We are increasingly dependent upon information technology systems, infrastructure and data to operate our business. In the ordinary course of business, we collect, store and transmit large amounts of confidential information (including, among other things, trade secrets or other intellectual property, proprietary business information and personal information). It is critical that we do so in a secure manner to maintain the confidentiality and integrity of such confidential information. We also have outsourced elements of our operations to third parties, and as a result we manage a number of third-party vendors who may or could have access to our confidential information. The size and complexity of our information technology systems, and those of third-party vendors with whom we contract, and the large amounts of confidential information stored on those systems, make such systems vulnerable to service interruptions or to security breaches from inadvertent or intentional actions by our employees, third-party vendors and/or business partners, or to cyber-attacks by malicious third parties. Cyber-attacks are increasing in their frequency, sophistication and intensity, and have become increasingly difficult to detect. Cyber-attacks could include the deployment of harmful malware, ransomware, denial-of-service attacks, social engineering and other means to affect service reliability and threaten the confidentiality, integrity and availability of information.
Significant disruptions of our information technology systems, or those of our third-party vendors or business partners, or security breaches could adversely affect our business operations and/or result in the loss, misappropriation and/or unauthorized access, use or disclosure of, or the prevention of access to, confidential information, including, among other things, trade secrets or other intellectual property, proprietary business information and personal information, and could result in financial, legal, business and reputational harm to us. Security breaches and other inappropriate access can be difficult to detect, and any delay in identifying them may lead to increased harm of the type described above. While we have implemented security measures to protect our information technology systems and infrastructure, there can be no assurance that such measures will prevent service interruptions or security breaches that could adversely affect our business. In addition, our liability insurance may not be sufficient in type or amount to cover us against costs of or claims related to security breaches, cyber-attacks and other related breaches. A cybersecurity breach could adversely affect our reputation and could result in other negative consequences, including disruption of our internal operations, increased cybersecurity protection costs, lost revenue, or litigation.