We are increasingly dependent upon information technology systems, infrastructure, and data to operate our business. In the ordinary course of business, we collect, store, and transmit confidential information (including but not limited to intellectual property, proprietary business information, and personal information). It is critical that we do so in a secure manner to maintain the confidentiality and integrity of such confidential information. We have also outsourced elements of our operations to third parties, and as a result we manage a number of third-party contractors who have access to our confidential information.
Despite the implementation of security measures, given their size and complexity and the increasing amounts of confidential information that they maintain, our internal information technology systems and those of our third-party clinical research organizations and other contractors and consultants are potentially vulnerable to breakdown or other damage or interruption from service interruptions, system malfunction, natural disasters, terrorism, war, and telecommunication and electrical failures, as well as security breaches from inadvertent or intentional actions by our employees, contractors, consultants, business partners, and/or other third parties, or from cyberattacks by malicious third parties (including the deployment of harmful malware, ransomware, extortion, account takeover attacks, degradation of service attacks, denial-of-service attacks, "phishing," or social engineering and other means to affect service reliability and threaten the confidentiality, integrity, and availability of information), which may compromise our system infrastructure or lead to data leakage. We have technology security initiatives and disaster recovery plans in place to mitigate our risk to these vulnerabilities, but these measures may not be adequately designed or implemented to ensure that our operations are not disrupted or that data security breaches do not occur. To the extent that any disruption or security breach were to result in a loss of or damage to our data or applications, or inappropriate disclosure of confidential or proprietary information, we could incur liability and reputational damage.
Hackers and data thieves are increasingly sophisticated and operate large-scale and complex automated attacks which may remain undetected until after they occur. We cannot assure you that our data protection efforts and our investment in information technology will prevent significant breakdowns, data leakages, breaches in our systems, or other cyber incidents that could have a material adverse effect upon our reputation, business, operations, or financial condition. For example, if such an event were to occur and cause interruptions in our operations, it could result in a material disruption of our programs and the development of our diagnostic tests and therapeutic product candidates could be delayed. In addition, the loss of clinical trial data for our diagnostic tests and therapeutic product candidates could result in delays in our marketing approval efforts and significantly increase our costs to recover or reproduce the data. Furthermore, significant disruptions of our internal information technology systems or security breaches could result in the loss, misappropriation, and/or unauthorized access, use, or disclosure of, or the prevention of access to, confidential information (including trade secrets or other intellectual property, proprietary business information, and personal information), which could result in financial, legal, business, and reputational harm to us. Like all businesses we may be increasingly subject to ransomware or other malware that could significantly disrupt our business operations or disable or interfere with necessary access to essential data or processes. Numerous recent attacks of this nature have also involved exfiltration and disclosure of sensitive or confidential personal or proprietary information, or intellectual property, when victim companies have not paid the cyber criminals substantial ransom payments. For example, any such event that leads to unauthorized access, use, disclosure, unavailability, or compromised integrity of personal or other sensitive or essential information, including personal information regarding our clinical trial subjects or employees, could harm our reputation directly, compel us to comply with federal and/or state breach notification laws and foreign law equivalents, subject us to mandatory corrective action, increase the costs we incur to protect against such information security breaches, such as increased investment in technology, render key personnel unable to perform duties or communicate throughout the organization, and otherwise subject us to fines and other liability under laws and regulations that protect the privacy and security of personal information, which could result in significant legal and financial exposure and reputational damages that could potentially have an adverse effect on our business.
The costs of mitigating cybersecurity risks are significant and are likely to increase in the future. These costs include, but are not limited to, retaining the services of cybersecurity providers; compliance costs arising out of existing and future cybersecurity, data protection and privacy laws and regulations; and costs related to maintaining redundant networks, data backups and other damage-mitigation measures. We also cannot be certain that our existing insurance coverage will continue to be available on acceptable terms or in amounts sufficient to cover the potentially significant losses that may result from a security incident or breach or that the insurer will not deny coverage of any future claim.