We rely on information technology systems, including the internet and networks and systems and software developed, maintained and controlled by third party vendors and other third parties, to process, transmit and store information and to manage or support our business processes. Third party vendors may collect and hold personally identifiable information and other confidential information of our tenants, prospective tenants and employees. We also maintain such information and financial and business information regarding us and persons and entities with which we do business on our information technology systems. While we take steps, and generally require third party vendors to take steps, to protect the security of the information maintained in our and third party vendors' information technology systems, including associate training and testing and the use of commercially available systems, software, tools and monitoring to provide security for processing, transmitting and storing of the information, it is possible that our or our third party vendors' security measures will not be able to prevent human error or the systems' or software's improper functioning, or the loss, misappropriation, disclosure or corruption of personally identifiable information or other confidential or sensitive information, including information about our tenants and employees. Cybersecurity breaches, including physical or electronic break-ins, computer viruses, malware, phishing scams, attacks by hackers, breaches due to employee error or misconduct, and similar breaches, can create system disruptions, shutdowns or unauthorized access to information maintained on our information technology systems or the information technology systems of our third party vendors or other third parties or otherwise cause disruption or negative impacts to occur to our business and adversely affect our financial condition and results of operations. While we maintain cyber risk insurance to provide some coverage for certain risks arising out of cybersecurity breaches, there is no assurance that such insurance would cover all or a significant portion of the costs or consequences associated with a cybersecurity breach or other occurrence or that such insurance will continue to be available at rates that we consider reasonable or at all. We have in the past experienced cybersecurity breaches on our information technology systems or relating to software or third party vendor systems that we utilize, and, while none to date have been material to us, we expect such breaches may occur in the future. As the techniques used to obtain unauthorized access to information technology systems become more varied and sophisticated and the occurrence of such breaches becomes more frequent, we and our third party vendors and other third parties may be unable to adequately anticipate these techniques or breaches or implement appropriate preventative measures. Any failure to prevent cybersecurity breaches and maintain the proper function, security and availability of our or our third party vendors' and other third parties' information technology systems could interrupt our operations, damage our reputation and brand, damage our competitive position, make it difficult for us to attract and retain residents or other tenants, and subject us to liability claims or regulatory penalties that could adversely affect our business, financial condition and results of operations.