We are dependent on information technology networks and systems, including the Internet, to process, transmit and store electronic information, and, in the normal course of our business, we collect and retain certain types of personally identifiable and other information pertaining to our customers, stockholders and employees. The legal, regulatory and contractual environment surrounding information security and privacy is constantly evolving and companies that collect and retain such information are under increasing attack by cyber-criminals around the world. A theft, loss, fraudulent use or misuse of customer, vendor, employee or our proprietary data by cybercrime or otherwise, non-compliance with our contractual or other legal obligations regarding such data or a violation of our privacy and security policies with respect to such data could adversely impact our reputation and could result in costs, fines, litigation or regulatory action against us. Security breaches can create system disruptions and shutdowns that could result in disruptions to our operations. We cannot be certain that advances in criminal capabilities, new vulnerabilities or other developments will not compromise or breach the security solutions protecting our information technology, networks and systems. A cyber-attack on our information systems technology or those of our partners, vendors, or suppliers could adversely affect our ability to process orders, maintain proper levels of inventory, collect accounts receivable and pay expenses, all of which could have an adverse effect on our results of operations, financial condition and cash flows. Failure to effectively prevent, detect and recover from security breaches, including attacks on information technology and infrastructure by hackers; viruses; breaches due to employee error or actions; or other disruptions could seriously harm our operations as well as the operations of our customers and suppliers. Such serious harm can involve, among other things, misuse of our assets, business disruptions, loss of data, unauthorized access to trade secrets and confidential business information, unauthorized access to personal information, legal claims or proceedings, reporting errors, processing inefficiencies, negative media attention, reputational harm, loss of sales, remediation and increased insurance costs, and interference with regulatory compliance. We have experienced and expect to continue to experience some of these types of cybersecurity threats and incidents, which could be material in the future.