– As with all enterprise information systems, our information technology systems and systems operated by our vendors and third parties could be penetrated by outside parties' intent on observing or gathering information, extracting information, corrupting information, deploying ransomware, or disrupting business processes. Remote and other work arrangements may leave the Company more vulnerable to a cyberattack. Our systems and those of our vendors and third parties have in the past been, and will likely be in the future, subject to unauthorized access attempts. Implementing system updates or security patches in an untimely manner could leave our company exposed to security breaches. Unauthorized access to our networks or systems could disrupt our business operations and potentially result in failures or interruptions in our information systems, lockouts due to ransomware, or in the loss of assets and could have a material adverse effect on our business, financial condition or results of operations. We engage in response planning, simulations, trainings, tabletop exercises, and other efforts to mitigate risks associated with cybersecurity. Breaches of our security measures or the accidental loss, inadvertent disclosure, or unapproved dissemination of proprietary, sensitive, confidential or personal information about the Company, our employees, our vendors, or our customers, could result in litigation, violations of applicable data privacy regulations, and liability for the Company. We have not experienced a significant or material impact from these events to date and we may need to expend significant resources to maintain or continue to mature our protective and preventative measures to stay abreast of the ever-changing cybersecurity threat landscape. We maintain a multifaceted cybersecurity program designed to identify, protect, detect, respond, and recover from a cybersecurity event. We ensure that the program is aligned with the National Institute of Standards and Technology ("NIST") Cybersecurity Framework. While we have taken measures to assess the requirements of, and to comply with the rapidly growing cybersecurity and data privacy regulations in multiple jurisdictions, these measures may be challenged by authorities that regulate cybersecurity and privacy-related compliance. We could incur significant expense in facilitating and responding to investigations and if the measures we have taken prove to be inadequate, we could face fines or penalties. This could damage our reputation, or otherwise harm our business, financial condition, or results of operations.