We rely on information technology networks and systems, including the Internet and cloud services, many of which are managed by third parties, to securely process, transmit and store electronic information of financial, marketing, legal and regulatory nature to manage our business processes and activities. Although we have implemented enhanced controls around our information technology systems, these systems may be susceptible to damage, disruptions or shutdowns due to failures during the process of upgrading or replacing software, databases, power outages, hardware failures, telecommunication failures, user errors, natural disasters, terrorist attacks or other catastrophic events. If any of our significant information technology systems suffer severe damage, disruption or shutdown, and our disaster recovery and business continuity plans do not effectively resolve the issues in a timely manner, our product sales, financial condition and results of operations may be materially and adversely affected, and we could experience delays in reporting our financial results, or our operations may be disrupted, exposing us to performance failures with customers. In addition, cybersecurity threats, such as computer viruses, attacks by computer hackers or other cybersecurity threats pose a risk to the security of our systems and networks and the confidentiality, availability and integrity of our data. There can be no assurance that our security controls and safeguard measures taken to improve our cybersecurity protection will be sufficient to mitigate all potential risks to our systems, networks and data. Potential consequences of a cybersecurity attack include disruption to systems, corruption of data, unauthorized release of confidential or otherwise protected information, reputational damage, and litigation with third parties. The amount of insurance coverage we maintain may be inadequate to cover claims or liabilities related to a cybersecurity attack.