We rely extensively on internally and externally hosted computer systems to process transactions, manage the privacy and security of data, including customer data, and operate our business. Critical components of our systems are dependent upon third-party providers and a significant portion of our business operations are conducted over the internet. These systems, as well as our other information technology systems and our networks are subject to system security risks, cybersecurity breaches, outages, disruptions, including disruptions that result in our and our customers' loss of access to our information systems, and other risks. Such risks could include viruses, malware, ransomware, denial-of-service attacks, and cybersecurity attacks, attempts to gain unauthorized access to our data and computer systems or steal confidential information, including credit card information from our customers, or they could include breaches due to error, phishing scams, malfeasance or other disruptions of employees, independent contractors or consultants, that could have a materially adverse impact on business strategy, results of operations, or financial condition. Third-party and supply chain attacks have increased in frequency and severity, and we cannot guarantee that the security of our service providers or any of their partners has not been compromised and our ability to require, monitor and enforce these third parties' information security practices is limited. We also cannot be certain that our contracts with these third parties will allow us to obtain indemnification or recovery from them for data security-related liability that they cause us to incur. Thus, even if we are not targeted directly, cybersecurity attacks on other entities and institutions, including our customers, vendors, or other third parties with whom we do business, may occur and such events could impact our systems and networks, and have a materially adverse impact on our business strategy, results of operations, or financial condition. Attacks can be both individual or highly organized attempts by very sophisticated hacking organizations or nation-state actors. New technologies, such as artificial intelligence, and the increased sophistication and activities of perpetrators of cybersecurity attacks may further increase the frequency and severity of security incidents. We employ a number of measures to prevent, detect and mitigate these threats, but these measures may not be sufficient to mitigate all related risks. While we continue to improve our cybersecurity and take measures to protect our business, it may not always be possible to anticipate, detect, or recognize threats to our systems, to implement effective preventive measures, nor to ensure that our financial results will not be negatively impacted by such an incident. The extent of a particular cybersecurity attack and the steps that we may need to take to investigate the attack also may not be immediately clear. A cybersecurity incident could compromise the confidential information of our employees, customers and vendors to the extent such information exists on our systems or on the systems of third-party providers. Information and data maintained in digital form are subject to the risks of unauthorized access, modification, exfiltration, destruction or denial of access. Cybersecurity is an issue that is becoming increasingly regulated. As regulations take effect or evolve it is possible we may encounter issues being fully compliant with these legal standards. Any compromise of our security could result in a violation of applicable privacy, information security, and other laws, which continue to evolve and may be inconsistent from one jurisdiction to another, and such a violation of, or a failure to comply with, applicable laws could have a materially adverse impact on our business strategy, results of operations, or financial condition.