We rely on information technology ("IT") systems, including third-party "cloud based" service providers, to keep financial records, maintain product support data, and corporate records, to communicate with staff and external parties and to operate other critical functions. This includes critical systems such as email, other communication tools, electronic document repositories and archives. If any of these third-party information technology providers experience security breaches or incidents due to computer viruses, unauthorized access, malware, ransomware, natural disasters, fire, terrorism, war, telecommunication failures, electrical failures, cyber-attacks or cyber-intrusions over the internet, then sensitive data, including personal information, trade secrets, and confidential business information could be compromised, exposed, or deleted. Similarly, we could incur business disruption if our access to the internet is compromised, and we are unable to connect with third-party IT providers. The risk of a security breach or disruption, particularly through cyber-attacks or cyber intrusion, including by computer hackers, foreign governments and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. To the extent that any disruption or security breach results in a loss of or damage to our data or applications, or inappropriate disclosure of confidential or proprietary information, we could incur liability and delay of our product development and support efforts.