"Our operations rely on the secure processing, storage and transmission of confidential and other information in our computer systems and the systems of third parties with which we do business or that" . . . . .