Our business relies on IT Systems and involves the generation, collection, storage, processing and transmission of Confidential Information, including personal information and proprietary business information, by us and by third-party providers we rely on. We own and manage IT Systems but also rely on third-party managed IT Systems and a broad array of third-party products and services to support our business operations. An increasing number of organizations, including large merchants, businesses, technology companies and financial institutions, as well as government institutions, have disclosed security incidents, disruptions to, and breaches of their or third-party providers' IT Systems, some of which have involved sophisticated and highly targeted attacks, including on websites, mobile applications and infrastructure, following a trend of cyberattacks increasing in frequency and magnitude on a global basis.
Our IT Systems, or those of third parties on which we rely, may be disrupted or damaged and our Confidential Information may be compromised, corrupted, lost or stolen. The tools and techniques (including artificial intelligence) used to obtain unauthorized, improper or illegal access to a target's systems, data or customers' data, disable or degrade services, or sabotage systems are constantly evolving and have become increasingly complex and sophisticated. It may be difficult to detect, investigate or remediate such cyber attacks quickly and such attacks often are not recognized or detected until after they have been launched against a target. We expect that unauthorized parties will continue to attempt to gain access to or disrupt our IT systems or facilities through various means, including hacking into IT Systems or facilities or those of our customers or vendors, malware (including ransomware) or attempting to fraudulently induce (for example, through spear phishing attacks or social engineering) our employees, customers, vendors or other users of IT Systems into disclosing access credentials or other sensitive information, which may in turn be used to access our IT Systems.
Numerous and evolving cybersecurity threats, including from diverse threat actors, such as state-sponsored organizations, opportunistic hackers and hacktivists, as well as through diverse attack vectors, such as advanced cyberattacks, phishing, social engineering schemes, malware (including ransomware), malfeasance by insiders, human or technological error, and as a result of bugs, misconfigurations or exploited vulnerabilities in software or hardware, could compromise the confidentiality, availability and integrity of Confidential Information and our IT systems. Our efforts to prevent, detect and respond to data security incidents, may not be effective due to attackers increasingly using tools and techniques that are designed to circumvent controls, to avoid detection, and to remove or obfuscate forensic evidence. Further, the security measures and procedures our customers, vendors and other users of our systems have in place to protect IT Systems and Confidential Information may not be successful or sufficient to counter all data breaches, cyberattacks or system failures. There can be no assurance that our cybersecurity risk management program and processes, including our policies, controls, or procedures, will be fully implemented, complied with or effective in protecting our IT Systems and Confidential Information.
Our IT Systems may be vulnerable to cyberattacks or security breaches, and third parties may be able to access our, our customers' or our employees' Confidential Information, including personal or proprietary information, that is stored on or accessible through those systems. We have experienced and expect to continue to experience in the future, cyberattacks as well as breaches of our security measures due to human error, malfeasance, system errors or vulnerabilities or other irregularities. In the past, one of our vendors providing IT infrastructure management software was compromised by cyberattacks. We are regularly exposed to vulnerabilities in widely deployed third-party software that we use in the ordinary course of business, such as the Log4J vulnerability. While these vulnerabilities did not have a material adverse effect on our operations, they and similar incidents require us to devote time and resources to monitoring and remediation on a regular basis.
In the past three years, we have not experienced a material cybersecurity incident, but any actual or perceived cybersecurity incidents or breaches of our security could result in any or all of the following, among other things, any of which could adversely affect our business and results of operations:
- Interrupt our operations;- Result in our systems or services being unavailable;- Result in improper disclosures of data;- Result in improper payments;- Materially harm our reputation and brands;- Result in significant regulatory scrutiny, enforcement actions, legal proceedings and claims (including class action lawsuits) and other legal and financial exposure;- Cause us to incur significant remediation, system restoration, incident response and compliance costs;- Lead to loss of customer confidence in, or decreased use of, our products and services;- Divert the attention of management from the operation of our business; and - Result in significant contractual penalties or other payments as a result of third-party losses or claims.
In addition, any cyberattacks or data security breaches affecting companies that we acquire our customers or vendors (including data center and cloud computing providers) could have similar negative effects on our business. Further, we may not be able to recover any or all damages suffered as a result of such security breach or other security incident from such third-party providers. Notwithstanding our efforts, there can be no assurance that vulnerabilities in widely deployed software will not materially harm our business. Any breach of our security measures or the loss, inadvertent disclosure or unapproved dissemination of Confidential Information about us or our customers, including the potential loss or disclosure of such information or data, could result in litigation, regulatory enforcement and potential liability for us, damage our brand and reputation or otherwise materially harm our business, financial condition or competitive position.
The coverage under our insurance policies for cybersecurity and related issues may not be adequate to reimburse us for losses caused by cyberattacks or other security incidents or be available on economically reasonable terms or at all.