We are increasingly dependent upon information systems and data to operate our business. Changes in how we operate have caused us to modify our business practices in ways that heighten this dependence, including changing the requirement that most of our office-based employees in the U.S. and our other key markets work from the office, with many of our employees now working in hybrid or full-remote positions. As a result, we are increasingly dependent upon our information systems to operate our business and our ability to effectively manage our business depends on the security, reliability and adequacy of our information systems and data, which includes use of cloud technologies, including Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Breakdowns, invasions, corruptions, destructions and/or breaches, which impact may include, but not limited to, comprising the capacity, reliability or security of our information systems or those of our business partners, including our cloud technologies, and/or unauthorized access to our data and information could subject us to significant liability, negatively impact our business operations, and/or require replacement of technology and/or sizeable ransom payments. Our information systems, including our cloud technologies, continue to increase in multitude and complexity, increasing our vulnerability when breakdowns, malicious intrusions and random attacks occur. Data privacy or security breaches also pose a risk that sensitive data, including intellectual property, trade secrets or personal information belonging to us, patients, customers or other business partners, may be exposed to unauthorized persons or to the public.
Cybersecurity threats and incidents are increasing in their frequency, sophistication and intensity, and are becoming increasingly difficult to detect, particularly when they impact vendors, customers or suppliers, and other companies in our supply chain. Cybersecurity threats and incidents are often carried out by motivated, well-resourced, skilled and persistent actors, including nation states, organized crime groups, "hacktivists" and may include or target employees or contractors acting with careless or malicious intent. Recent developments in the threat landscape include use of AI and machine learning, as well as an increased number of cyber extortion attacks, with higher financial ransom demand amounts and increasing sophistication and variety of ransomware techniques and methodology. Geopolitical instability, including that related to Russia's invasion of Ukraine or the conflict in the Middle East, may increase the risk of cybersecurity threats. Cybersecurity threats or incidents may include deployment of harmful malware and key loggers, ransomware, a denial-of-service attack, a malicious website, the use of social engineering and other means to affect the confidentiality, integrity and availability of our information systems and data. Cybersecurity threats and incidents also include manufacturing, hardware or software supply chain attacks, which could cause a delay in the manufacturing of products or products produced for contract manufacturing or lead to a data privacy or security breach. Our key business partners face similar risks and any security breach of their systems could adversely affect our security posture. In addition, our increased use of cloud technologies heightens these and other operational risks, and any failure by cloud or other technology service providers to adequately safeguard their systems and prevent cyber-attacks could disrupt our operations and result in misappropriation, corruption or loss of confidential or propriety information.
While we continue to build and improve our systems and infrastructure, including our business continuity plans, there can be no assurance that our efforts will prevent cybersecurity threats or incidents in our systems and any such incidents could materially adversely affect our business and operations and/or result in the loss of critical or sensitive information, which could result in material financial, legal, operational or reputational harm to us, loss of competitive advantage or loss of consumer confidence. Our liability insurance may not be sufficient in type or amount to cover us against claims related to security breaches, cyber-attacks and other related breaches.
Regulations continue to change as regulators worldwide consider new rules. For example, the SEC has adopted additional disclosure rules regarding cyber security risk management, strategy, governance and incident reporting by public companies. These new regulations or other regulations being considered in Europe and around the world may impact the manner in which we operate.
Regulators are imposing new data privacy and security requirements, including new and greater monetary fines for privacy violations. For example, the E.U.'s General Data Protection Regulation established regulations regarding the handling of personal data, and provides an enforcement authority and imposes large penalties for noncompliance. New U.S. data privacy and security laws, such as the CCPA, and others that may be passed, similarly introduce requirements with respect to personal information, and non-compliance with the CCPA may result in liability through private actions (subject to statutorily defined damages in the event of certain data breaches) and enforcement. Failure to comply with these current and future laws, policies, industry standards or legal obligations or any security incident resulting in the unauthorized access to, or acquisition, release or transfer of personal information may result in governmental enforcement actions, litigation, fines and penalties or adverse publicity and could cause our customers to lose trust in us, which could have a material adverse effect on our business and results of operations.