"Despite the implementation of security measures, our internal computer systems and those of our CROs and other contractors and consultants are vulnerable to damage from computer viruses, unauthorized" . . . . .