promptly and in any event within 60 (sixty) days of the date of cessation of the provision of the Services to Controller involving the Processing of Controller Personal Data, delete, return, or anonymize all copies of such Controller Personal Data, provided however that Processor may retain Controller Personal Data, as permitted by applicable law.

 

  1.       Audit Rights.

 

12.1.        Subject to Sections 12.2 and ‎12.3, Processor shall make available to an auditor mandated by Controller in coordination with Processor, upon prior written request, such information reasonably necessary to demonstrate compliance with this DPA and shall allow for audits, including inspections, by such reputable auditor mandated by the Controller in relation to the Processing of the Controller Personal Data by the Processor, provided that such third-party auditor shall be subject to confidentiality obligations.

 

12.2.        Any audit or inspection shall be at Controller’s sole expense and shall be subject to the terms of the Agreement, and subject to Processor’s reasonable security policies and obligations to third parties, including with respect to confidentiality. The results of any audit or inspection shall be considered the confidential information of the Processor and shall be treated with the same degree of care as Controller affords its own confidential information.

 

12.3.        Controller and any auditor on its behalf shall use best efforts to minimize or avoid causing any damage, injury, or disruption to the Processors’ premises, equipment, employees, and business and shall not interfere with the Processor’s day-to-day business. Controller and Processor shall mutually agree upon the scope, timing, and duration of the audit or inspection and the reimbursement rate, for which Controller shall be responsible. Processor need not give access to its premises for the purposes of such an audit or inspection:

 

12.3.1.   to any individual unless he or she produces reasonable evidence of identity and authority;

 

12.3.2.   if Processor was not given prior written notice of such audit or inspection;

 

12.3.3.   outside of normal business hours at those premises, unless the audit or inspection needs to be conducted on an emergency basis; or

 

12.3.4.   for the purposes of more than one (1) audit or inspection in any calendar year, except for any additional audits or inspections which:

 

12.3.4.1.   Controller reasonably considers necessary because of genuine concern as to Processor’s compliance with this DPA; or

 

12.3.4.2.   Controller is required to carry out by Applicable Law, a Supervisory Authority or any similar regulatory authority responsible for the enforcement of Applicable Law in any country or territory, where Controller has identified its concerns or the relevant requirement or request in its prior written notice to Processor of the audit or inspection.

 

12.3.5.   Processor shall immediately inform Controller if, in its opinion, an instruction received under this DPA infringes Applicable Law.

 

  1.       Limitation of Liability. The controller shall indemnify and hold the Processor harmless against all claims, actions, third party claims, losses, damages, and expenses incurred by the Processor and arising directly or indirectly out of or in connection with a breach of this DPA and/or the Data Protection Laws by Controller. Each party’s liability toward the other party shall be subject to the limitations on liability under the Agreement.

 

  1.       General Terms.

 

14.1.        Governing Law and Jurisdiction. The parties to this DPA hereby agree that the competent courts in Malta shall have exclusive jurisdiction regarding all disputes hereunder, and the parties expressly consent to such jurisdiction. This DPA and all non-contractual or other obligations arising out of or in connection with it are governed by the laws of Malta.

 

14.2.        Order of Precedence.

 

14.2.1.   This DPA is not intended to, and does not in any way limit or derogate from Controller’s obligations and liabilities towards the Processor under the Agreement and/or pursuant to Data Protection Laws or any law applicable to Controller in connection with the collection, handling and use of Controller Personal Data by Controller or other processors or their sub-processors, including with respect to the transferor provision of Controller Personal Data to Processor and/or providing Processor with access thereto.

 

14.2.2.   Subject to this Section 14.2, with regard to the subject matter of this DPA, in the event of inconsistencies between the provisions of this DPA and any other agreements between the parties, including the Agreement and including (except where explicitly agreed otherwise in writing, signed on behalf of the parties) agreements entered into or purported to be entered into after the date of this DPA, the provisions of this DPA shall prevail.

 

14.3.        Changes in Data Protection Laws.

 

14.3.1.   Controller may, by at least 45 (forty-five) calendar days prior written notice to Processor, request in writing any variations to this DPA if they are required as a result of any change in, or decision of a competent authority under any Data Protection Laws in order to allow Controller Personal Data to be Processed (or continue to be Processed) without breach of Data Protection Laws.

 

14.3.2.   If Controller gives notice with respect to its request to modify this DPA under Section ‎14.3.1, (i) Processor shall make commercially reasonable efforts to accommodate such modification request and (ii) Controller shall not unreasonably withhold or delay agreement to any consequential variations to this DPA proposed by Processor to protect the Processor against additional risks or to indemnify and compensate Processor for any further steps and costs associated with the variations made herein.

 

14.4.        Severance. Should any provision of this DPA be held invalid or unenforceable, then the remainder of this DPA shall remain valid and in force. The invalid or unenforceable provision shall either be (i) amended as necessary to ensure its validity and enforceability while preserving the parties’ intentions as closely as possible or, if this is not possible, (ii) construed in a manner as if the invalid or unenforceable part had never been contained therein.

 

Schedule 1: Details of Processing of Controller Personal Data

 

This Schedule 1 includes certain details of the Processing of Controller Personal Data.

 

Subject matter and duration of the Processing of Controller Personal Data.

The subject matter and duration of the Processing of the Controller Personal Data are set out in the Agreement, in the Processor’s Privacy Notice (“Privacy Notice“), and in this DPA.

 

The nature and purpose of the Processing of Controller Personal Data:

Rendering Services in the nature of facilitating film production processes by automating part of the process and by providing user-friendly management tools to oversee the production throughout all its stages, as detailed in the Agreement and the Privacy Notice.

 

The types of Controller Personal Data to be Processed are as follows:

As detailed in the Privacy Notice, including personal data provided in User Content, such as a screenplay, and which is not used to provide the Services.

 

The categories of Data Subject to whom the Controller Personal Data relates to are as follows:

Individuals involved in the film production project.

 

The obligations and rights of the Controller.

The obligations and rights of the Controller are set out in the Agreement and this DPA.

 

Schedule 2: Binding Security Document 

 Processor uses firewalls to protect our internet connection This will be your first line of defense against an intrusion from the internet.

 Processor uses the most appropriate security settings for its devices and software. Most hardware and software will need some level of setup and configuration in order to provide effective protection. 

 Processor controls who has access to your data and services Restrict access to your system to users and sources you trust. 

 Processor protects itself from viruses and other malware.

 Processor keeps its software and devices up-to-date. Hardware and software need regular updates to fix bugs and security vulnerabilities.

 Processor regularly backs up its data. Regular backups of your most important data will ensure it can be quickly restored in the event of disaster or ransomware infection.



You can use the keyboard arrows to navigate between the component buttons
",e=e.removeChild(e.firstChild)):"string"==typeof o.is?e=l.createElement(a,{is:o.is}):(e=l.createElement(a),"select"===a&&(l=e,o.multiple?l.multiple=!0:o.size&&(l.size=o.size))):e=l.createElementNS(e,a),e[Ni]=t,e[Pi]=o,Pl(e,t,!1,!1),t.stateNode=e,l=Ae(a,o),a){case"iframe":case"object":case"embed":Te("load",e),u=o;break;case"video":case"audio":for(u=0;u<$a.length;u++)Te($a[u],e);u=o;break;case"source":Te("error",e),u=o;break;case"img":case"image":case"link":Te("error",e),Te("load",e),u=o;break;case"form":Te("reset",e),Te("submit",e),u=o;break;case"details":Te("toggle",e),u=o;break;case"input":A(e,o),u=M(e,o),Te("invalid",e),Ie(n,"onChange");break;case"option":u=B(e,o);break;case"select":e._wrapperState={wasMultiple:!!o.multiple},u=Uo({},o,{value:void 0}),Te("invalid",e),Ie(n,"onChange");break;case"textarea":V(e,o),u=H(e,o),Te("invalid",e),Ie(n,"onChange");break;default:u=o}Me(a,u);var s=u;for(i in s)if(s.hasOwnProperty(i)){var c=s[i];"style"===i?ze(e,c):"dangerouslySetInnerHTML"===i?(c=c?c.__html:void 0,null!=c&&Aa(e,c)):"children"===i?"string"==typeof c?("textarea"!==a||""!==c)&&X(e,c):"number"==typeof c&&X(e,""+c):"suppressContentEditableWarning"!==i&&"suppressHydrationWarning"!==i&&"autoFocus"!==i&&(ea.hasOwnProperty(i)?null!=c&&Ie(n,i):null!=c&&x(e,i,c,l))}switch(a){case"input":L(e),j(e,o,!1);break;case"textarea":L(e),$(e);break;case"option":null!=o.value&&e.setAttribute("value",""+P(o.value));break;case"select":e.multiple=!!o.multiple,n=o.value,null!=n?q(e,!!o.multiple,n,!1):null!=o.defaultValue&&q(e,!!o.multiple,o.defaultValue,!0);break;default:"function"==typeof u.onClick&&(e.onclick=Fe)}Ve(a,o)&&(t.effectTag|=4)}null!==t.ref&&(t.effectTag|=128)}return null;case 6:if(e&&null!=t.stateNode)Ll(e,t,e.memoizedProps,o);else{if("string"!=typeof o&&null===t.stateNode)throw Error(r(166));n=yn(yu.current),yn(bu.current),Jn(t)?(n=t.stateNode,o=t.memoizedProps,n[Ni]=t,n.nodeValue!==o&&(t.effectTag|=4)):(n=(9===n.nodeType?n:n.ownerDocument).createTextNode(o),n[Ni]=t,t.stateNode=n)}return null;case 13:return zt(vu),o=t.memoizedState,0!==(64&t.effectTag)?(t.expirationTime=n,t):(n=null!==o,o=!1,null===e?void 0!==t.memoizedProps.fallback&&Jn(t):(a=e.memoizedState,o=null!==a,n||null===a||(a=e.child.sibling,null!==a&&(i=t.firstEffect,null!==i?(t.firstEffect=a,a.nextEffect=i):(t.firstEffect=t.lastEffect=a,a.nextEffect=null),a.effectTag=8))),n&&!o&&0!==(2&t.mode)&&(null===e&&!0!==t.memoizedProps.unstable_avoidThisFallback||0!==(1&vu.current)?rs===Qu&&(rs=Yu):(rs!==Qu&&rs!==Yu||(rs=Gu),0!==us&&null!==es&&(To(es,ns),Co(es,us)))),(n||o)&&(t.effectTag|=4),null);case 4:return wn(),Ol(t),null;case 10:return Zt(t),null;case 17:return It(t.type)&&Ft(),null;case 19:if(zt(vu),o=t.memoizedState,null===o)return null;if(a=0!==(64&t.effectTag),i=o.rendering,null===i){if(a)mr(o,!1);else if(rs!==Qu||null!==e&&0!==(64&e.effectTag))for(i=t.child;null!==i;){if(e=_n(i),null!==e){for(t.effectTag|=64,mr(o,!1),a=e.updateQueue,null!==a&&(t.updateQueue=a,t.effectTag|=4),null===o.lastEffect&&(t.firstEffect=null),t.lastEffect=o.lastEffect,o=t.child;null!==o;)a=o,i=n,a.effectTag&=2,a.nextEffect=null,a.firstEffect=null,a.lastEffect=null,e=a.alternate,null===e?(a.childExpirationTime=0,a.expirationTime=i,a.child=null,a.memoizedProps=null,a.memoizedState=null,a.updateQueue=null,a.dependencies=null):(a.childExpirationTime=e.childExpirationTime,a.expirationTime=e.expirationTime,a.child=e.child,a.memoizedProps=e.memoizedProps,a.memoizedState=e.memoizedState,a.updateQueue=e.updateQueue,i=e.dependencies,a.dependencies=null===i?null:{expirationTime:i.expirationTime,firstContext:i.firstContext,responders:i.responders}),o=o.sibling;return Mt(vu,1&vu.current|2),t.child}i=i.sibling}}else{if(!a)if(e=_n(i),null!==e){if(t.effectTag|=64,a=!0,n=e.updateQueue,null!==n&&(t.updateQueue=n,t.effectTag|=4),mr(o,!0),null===o.tail&&"hidden"===o.tailMode&&!i.alternate)return t=t.lastEffect=o.lastEffect,null!==t&&(t.nextEffect=null),null}else 2*ru()-o.renderingStartTime>o.tailExpiration&&1t)&&vs.set(e,t)))}}function Ur(e,t){e.expirationTimee?n:e,2>=e&&t!==e?0:e}function qr(e){if(0!==e.lastExpiredTime)e.callbackExpirationTime=1073741823,e.callbackPriority=99,e.callbackNode=$t(Vr.bind(null,e));else{var t=Br(e),n=e.callbackNode;if(0===t)null!==n&&(e.callbackNode=null,e.callbackExpirationTime=0,e.callbackPriority=90);else{var r=Fr();if(1073741823===t?r=99:1===t||2===t?r=95:(r=10*(1073741821-t)-10*(1073741821-r),r=0>=r?99:250>=r?98:5250>=r?97:95),null!==n){var o=e.callbackPriority;if(e.callbackExpirationTime===t&&o>=r)return;n!==Yl&&Bl(n)}e.callbackExpirationTime=t,e.callbackPriority=r,t=1073741823===t?$t(Vr.bind(null,e)):Wt(r,Hr.bind(null,e),{timeout:10*(1073741821-t)-ru()}),e.callbackNode=t}}}function Hr(e,t){if(ks=0,t)return t=Fr(),No(e,t),qr(e),null;var n=Br(e);if(0!==n){if(t=e.callbackNode,(Ju&(Wu|$u))!==Hu)throw Error(r(327));if(lo(),e===es&&n===ns||Kr(e,n),null!==ts){var o=Ju;Ju|=Wu;for(var a=Yr();;)try{eo();break}catch(t){Xr(e,t)}if(Gt(),Ju=o,Bu.current=a,rs===Ku)throw t=os,Kr(e,n),To(e,n),qr(e),t;if(null===ts)switch(a=e.finishedWork=e.current.alternate,e.finishedExpirationTime=n,o=rs,es=null,o){case Qu:case Ku:throw Error(r(345));case Xu:No(e,2=n){e.lastPingedTime=n,Kr(e,n);break}}if(i=Br(e),0!==i&&i!==n)break;if(0!==o&&o!==n){e.lastPingedTime=o;break}e.timeoutHandle=Si(oo.bind(null,e),a);break}oo(e);break;case Gu:if(To(e,n),o=e.lastSuspendedTime,n===o&&(e.nextKnownPendingLevel=ro(a)),ss&&(a=e.lastPingedTime,0===a||a>=n)){e.lastPingedTime=n,Kr(e,n);break}if(a=Br(e),0!==a&&a!==n)break;if(0!==o&&o!==n){e.lastPingedTime=o;break}if(1073741823!==is?o=10*(1073741821-is)-ru():1073741823===as?o=0:(o=10*(1073741821-as)-5e3,a=ru(),n=10*(1073741821-n)-a,o=a-o,0>o&&(o=0),o=(120>o?120:480>o?480:1080>o?1080:1920>o?1920:3e3>o?3e3:4320>o?4320:1960*Uu(o/1960))-o,n=o?o=0:(a=0|l.busyDelayMs,i=ru()-(10*(1073741821-i)-(0|l.timeoutMs||5e3)),o=i<=a?0:a+o-i),10 component higher in the tree to provide a loading indicator or placeholder to display."+N(i))}rs!==Zu&&(rs=Xu),l=yr(l,i),f=a;do{switch(f.tag){case 3:u=l,f.effectTag|=4096,f.expirationTime=t;var w=Ar(f,u,t);ln(f,w); break e;case 1:u=l;var E=f.type,k=f.stateNode;if(0===(64&f.effectTag)&&("function"==typeof E.getDerivedStateFromError||null!==k&&"function"==typeof k.componentDidCatch&&(null===ms||!ms.has(k)))){f.effectTag|=4096,f.expirationTime=t;var _=Ir(f,u,t);ln(f,_);break e}}f=f.return}while(null!==f)}ts=no(ts)}catch(e){t=e;continue}break}}function Yr(){var e=Bu.current;return Bu.current=Cu,null===e?Cu:e}function Gr(e,t){eus&&(us=e)}function Jr(){for(;null!==ts;)ts=to(ts)}function eo(){for(;null!==ts&&!Gl();)ts=to(ts)}function to(e){var t=Fu(e.alternate,e,ns);return e.memoizedProps=e.pendingProps,null===t&&(t=no(e)),qu.current=null,t}function no(e){ts=e;do{var t=ts.alternate;if(e=ts.return,0===(2048&ts.effectTag)){if(t=br(t,ts,ns),1===ns||1!==ts.childExpirationTime){for(var n=0,r=ts.child;null!==r;){var o=r.expirationTime,a=r.childExpirationTime;o>n&&(n=o),a>n&&(n=a),r=r.sibling}ts.childExpirationTime=n}if(null!==t)return t;null!==e&&0===(2048&e.effectTag)&&(null===e.firstEffect&&(e.firstEffect=ts.firstEffect),null!==ts.lastEffect&&(null!==e.lastEffect&&(e.lastEffect.nextEffect=ts.firstEffect),e.lastEffect=ts.lastEffect),1e?t:e}function oo(e){var t=qt();return Vt(99,ao.bind(null,e,t)),null}function ao(e,t){do lo();while(null!==gs);if((Ju&(Wu|$u))!==Hu)throw Error(r(327));var n=e.finishedWork,o=e.finishedExpirationTime;if(null===n)return null;if(e.finishedWork=null,e.finishedExpirationTime=0,n===e.current)throw Error(r(177));e.callbackNode=null,e.callbackExpirationTime=0,e.callbackPriority=90,e.nextKnownPendingLevel=0;var a=ro(n);if(e.firstPendingTime=a,o<=e.lastSuspendedTime?e.firstSuspendedTime=e.lastSuspendedTime=e.nextKnownPendingLevel=0:o<=e.firstSuspendedTime&&(e.firstSuspendedTime=o-1),o<=e.lastPingedTime&&(e.lastPingedTime=0),o<=e.lastExpiredTime&&(e.lastExpiredTime=0),e===es&&(ts=es=null,ns=0),1u&&(c=u,u=l,l=c),c=Ue(w,l),f=Ue(w,u),c&&f&&(1!==k.rangeCount||k.anchorNode!==c.node||k.anchorOffset!==c.offset||k.focusNode!==f.node||k.focusOffset!==f.offset)&&(E=E.createRange(),E.setStart(c.node,c.offset),k.removeAllRanges(),l>u?(k.addRange(E),k.extend(f.node,f.offset)):(E.setEnd(f.node,f.offset),k.addRange(E)))))),E=[];for(k=w;k=k.parentNode;)1===k.nodeType&&E.push({element:k,left:k.scrollLeft,top:k.scrollTop});for("function"==typeof w.focus&&w.focus(),w=0;w=t&&e<=t}function To(e,t){var n=e.firstSuspendedTime,r=e.lastSuspendedTime;nt||0===n)&&(e.lastSuspendedTime=t),t<=e.lastPingedTime&&(e.lastPingedTime=0),t<=e.lastExpiredTime&&(e.lastExpiredTime=0)}function Co(e,t){t>e.firstPendingTime&&(e.firstPendingTime=t);var n=e.firstSuspendedTime;0!==n&&(t>=n?e.firstSuspendedTime=e.lastSuspendedTime=e.nextKnownPendingLevel=0:t>=e.lastSuspendedTime&&(e.lastSuspendedTime=t+1),t>e.nextKnownPendingLevel&&(e.nextKnownPendingLevel=t))}function No(e,t){var n=e.lastExpiredTime;(0===n||n>t)&&(e.lastExpiredTime=t)}function Po(e,t,n,o){var a=t.current,i=Fr(),l=su.suspense;i=jr(i,a,l);e:if(n){n=n._reactInternalFiber;t:{if(J(n)!==n||1!==n.tag)throw Error(r(170));var u=n;do{switch(u.tag){case 3:u=u.stateNode.context;break t;case 1:if(It(u.type)){u=u.stateNode.__reactInternalMemoizedMergedChildContext;break t}}u=u.return}while(null!==u);throw Error(r(171))}if(1===n.tag){var s=n.type;if(It(s)){n=Dt(n,s,u);break e}}n=u}else n=Al;return null===t.context?t.context=n:t.pendingContext=n,t=on(i,l),t.payload={element:e},o=void 0===o?null:o,null!==o&&(t.callback=o),an(a,t),Dr(a,i),i}function Oo(e){if(e=e.current,!e.child)return null;switch(e.child.tag){case 5:return e.child.stateNode;default:return e.child.stateNode}}function Ro(e,t){e=e.memoizedState,null!==e&&null!==e.dehydrated&&e.retryTime