. . . " If one or more of these events occurs, it could potentially jeopardize the confidential, proprietary and other information processed and stored in, and" . . . .