Our systems, like others in the industries we serve, are vulnerable to cyber security risks, and we are subject to potential disruption caused by such activities. Corporations such as ours are subject to frequent attacks on their systems. Such attacks may have various goals, from seeking confidential information to causing operational disruption. Although to date such activities have not resulted in material disruptions to our operations or, to our knowledge, a material breach of any security or confidential information, no assurance can be provided that such disruptions or breach will not occur in the future. Any significant violations of data privacy could result in the loss of business, litigation, regulatory investigations, penalties, ongoing expenses related to client credit monitoring and support, and other expenses, any of which could damage our reputation and adversely affect the growth of our business. While we have deployed resources that are responsible for maintaining appropriate levels of cyber security, and while we utilize third-party technology products and services to help identify, protect, and remediate our information technology systems and infrastructure against security breaches and cyber-incidents, our responsive and precautionary measures may not be adequate or effective to prevent, identify, or mitigate attacks by hackers, foreign governments, or other actors or breaches caused by employee error, malfeasance, or other disruptions. We are also dependent on security measures that some of our third-party vendors and customers are taking to protect their own systems and infrastructures. If our third-party vendors do not maintain adequate security measures, do not require their sub-contractors to maintain adequate security measures, do not perform as anticipated and in accordance with contractual requirements, or become targets of cyber-attacks, we may experience operational difficulties and increased costs, which could materially and adversely affect our business.