In the ordinary course of business, the Company relies on information technology networks and systems, some of which are managed by third parties, to process, transmit and store electronic information, and to manage or support a variety of business processes and activities. Additionally, the Company collects and stores sensitive data, including proprietary business information. It is possible we or a third party that we rely on could incur interruptions from a loss of communications, hardware or software failures, a cybersecurity attack or an incident relating to our IT systems or technology, ransomware, phishing attacks, computer viruses or malware. In the current environment, there are numerous and evolving risks to cybersecurity and privacy, including criminal hackers, hacktivists, state-sponsored intrusions, industrial espionage, employee malfeasance and human or technological error. High-profile cybersecurity incidents at other companies and in government agencies have increased in recent years, and security industry experts and government officials have warned about the risks of hackers and cyberattacks targeting businesses such as ours. Despite security measures and business continuity plans, the Company's information technology networks and infrastructure may be vulnerable to damage, disruptions or shutdowns due to attack by hackers, breaches, employee error or malfeasance, power outages, computer viruses, telecommunication or utility failures, systems failures, natural disasters or other catastrophic events. While we have not experienced any material losses related to cyber-attacks or information security breaches to date, any such event could result in legal claims or proceedings, liability or penalties under privacy laws, disruption in operations and damage to the Company's reputation, which could adversely affect the Company's business.