We rely extensively on information technology systems to manage and operate our business, some of which are managed or accessible by third parties. The security and functionality of these information technology systems, and the processing of data by these systems, are critical to our business operations. If these systems, or any part of the systems, are damaged, intruded upon, attacked, shutdown or cease to function properly (whether by planned upgrades, force majeure, telecommunications failures, criminal acts, including hardware or software break-ins or extortion attempts, or viruses, or other cybersecurity incidents) and we suffer any resulting interruption in our ability to manage and operate our business or if our products are affected, our results of operations and financial condition could be materially adversely affected. There can be no guarantee that the actions and controls we have implemented and are implementing, or which we cause or have caused third-parties with access to our systems to implement, will be sufficient to protect and mitigate risks associated with our information technology systems. Additionally, certain of our employees working remotely at times and the increased adoption of generative artificial intelligence may increase our vulnerability to cyber and data protection risks. In addition to existing risks, any adoption or deployment of or exposure to new technologies via acquisitions or internal initiatives or changes to our information technology systems as a result of divestitures may increase our exposure to risks, breaches, or failures, which could materially adversely affect our results of operations or financial condition. Furthermore, the Company has access to sensitive, confidential, or personal data or information that is subject to privacy and security laws, regulations, or other contractually-imposed controls. Despite our use of reasonable and appropriate controls, security breaches, theft, misplaced, lost or corrupted data, programming, or employee errors and/or malfeasance have led and could in the future lead to the compromise or improper use of such sensitive, confidential, or personal data or information. Such events may result in possible negative consequences, such as fines, ransom demands, penalties, failure to comply with laws governing sensitive data, loss of reputation, intellectual property, competitiveness or customers, increased security and compliance costs or other negative consequences. Further, the amount of insurance coverage that we maintain may be inadequate to cover claims or liabilities relating to a cybersecurity incident. Depending on the nature and magnitude of these events, they may have an adverse impact on our results of operations or financial condition.