We are increasingly dependent upon automated information technology processes and Internet commerce, and many of our tenants come from the telephone or over the Internet. Moreover, the nature of our business involves the receipt and retention of certain personal information about such tenants, including personally identifiable information of our prospective and current customers and our employees. We centrally manage significant components of our operations with our computer systems, including our financial information and in many cases, we also rely significantly on third-party vendors to retain data, process transactions and provide other systems services. Our networks and operations could be disrupted, and sensitive data could be compromised, by physical or electronic security breaches, targeted against us, our vendors or other organizations, including financial markets or institutions, including by way of or through cyber-attacks or cyber-intrusions over the Internet, malware, ransomware, computer viruses, attachments to e-mails, phishing, employee theft or misuse, or inadequate security controls. Such incidents could also result in significant costs to repair or replace such networks or information systems or to comply with notification obligations, as well as actual monetary losses in case of a cybersecurity incident that resulted in fraudulent payments or other cash transactions. Our operations could be severely impacted by a natural disaster, terrorist attack, attack by hackers, acts of vandalism, data theft, misplaced or lost data, programming or human error, or other circumstances that result in a significant outage of our systems or those of our third party providers, despite our use of back up and redundancy measures. While we may be entitled to damages if our third-party providers fail to satisfy their security-related obligations to us, any award may be insufficient to cover our damages, or we may be unable to recover such award. Although we make efforts to protect the security and integrity of our networks and systems, there can be no assurance that these efforts and measures will be effective or that attempted security breaches or disruptions would not be successful, as such attacks and breaches may be difficult to detect (or not detected at all) and are becoming more sophisticated. In such event, we may experience business interruptions; data loss, ransom, misappropriation, or corruption; theft or misuse of confidential or proprietary information; or litigation and investigation by tenants, governmental or regulatory agencies, or other third parties, which could result in the payment of fines, penalties and other damages. Such events could also have other adverse impacts on us, including breaches of debt covenants, other contractual or REIT compliance obligations, or late or misstated financial reports, and significant diversion of management attention and resources. As a result, such events could have a material adverse effect on our financial condition, results of operations and cash flows and harm our business reputation.