In addition, although we take protective measures and endeavor to modify them as circumstances warrant, our information technology hardware and software infrastructure may be vulnerable to unauthorized access, misuse, computer viruses or other malicious code and other events that could have a security impact.