We rely on information technology systems, some of which are managed by third-parties, to process, transmit and store electronic information (including sensitive data such as confidential business information and personally identifiable data relating to employees, customers, other business partners and patients), and to monitor, manage, and support a variety of critical business processes and activities including receiving and fulfilling orders, billing, collecting and making payments, shipping products, providing services and support to customers and fulfilling contractual obligations. Despite our implementation of certain controls to protect our systems and sensitive, confidential or personal data or information, these systems, products, data and services may be damaged, compromised, disrupted or shut down due to attacks by computer hackers, computer viruses, ransomware, human error or malfeasance, power outages, hardware failures, telecommunication or utility failures, catastrophes or other unforeseen events. In any such circumstances our system redundancy and other disaster recovery planning may be ineffective or inadequate. Further, we also face information security risks due to our reliance on internet technology and use of hybrid work arrangements, which could strain our technology resources or create additional opportunity for cyber-attackers to exploit vulnerabilities.
Attacks may also target hardware, software and information installed, stored or transmitted in our products after such products have been purchased and incorporated into third-party products, facilities or infrastructure. Like most multinational corporations, our information technology systems have been subject to computer viruses, malicious codes, unauthorized access and other cyber-attacks and we expect the sophistication and frequency of such attacks to continue to increase. Any of the attacks, breaches or other disruptions or damage described above could interrupt our operations or the operations of our customers and partners, delay production and shipments, result in theft of intellectual property and trade secrets, damage customer and business partner relationships and our reputation or result in defective products or services, legal claims and proceedings, liability and penalties under privacy laws and increased costs for security and remediation, each of which could adversely affect our business, reputation and financial statements. Further, given the increasing sophistication of cyber-attacks and the complexity of techniques used, any of these attacks or breaches could potentially persist for an extended period before being detected. As a result, it could take a significant time before an investigation can be completed and new disclosure regulations could result in us being required to disclose information about a material cybersecurity incident before it has been mitigated or resolved, or even fully investigated. Although we maintain cyber risk insurance, damages and claims arising from such incidents may not be covered or may exceed the amount of any insurance available.