We may be vulnerable to failures of information systems or information security threats.

We have entered into agreements with third parties for hardware, software, telecommunications and other information technology (“IT”) services in connection with our operations. Our operations depend, in part, on how well we and our suppliers protect networks, equipment, IT systems and software against damage from a number of threats, including, but not limited to, cable cuts, damage to physical plants, natural disasters, terrorism, fire, power loss, hacking, computer viruses, vandalism and theft. Our operations also depend on the timely maintenance, upgrade and replacement of networks, equipment, IT systems and software, as well as pre-emptive expenses to mitigate the risks of failures. Any of these and other events could result in information system failures, delays and/or increase in capital expenses. The failure of information systems or a component of information systems could, depending on the nature of any such failure, adversely impact our reputation and results of operations. Although to date we have not experienced any material losses relating to cyber attacks or other information security breaches, there can be no assurance that we will not incur such losses in the future. Our risk and exposure to these matters cannot be fully mitigated because of, among other things, the evolving nature of these threats. As a result, cyber security and the continued development and enhancement of controls, processes and practices designed to protect systems, computers, software, data and networks from attack, damage or unauthorized access remain a priority. As cyber threats continue to evolve, we may be required to expend additional resources to continue to modify or enhance protective measures or to investigate and remediate any security vulnerabilities.