We collect, receive, store, process, generate, use, transfer, disclose, make accessible, protect, secure, dispose of and share personal, confidential and proprietary information and other information (collectively, sensitive information) necessary to provide our services, to operate our business, for legal and marketing purposes, and for other business-related purposes.
Our platform and products involve the storage and transmission of data, including personal information, and security breaches or unauthorized access to our platform and products, or those of the third-parties with whom we work, could result in the unauthorized, unlawful, or accidental acquisition, modification, destruction, loss, alteration, encryption, disclosure of, or access to sensitive information including our customers' data. Consequently, we may be subject to significant litigation, indemnity obligations, fines, penalties, disputes, investigations and other liabilities. We have previously and may in the future become the target of cyber-attacks by third parties, including without limitation nation-state actors, seeking to gain unauthorized access to and exfiltrate our or our customers' data, including confidential and personal information, or to disrupt our ability to provide our services. In addition, many of our employees work remotely and utilize network connections, computers and devices outside our premises or network, which may pose additional data security risks (including, for example, the increasing number of phishing and malicious emails we continue to receive). The reliability and continuous availability of our platform is critical to our success.
We use third-parties, including sub-processors, to help us deliver services to our customers. These vendors, such as cloud infrastructure providers, store or process personal and confidential information for us or our customers. We use third-party technology, systems and services in a variety of contexts, including, without limitation, cloud infrastructure, encryption and authentication technology, employee email, content delivery to customers, back-office support, credit card processing and other functions. While we have taken steps designed to protect the confidential and personal information that we have access to, our security measures or those of the third-parties with whom we work that store or otherwise process certain of our and our customers' data on our behalf could be breached or we could suffer a loss of our or our customers' data. Our ability to monitor these third-parties' data security is limited, and they may not have adequate information security measures in place. Cyber-attacks, computer malware, viruses, employee mistakes or malfeasance, social engineering (including through deep fakes and spear phishing), malicious code, denial-of-service attacks, credential harvesting and general hacking have become more prevalent in our industry, particularly against cloud services, and have become enhanced or facilitated by artificial intelligence. Ransomware attacks, including those from organized criminal threat actors, nation-states and nation-state supported actors, are prevalent and can lead to significant interruptions, delays, or outages in our operations, loss of data (including customer data), loss of income, significant extra expenses to restore data or systems, reputational loss and the diversion of funds. To alleviate the financial, operational and reputational impact of a ransomware attack it may be preferable to make extortion payments, but we may be unwilling or unable to do so (including, for example, if applicable laws or regulations prohibit such payments). Similarly, supply chain attacks have increased in frequency and severity, and we cannot guarantee that third parties and infrastructure in our supply chain have not been compromised or that they do not contain exploitable defects or bugs that could result in a breach of or disruption to our platform, systems and networks or the systems and networks of third parties that support us and our services. Despite the security controls we have in place, such attacks are very difficult to avoid.
There can be no assurance that any security measures that we or the third-parties with whom we work have implemented will be effective against current or future security threats. While we have developed systems and processes designed to protect the integrity, confidentiality, and security of our and our customers' data, our security measures or those of the third-parties with whom we work could fail and result in unauthorized access to or disclosure, modification, misuse, loss or destruction of such data.
Third parties may also conduct attacks designed to temporarily deny customers access to our cloud services. Any security breach or other security incident, or the perception that one has occurred, could result in a loss of customer confidence in the security of our platform and damage to our brand, reduce the demand for our products, disrupt normal business operations, require us to spend material resources to investigate or correct the breach and to prevent future security breaches and incidents, expose us to legal liabilities, including litigation, regulatory enforcement, and indemnity obligations, and adversely affect our business, financial condition and results of operations. These risks are likely to increase as we continue to grow and process, store, and transmit increasingly large amounts of data.
In addition, we do not directly control content that our customers store in our products. If our customers use our products for the collection, transmission or storage of personal information and our security measures are or are believed to have been breached as a result of third-party action, employee error, malfeasance or otherwise, our reputation could be damaged, our business may suffer, and we could incur significant liability. Our remediation efforts may not be successful. We employ a shared responsibility model where our customers are responsible for using, configuring, and otherwise implementing security measures related to our platform, services, and products. As part of this shared responsibility security model, we make certain security features available to our customers that can be implemented at our customers' discretion, or identify security areas or measures for which our customers are responsible. In certain cases our customers may choose not to implement, or may incorrectly implement, those features or measures, misuse our services, or otherwise experience their own vulnerabilities, policy violations, credential exposure, or security incidents. Even if we are not the cause of a resulting customer security issue or incident, our customer relationships, reputation, and business may be adversely impacted.
We also process, store and transmit our own data as part of our business and operations. This data includes personal, confidential or proprietary information. We may expend significant resources, fundamentally change our business activities and practices, or modify our operations or information technology in an effort to protect against security incidents and to mitigate, detect, and remediate actual and potential vulnerabilities.
We take steps designed to detect, mitigate, and remediate vulnerabilities in our information systems (such as our hardware and/or software, including that of third parties with whom we work). We may not, however, detect and remediate all such vulnerabilities on a timely basis. Among other things, our applications, systems, networks, software, other computer assets and physical facilities could be breached or could otherwise malfunction or fail, or the sensitive information that we store could be otherwise compromised due to employee error or malfeasance, if, for example, third parties fraudulently induce our employees or our members to disclose information or user names and/or passwords, or otherwise compromise the security of our networks, systems and/or physical facilities. For example, in April 2025, we notified customers of access by an unauthorized third party to a number of Datadog source code repositories arising from compromised employee account credentials. After discovering the access, we revoked the credentials and terminated the unauthorized access. However, such unauthorized access may increase our vulnerability to certain attacks at a later date through exploitation of our source code, including the exploitation of potential vulnerabilities in the Datadog platform or products, or information stored within the source code. Additionally, from time to time employees or service providers may inadvertently misconfigure resources or misdirect certain communications, leading to security vulnerabilities or incidents that we must then expend effort and incur expenses to correct.
We may have contractual and other legal obligations, or we may voluntarily choose, to notify relevant stakeholders of security incidents. For instance, most jurisdictions have enacted laws, such as the U.S. Health Insurance Portability and Accountability Act of 1996, or HIPAA, requiring companies to notify individuals, regulatory authorities, and others of security breaches involving certain types of data. Such mandatory contractual and legal disclosures are costly, could lead to negative publicity, may cause our customers to lose confidence in the effectiveness of our security measures and require us to expend significant capital and other resources to respond to and/or alleviate problems caused by the actual or perceived security breach, and any failure to provide appropriate notice may violate the terms of our customer contracts. Applicable laws, our contracts and our representations require us to implement and maintain industry-standard or reasonable measures to safeguard personal information or confidential information. A security breach could lead to claims by our customers, or other relevant stakeholders, that we have failed to comply with such legal or contractual obligations. As a result, we could be subject to legal action or our customers could end their relationships with us. Further, our contracts may not contain limitations of liability, and even where they do, there can be no assurance that any limitations of liability would be enforceable or adequate or would otherwise protect us from liabilities or damages.
The costs to respond to a security breach and/or mitigate any security vulnerabilities that may be identified could be significant, our efforts to address these problems may not be successful, and these problems could result in unexpected interruptions, delays, cessation of service, negative publicity, and other harm to our business and our competitive position. We could be required to fundamentally change our business activities and practices in response to a security breach or related regulatory actions or litigation, which could have an adverse effect on our business.
Additionally, we cannot be certain that our insurance coverage will be adequate or sufficient for fines, judgments, settlements, penalties, costs, attorney fees and other impacts that arise out of privacy or security incidents or breaches. If the impacts of a privacy or security incident or breach, or the successful assertion of one or more large claims against us that exceeds our available insurance coverage, or results in changes to our insurance policies (including premium increases or the imposition of large deductible or co-insurance requirements), it could have an adverse effect on our business. In addition, we cannot be sure that our existing insurance coverage, cyber coverage and coverage for errors and omissions will continue to be available on acceptable terms or that our insurers will not deny coverage as to any future claim. The successful assertion of one or more large claims against us that exceed available insurance coverage, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or co-insurance requirements, could adversely affect our reputation, business, financial condition and results of operations. Our risks are likely to increase as we continue to expand, grow our customer base, and process, store, and transmit increasingly large amounts of sensitive information.