. . . "It is possible that advances in computer capabilities, new discoveries, undetected fraud, inadvertent violations of company policies or procedures or other developments could result in a compromise of information or a breach of the" .