We rely on information technology systems, some of which are managed by third parties, to process, transmit, and store information and manage or support a variety of business processes and activities. We also collect and store certain data, including proprietary business information and customer and employee data. Despite our cybersecurity measures, our information technology networks and infrastructure may be vulnerable to damage, disruptions, or shutdowns due to attack by hackers or breaches, employee error or malfeasance, power outages, computer viruses, telecommunication or utility failures, systems failures, natural disasters, or other catastrophic events, which could result in legal claims or proceedings, liability or penalties under privacy laws, disruption in operations, and damage to our reputation, which could materially adversely affect our business.