Businesses have become increasingly dependent on digital technologies to conduct day-to-day operations. At the same time, cyber incidents, including deliberate attacks or unintentional events, have increased. A cyber-attack could include gaining unauthorized access to digital systems for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruption or result in denial of service on websites. We depend on digital technology, including information systems and related infrastructure, to process and record financial and operating data, and communicate with our employees and business partners. Our technologies, systems, networks, and those of our business partners may become the target of cyber-attacks or information security breaches that could result in the unauthorized release, gathering, monitoring, misuse, loss or destruction of proprietary and other information, or other disruption of our business operations. The consequences of such loss, possible misuse of our proprietary and confidential information, or operational disruptions could include, among other things, unfavorable publicity, damage to our reputation, difficulty marketing our products, customer allegations of breach-of-contract, claims and litigation by affected parties, investigations by and other proceedings involving governmental authorities and possible financial liabilities for damages, any of which could materially adversely affect our business, financial condition, reputation and relationships with customers and partners. We also rely on a number of third-party service providers to host, store or otherwise process information for us, or to provide other facilities or infrastructure that we make use of, including "cloud-based" providers of corporate infrastructure services relating to, among other things, human resources, electronic communication services and some financial functions, and we are therefore dependent on the security systems of these providers. Any security breaches or incidents or other unauthorized access to, or disruptions of, our service-providers' systems or viruses, loggers, ransomware or other malfeasant code in their data or software, or unauthorized access to or acquisition of any data they process or otherwise maintain for us could expose us to information loss, corruption and unavailability, operational disruptions, and misappropriation of confidential information, and could have similar consequences to us as any incidents affecting our own systems or the data we process or maintain. We and our third parties face these threats from a variety of sources, including attacks from hackers, phishing and other forms of social engineering, and human error or employee or contractor malfeasance. Because the techniques used to obtain unauthorized access to or sabotage security systems change frequently and are often not recognized until after an attack, we and our third-party service providers may be unable to anticipate the techniques or implement adequate preventative measures, thereby exposing us to material adverse effects on our business, financial condition, results of operations and growth prospects. A security breach or other security incident impacting us or our third-party service providers could require a substantial level of financial resources to rectify and otherwise respond to, may be difficult to identify or address in a timely manner, and could result in claims, investigations, and inquires by private parties or governmental entities that may divert management's attention and require the expenditure of significant time and resources, and which may cause us to incur substantial fines, penalties, or other liability and related legal and other costs. Any actual or perceived security breach or other security incident may also harm our reputation and market position. Any of the foregoing matters could harm our operating results and financial condition. Although to-date we have not experienced any losses relating to cyber-attacks, there is no assurance that we will not suffer such losses in the future. As cyber threats continue to evolve, we may be required to expend significant additional resources to continue to modify or enhance our protective measures or to investigate and remediate any information security vulnerabilities.