We and our operators rely on information systems to process, transmit, and store financial transactions and records, operator and lease data, and other confidential information. We are not aware of any material losses to our business or results of operations due to information system failures, data breaches, or cybersecurity incidents. However, information systems are vulnerable to threats, failures, breaches, or incidents due to improper functioning and unauthorized access from physical or electronic break-ins, computer viruses, and similar disruptions, including by hackers, foreign governments, and cyber terrorists. This risk has increased since the outbreak of the COVID-19 pandemic as we and our operators have increased reliance on information technology. We and our operators also rely on numerous third-party providers for information technology services, and we and our operators face similar risks relating to these providers. We cannot be certain that their information system and cybersecurity protocols are sufficient to withstand a data breach or cybersecurity incident. The inability to maintain proper function, security, and availability of our and our operators' information systems and the data maintained in those systems could interrupt our operations, damage our reputation, harm our business relationships, or increase our information systems, cybersecurity and insurance costs. Further, an information system or cybersecurity threat, failure, data breach, or incident on an operator could impact their operations and ability to perform under the terms of their lease with us. While we maintain insurance coverage that may, subject to policy terms and conditions including deductibles, cover specific aspects of information system and cybersecurity risks, such insurance coverage may be insufficient to cover all losses. As information system and cybersecurity risks continue to evolve, we may be required to expend additional resources to continue to enhance our information system and cybersecurity measures and to investigate and remediate any information system and cybersecurity vulnerabilities.