We rely on cloud-based software to provide the functionality necessary to operate our company, utilizing what is known as "software as a service" ("SaaS"). SaaS allows users like us to connect to and use cloud-based applications over the Internet, such as email, calendaring, and office tools. SaaS provides us with a complete software solution that we purchase on a subscription basis from a cloud service provider. Despite our efforts to protect confidential and sensitive information from unauthorized disclosure across all our platforms, and similar efforts by our cloud service provider(s) and our other third-party contractors, consultants, and vendors, whether information technology ("IT") providers or otherwise, including but not limited to law firms accountants, and government regulators, this information, and the systems used to store and transmit it, are vulnerable to damage from computer viruses, unauthorized access, computer hacking or breaches, natural disasters, epidemics and pandemics, terrorism, war, labor unrest, and telecommunication and electrical failures. The risk of a security breach or disruption, particularly through cyber-attacks or cyber-intrusion, or other illegal acts, including by computer hackers, foreign governments, and cyber-terrorists, has generally increased as the number, intensity, and sophistication of attempted attacks and intrusions from around the world have increased. Other emerging threats we face include: phishing, account takeover attacks, data breach or theft (no matter where the data are stored), loss of control, especially in SaaS applications, over which users have access to what data and level of access, new malware, zero-day threats, and threats within our own organization. In addition, malicious cyber actors may increase malware and ransom campaigns and phishing emails targeting teleworkers as well as company systems, global conflicts like with Ukraine, Israel, and the broader Middle East, or other world trends and events, which exposes us to additional cybersecurity risks, or may try to illegally obtain material inside information to manipulate our stock price. If such an event were to occur and cause interruptions in our operations, or substantial manipulation of our stock price, it could result in a material disruption of our business operations. In addition, since we have sponsored clinical trials, any breach that compromises patient data and identities, thereby causing a breach of privacy, could generate significant reputational damage and legal liabilities and costs to recover and repair. For example, the loss or theft of clinical trial data from completed clinical trials could result in stock manipulation and significantly increase our costs to recover or reproduce the data. To the extent that any disruption or security breach were to result in a loss of, or damage to, our data or applications or inappropriate disclosure of confidential or proprietary information, we could incur liability or suffer from stock price volatility or decline.