Despite the implementation of security measures, our infrastructure or other systems that we interface with, including the Internet, may be vulnerable to physical break-ins, hackers, improper employee or contractor access, computer viruses, programming errors, attacks by third parties or similar disruptive problems.