To conduct business, we extensively rely on information and operational technology systems, and improvements in those technologies, in all aspects of our business. The threat landscape is vast and includes hobbyists, cybercriminals, nation-states and state-sponsored activities. Attacks from these entities include, but is not limited to, denial of service, unauthorized access, theft of money, and data and extortion. System upgrades, redundancy and other continuity measures may be ineffective or inadequate, and our business continuity and disaster recovery planning may not be sufficient for all eventualities. Regardless of the cause, significant disruption or failure of one or more of information or operational technology systems operated by us or under control of third parties, including computer hardware, software, cloud services and communications equipment, can result in us experiencing a service interruption, data breach, or other operational difficulties. Such failures or disruptions can adversely impact our business by, among other things, preventing intercompany communications and disrupting operations that may result in direct or indirect monetary losses, damage to equipment or property, or loss of confidence in corporate competency. These events could have a materially adverse effect on our business, reputation, results of operations and financial condition. Although we maintain comprehensive security programs designed to protect our information technology systems, including our risk-based approach to cybersecurity, our reliance on the Framework for Improving Critical Infrastructure Cybersecurity drafted by the U.S Department of Commerce's National Institute of Standards and Technology (NIST CSF) and our layered defense system, we are continually targeted by threat actors attempting to access our networks and we may be unable to detect or prevent a breach of our systems or disruption to our service in the future. While we have previously experienced technology outages and cybersecurity events that have impacted our systems and service, future events may result in more significant impacts to our operations, reputation or financial results. These potentially impactful future events could include service disruptions, unauthorized access to our systems, viruses, ransomware, and/or compromise, acquisition, or destruction of our data. We also could be impacted by cybersecurity events targeting third parties that we rely on for business operations, including third party vendors that have access to our systems or data and third parties who provide services and are in our supply chain. Such a direct or indirect cybersecurity incident could interrupt our service, cause safety failures or operational difficulties, decrease revenues, increase operating costs, impact our efficiency, damage our corporate reputation, and/or expose us to litigation or government action or increased regulation, which could result in penalties, fines or judgments. In addition, our failure to comply with or adhere to privacy-related or data protection laws and regulations could result in government investigations and proceedings against us, or litigation, resulting in adverse reputational impacts, penalties, and legal liability.