We rely extensively on internally and externally hosted computer systems to process transactions, manage the privacy and security of data, including customer data, and operate our business. Critical components of our systems are dependent upon third-party providers and a significant portion of our business operations are conducted over the internet. These systems, as well as our other information technology systems and our networks are subject to system security risks, cybersecurity breaches, outages, disruptions, including disruptions that result in our and our customers' loss of access to our information systems, and other risks. These could include malware, ransomware, and cybersecurity attacks, attempts to gain unauthorized access to our data and computer systems or steal confidential information, including credit card information from our customers, or they could include breaches due to error, malfeasance or other disruptions of employees, independent contractors or consultants. Even if we are not targeted directly, cybersecurity attacks on other entities and institutions, including our customers, vendors, or other third parties with whom we do business, may occur and such events could impact our systems and networks, and disrupt our normal business operations. Attacks can be both individual or highly organized attempts by very sophisticated hacking organizations. We employ a number of measures to prevent, detect and mitigate these threats, but these measures may not be sufficient to mitigate all related risks. While we continue to improve our cybersecurity and take measures to protect our business, it may not always be possible to anticipate, detect, or recognize threats to our systems, to implement effective preventive measures, nor to ensure that our financial results will not be negatively impacted by such an incident. The extent of a particular cybersecurity attack and the steps that we may need to take to investigate the attack also may not be immediately clear. A cybersecurity incident could compromise the confidential information of our employees, customers and vendors to the extent such information exists on our systems or on the systems of third-party providers. Information and data maintained in digital form are subject to the risks of unauthorized access, modification, exfiltration, destruction or denial of access. Any compromise of our security could result in a violation of applicable privacy, information security, and other laws, which continue to evolve and may be inconsistent from one jurisdiction to another, and could result in potential liability, damage our reputation, disrupt and affect our business operations and result in lawsuits against us. Furthermore, we may not be able to recover these expenses from our service providers, responsible parties, or insurance carriers, the amount of which could be significant. In addition, cybersecurity is an issue that is becoming increasingly regulated. As regulations take effect or evolve it is possible we may encounter issues being fully compliant with these legal standards which could result in material adverse effects on our business.