Although we take protective measures and endeavor to modify them as circumstances warrant, the security of our computer systems, software and networks may be vulnerable to breaches, unauthorized access, misuse, computer viruses or other malicious code and other events that could have a security impact.