In the ordinary course of our business, we collect and store sensitive data, including personal information, intellectual property and proprietary business information owned or controlled by ourselves or our employees, customers and other parties. We manage and maintain our applications and data utilizing a combination of on-site systems and cloud-based data centers. We utilize external security and infrastructure vendors to manage parts of our data centers. These applications and data encompass a wide variety of business-critical information, including research and development information, customer information, commercial information and business and financial information. We, like all companies storing business-critical information, face a number of risks relative to protecting this critical information, including loss of access, inappropriate use or disclosure, unauthorized access or exfiltration, inappropriate modification, inappropriate destruction, and the risk of our being unable to adequately monitor and audit and modify our controls over our critical information. This risk extends to the third-party vendors and subcontractors we use to manage this sensitive data or otherwise process it on our behalf. The secure processing, storage, maintenance and transmission of this critical information are vital to our operations and business strategy, and we devote significant resources to protecting such information. Although we take measures to protect sensitive data from unauthorized access, use or disclosure, our information technology and infrastructure may still be vulnerable to, and we have in the past experienced, attacks by hackers or viruses or breaches due to employee error, malfeasance or other malicious or inadvertent disruptions. Further, attacks upon information technology systems, including those involving system disrupting ransomware and digital extortion, fraudulent messages purporting to be from legitimate individuals or organizations in order to induce actions directed by bad actors, sometimes known as "phishing", and transmission of fraudulent invoices or other requests for payments by malicious organizations purporting to be legitimate vendors and suppliers, are increasing in their frequency, levels of persistence, sophistication and intensity, and are being conducted by sophisticated and organized groups and individuals with a wide range of motives, capabilities, and expertise. We may also face increased cybersecurity risks due to our reliance on internet technology and the number of our employees who are working remotely, which may create additional opportunities for cybercriminals to exploit vulnerabilities. Furthermore, because the techniques used to obtain unauthorized access to, or to sabotage, systems change frequently and often are not recognized until launched against a target, we may be unable to anticipate these techniques or implement adequate preventative measures. While we have measures in place to identify, detect and mitigate security threats and incidents, they are not failproof, so we may also experience security incidents that may remain undetected for an extended period. Any such incident could result in the compromise of our information systems, and the data stored there could be accessed, encrypted, corrupted, modified, publicly disclosed, lost or stolen. Any such incident could result in legal claims or proceedings, including for breaches of confidential information obligations with contractual counterparties, and liability under federal or state laws that protect the privacy of personal information, and regulatory penalties. Notice of breaches may be required to affected individuals,customers, or other state, federal or foreign regulators, and for extensive breaches, notice may need to be made to the media or State Attorneys General. Such a notice could harm our reputation and our ability to compete. Although we have implemented security measures to prevent, detect and respond to security incidents, our data is currently accessible through multiple channels, and there is no guarantee we can protect our data from breach. Unauthorized access to our information systems, and the loss, destruction or, dissemination of data stored within them could also disrupt or halt our operations and damage our reputation, any of which could adversely affect our business.