In the normal course of business, we and our service providers collect and retain certain personal information provided by our tenants, employees of our Administrator and Adviser, and vendors. We also rely extensively on computer systems to process transactions and manage our business. Despite careful security and controls design, implementation, updating, and independent third-party verification, our information technology systems, and those of our third-party providers, could become subject to cybersecurity incidents. A cybersecurity incident is defined by the SEC as an unauthorized occurrence, or a series of related unauthorized occurrences, on or conducted through our information systems that jeopardize the confidentiality, integrity, or availability of our information resources or any information residing therein. A cybersecurity incident may be an intentional attack or an unintentional event and could involve gaining unauthorized access to our information systems or those of our third-party providers for purposes of misappropriating assets, stealing confidential information, corrupting data, or causing operational disruption. The result of a cybersecurity incident may include disrupted operations, misstated or unreliable financial data, liability for stolen assets or information, increased cybersecurity protection and insurance costs, litigation, and damage to our business relationships. As our reliance on technology has increased, so have the risks posed to our information systems, both internal and those provided to us by third-party service providers. In addition, cybersecurity threats such as those noted above have increased in recent years in part due to increasingly numerous and sophisticated malicious cyber actors. We have implemented processes, procedures, and internal controls to help prevent, detect, and mitigate cybersecurity threats and cyber intrusions, but these measures, as well as our increased awareness of the nature and extent of a threat of a cyber-incident, do not guarantee that a cyber-incident will not occur, will be timely detected, or that our financial results, operations, or confidential information will not be negatively impacted by such an incident. The development and maintenance of these measures are also costly and require ongoing monitoring, testing, and updating as technologies and processes change and efforts to overcome cybersecurity measures become increasingly sophisticated.