We use information technology and third-party service providers to support our business processes and activities, including supporting critical business operations such as manufacturing and distribution; communicating with our suppliers, customers and employees; maintaining effective accounting processes and financial and disclosure controls; executing corporate transactions; conducting research and development activities; and meeting regulatory, legal and tax requirements. Shared service centers managed by third parties provide an increasing number of services important to conducting our business, including accounting, internal control, human resources and computing functions.
Continuity of business applications and services has been, and may in the future be, disrupted by events such as infection by viruses or malware; other cybersecurity attacks; issues with or errors in systems' maintenance or security; power outages; hardware or software failures; denial of service attacks; telecommunication failures; natural disasters; terrorist attacks; and other catastrophic occurrences. Our use of new and emerging technologies such as cloud-based services and mobile applications continues to evolve, presenting new and additional risks in managing access to our data, relying on third parties to manage and safeguard data, ensuring access to our systems and availability of third-party systems. In addition, we are experiencing new and more frequent attempts by third parties to gain access to our systems, such as through increased email phishing of our workforce.
We leverage third parties for various technology and business services who may experience cybersecurity breaches, whether from circumvention of security systems, denial-of-service attacks or other cyberattacks such as hacking, phishing attacks, computer viruses, ransomware or malware, cyber extortion, employee or insider error, malfeasance, social engineering, physical breaches or other actions or attempts to exploit vulnerabilities may cause confidential information or Personally Identifiable Information belonging to us or our employees, customers, consumers, partners, suppliers, or governmental or regulatory authorities to be misused or breached. These risks could be magnified since the number of employees, contractors and others working outside of offices increased since the COVID-19 pandemic. Additionally, continued geopolitical turmoil, including the ongoing war in Ukraine, has heightened the risk of cyberattacks. When risks such as these materialize, the need for us to coordinate with various third-party service providers and for third-party service providers to coordinate amongst themselves might increase challenges and costs to resolve related issues. Our information security program includes capabilities designed to evaluate and mitigate cyber risks arising from third-party service providers. Cyber threats to externally-hosted technology and business services are beyond our control. Additionally, new initiatives, such as those related to digital commerce and direct sales, that increase the amount of confidential information that we process and maintain increase our potential exposure to a cybersecurity breach. Furthermore, the rapid evolution and increased adoption of artificial intelligence technologies may intensify our cybersecurity risks. If our controls, disaster recovery and business continuity plans or those of our third-party providers do not effectively respond to or resolve the issues related to any such disruptions in a timely manner, our product sales, financial condition, results of operations and stock price may be materially and adversely affected, and we might experience delays in reporting our financial results, loss of intellectual property and damage to our reputation or brands.