We rely on the proper functioning and availability of our information technology systems, some of which are dependent on services provided by third parties, in operating our business. It is important that the data processed by these systems remains confidential, as it often includes sensitive information relating to our business, customers, employees, and vendors. As with most companies, we are subject to attempted cybersecurity disruptions and intrusions, and we expect such attempts to continue. At times, certain of our vendors have suffered cybersecurity breaches. These incidents have not had a material adverse impact on our operations, and, to date, the Company has not experienced a material information security breach itself. However, failure to prevent or mitigate data loss or system intrusions from cybersecurity attacks or other security breaches could expose us, our vendors, or our customers to a risk of loss or misuse of such information, adversely affect our operating and financial results, restrict or prevent operations or financial reporting, result in litigation, potential liability, or regulatory risk and otherwise harm our business. Likewise, data privacy breaches from our systems could expose personally identifiable information of our employees or contractors, sensitive customer data, or vendor data to unauthorized persons, adversely impacting our customer service, employee relationships, and our reputation. Information technology security threats to network and data security are increasing in frequency and sophistication, and cyberattacks pose a risk to the security of our information technology systems, including those of third-party service providers with whom we have contracted, as well as the confidentiality, integrity, and availability of the data stored on those systems. We maintain an information security program, which consists of safeguards, procedures, and controls to mitigate such risks. Our information systems are protected through physical and software safeguards as well as backup systems considered appropriate by management. However, there can be no guarantee that we, or third-party service providers with whom we have contracted, will be able to prevent or mitigate all such data breaches or cyberattacks. While we have significant security processes and initiatives in place, we may be unable to fully detect, mitigate or protect against a material breach or disruption in the future. In addition, regulatory authorities have increased their focus on how companies collect, process, use, store, share, and transmit personal data. Data we collect, store, and process is subject to a variety of U.S. and international laws and regulations. Any breach in our information technology security systems that results in the disclosure or misuse of sensitive or confidential information or any failure to comply with data privacy laws and regulations could result in significant penalties, fines, legal liability, and reputational harm. Further, we may incur large expenditures to investigate or remediate the impacts of such breaches, to recover data, to repair or replace networks or information systems, or to protect against similar future events.