Despite the implementation of security measures, this infrastructure or other systems that we interface with, including the Internet and related systems, may be vulnerable to physical break-ins, hackers, improper employee or contractor access, computer viruses, programming errors, attacks by third parties or similar disruptive problems.