The Trustee maintains robust cybersecurity protocols including, but not limited to technological capabilities that prevent and detect disruptions; computer workstations and programs protected with passwords and passphrases, as well as employee training throughout the year on financial regulations and cybersecurity followed up by testing of that knowledge. Other, non-technical protocols include securing of documents and work areas that could contain personal, non-public information and independent verification of information changes by outside vendors. If the measures taken to protect against cybersecurity disruptions prove to be insufficient or if proprietary data is otherwise not protected, the Trustee or customers, employees, or third parties could be adversely affected. The Trust is also exposed to potential harm from cybersecurity events that may affect the operations of third-parties, including suppliers, service providers (including providers of cloud-hosting services for our data or applications), and customers. Cybersecurity disruptions could cause physical harm to people or the environment; damage or destroy assets; compromise business systems; result in proprietary information being altered, lost, or stolen; result in employee, customer, or third-party information being compromised; or otherwise disrupt business operations. The Trust could incur significant costs to remedy the effects of a major cybersecurity disruption in addition to costs in connection with resulting regulatory actions, litigation, or reputational harm.