The Company experiences numerous attacks on its computer systems, software, networks and other technology assets daily, and the number of attacks is increasing. Although the Company devotes significant resources to maintain and regularly upgrade its systems and processes that are designed to protect the security of the Company’s computer systems, software, networks and other technology assets, as well as its intellectual property, and to protect the confidentiality, integrity and availability of information belonging to the Company and its customers, the Company’s security measures may not be effective. Adversaries continue to develop more sophisticated cyber attacks that could impact the Company. Many banking institutions, retailers and other companies engaged in data processing, including software and information technology service providers, have reported breaches in the security of their websites or other systems, some of which have involved sophisticated and targeted attacks intended to obtain unauthorized access to confidential information, destroy data, disable or degrade service, or sabotage systems, often through the introduction of computer viruses or malware, cyber attacks and other means. Attacks on financial or other institutions important to the overall functioning of the financial system could also adversely affect, directly or indirectly, aspects of the Company’s businesses. The increasing consolidation, interdependence and complexity of financial entities and technology systems increases the risk of operational failure, both for the Company and on an industry-wide basis, and means that a technology failure, cyber attack, or other information or security breach that significantly degrades, deletes or compromises the systems or data of one or more financial entities could materially affect counterparties or other market participants, including the Company. Third parties that facilitate the Company’s business activities, including exchanges, clearinghouses, payment and ATM networks, financial intermediaries or vendors that provide services or technology solutions for the Company’s operations, could also be sources of operational and security risks to the Company, including with respect to breakdowns or failures of their systems, misconduct by their employees or cyber attacks that could affect their ability to deliver a product or service to the Company or result in lost or compromised information of the Company or its customers. The Company’s ability to implement back-up systems or other safeguards with respect to third-party systems is limited. Furthermore, an attack on or failure of a third-party system may not be revealed to the Company in a timely manner, which could compromise the Company’s ability to respond effectively. Some of these third parties may engage vendors of their own, which introduces the risk that these “fourth parties” could be the source of operational and security failures. In addition, if a third party or fourth party obtains access to the customer account data on the Company’s systems, and that party experiences a breach or misappropriates such data, the Company and its customers could suffer material harm, including heightened risk of fraudulent transactions, losses from fraudulent transactions, increased operational costs to remediate any security breach and reputational harm. These risks are expected to continue to increase as the Company expands its interconnectivity with its customers and other third parties. During the past several years a number of retailers and hospitality companies have disclosed substantial cyber security breaches affecting debit and credit card accounts of their customers, some of whom were the Company’s cardholders and who may experience fraud on their card accounts as a result of a breach. The Company might suffer losses associated with reimbursing its customers for such fraudulent transactions, as well as for other costs related to data security compromise events, such as replacing cards associated with compromised card accounts. These attacks involving Company cards are likely to continue and could, individually or in the aggregate, have a material adverse effect on the Company’s financial condition or results of operations. It is possible that the Company may not be able to anticipate or to implement effective preventive measures against all security breaches of these types, because the techniques used change frequently, generally increase in sophistication, often are not recognized until launched, sometimes go undetected even when successful, and originate from a wide variety of sources, including organized crime, hackers, terrorists, activists, hostile foreign governments and other external parties. Those parties may also attempt to fraudulently induce employees, customers or other users of the Company’s systems to disclose sensitive information to gain access to the Company’s data or that of its customers or clients, such as through “phishing” and other “social engineering” schemes. Other types of attacks may include computer viruses, malicious or destructive code, denial-of-service attacks, ransomware or ransom demands. During the COVID-19 pandemic, the Company has experienced increased information security risks, primarily as a result of the increase in work-from-home arrangements. These risks may increase in the future as the Company continues to increase its mobile and internet-based product offerings and expands its internal usage of web-based products and applications, which is expected to remain elevated at least as long as the COVID-19 pandemic continues. In addition, the Company’s customers often use their own devices, such as computers, smart phones and tablet computers, to make payments and manage their accounts, and are subject to “phishing” and other attempts from cyber criminals to compromise or deny access to their accounts. The Company has limited ability to assure the safety and security of its customers’ transactions with the Company to the extent they are using their own devices, which have been, and likely will continue to be, subject to such threats. In the event that the Company’s physical or cyber security systems are penetrated or circumvented, or an authorized user intentionally or unintentionally removes, loses or destroys operations data, serious negative consequences for the Company can follow, including significant disruption of the Company’s operations, misappropriation of confidential Company and/or customer information, or damage to the Company’s or customers’ or counterparties’ computers or systems. These consequences could result in violations of applicable privacy and other laws; financial loss to the Company or to its customers; loss of confidence in the Company’s security measures; customer dissatisfaction; significant litigation exposure; regulatory fines, penalties or intervention; reimbursement or other compensatory costs (including the costs of credit monitoring services); additional compliance costs; and harm to the Company’s reputation, all of which could adversely affect the Company. Because the investigation of any information security breach is inherently unpredictable and would require substantial time to complete, the Company may not be able to quickly remediate the consequences of any breach, which may increase the costs, and enhance the negative consequences associated with a breach. In addition, to the extent the Company’s insurance covers aspects of any breach, such insurance may not be sufficient to cover all of the Company’s losses.