We are dependent upon information technology systems in the conduct of our operations. Our information technology systems are subject to disruption, damage or failure from a variety of sources, including, without limitation, computer viruses, security breaches, cyber-attacks, natural disasters and defects in design. Cybersecurity incidents, in particular, are evolving and include, but are not limited to, malicious software, attempts to gain unauthorized access to data and other electronic security breaches that could lead to disruptions in systems, theft of assets, unauthorized release of confidential or otherwise protected information and the corruption of data. Various measures have been implemented to manage our risks related to information technology systems and network disruptions. However, given the unpredictability of the timing, nature and scope of information technology disruptions, we could potentially be subject to operational delays, the compromising of confidential or otherwise protected information, loss of assets, including our cash, short-term investments, or marketable equity securities, destruction or corruption of data, security breaches, other manipulation or improper use of our systems and networks or financial losses from remedial actions, any of which could have a material adverse effect on our cash flows, competitive position, financial condition or results of operations.