Further, these activities could result in security breaches, such as misappropriation, misuse, leakage, falsification or accidental release or loss of information maintained in our information technology systems and networks, including customer, personnel and vendor data.