Our business has become increasingly dependent upon information technologies, computer systems and networks, including those maintained by us and those maintained and provided to us by third parties (for example, "software-as-a-service" and cloud solutions), to conduct day-to-day operations, and we are placing greater reliance on information technology to help support our operations and increase efficiency in our business functions. We are dependent upon our information technology and infrastructure, including operational and financial computer systems, to process the data necessary to conduct almost all aspects of our business. Computer, telecommunications and other business facilities and systems could become unavailable or impaired from a variety of causes including, among others, storms and other natural disasters, terrorist or hacker attacks, the introduction of malicious computer viruses, ransomware, utility outages, theft, design defects, insider risk, human error or complications encountered as existing systems are maintained, repaired, replaced or upgraded. It has been reported that known or unknown entities or groups have mounted so-called "cyber-attacks" on businesses and other organizations solely to disable or disrupt computer systems, disrupt operations and, in some cases, steal data. In addition, the U.S. government has issued public warnings that indicate that energy assets might be specific targets of cybersecurity threats. Cybersecurity risks and threats continue to grow and may be difficult to anticipate, prevent, discover or mitigate. A breach, failure or circumvention of our computer systems or networks, or those of our customers, vendors or others with whom we do business, including by ransomware or other attacks, could materially disrupt our business operations and our customers' operations and could result in the alteration, loss, theft or corruption of data, and unauthorized release of, unauthorized access to, or our loss of access to confidential, proprietary, sensitive or other critical data or systems concerning our company, business activities, employees, customers or vendors. As of the date of this report, many of our non-operational employees, including employees at our corporate headquarters, have a hybrid work arrangement, working both in the office and remotely, which increases various logistical challenges, inefficiencies and operational risks. Working remotely has significantly increased the use of remote networking and online conferencing services that enable employees to work outside of our corporate infrastructure and, in some cases, use their own personal devices. This "remote work" model has resulted in increased demand for information technology resources and may expose us to risk of security breaches or other cyber-incidents or attacks, loss of data, fraud and other disruptions as a consequence of more employees accessing sensitive and critical information from remote locations. Any such breach, failure or circumvention could result in loss of customers, financial losses, regulatory fines, substantial damage to property, bodily injury or loss of life, or misuse or corruption of critical data and proprietary information, could subject us to significant liabilities and could have a material adverse effect on our operations, financial condition, business or reputation. Further, as cyber incidents continue to evolve, we may be required to incur additional costs to continue to modify or enhance our protective measures or to investigate or remediate the effects of cyber incidents.