. . "technology systems and networks, including customer, personnel and vendor data, could damage our reputation and require us to expend significant capital and other resources to remedy any such security breach." . .