IT-related break-ins evolving, thereby increasing the difficulty of detecting and defending against them. For example, we might not discover a security breach or a loss of information for a significant amount of time after the breach, and might not be able to anticipate attacks or implement sufficient mitigating measures. Such cybersecurity incidents could include, but are not limited to, an attempt to gain unauthorized access to digital systems for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruption. "Phishing" and other types of attempts to obtain unauthorized information or access are often sophisticated and difficult to detect or defeat. In addition, security measures in our products and services may be penetrated or bypassed by computer hackers and others who may gain unauthorized access to our or our customers' or partners' software, hardware, cloud offerings, networks, data or systems. These actors may use a wide variety of methods, which may include developing and deploying malicious software to attack our products and services and gain access to our networks and datacenters, using social engineering techniques or acting in a coordinated manner to launch distributed denial of service or other coordinated attacks. This is also true for third party data, products or services incorporated into our own. Data may also be accessed or modified improperly as a result of customer, partner or employee error or malfeasance and third parties may attempt to fraudulently induce customers, partners, employees or suppliers into disclosing sensitive information such as user names, passwords or other information in order to gain access to our data or IT systems or our customers' or partners' data or IT systems. Our exposure to cyber security and data privacy breach incidents may increase due to a large number of employees working remotely. Any of the foregoing occurrences could create system disruptions and cause shutdowns or denials of service or compromise data, including personal or confidential information, of us, our partners or our customers.
If a cyberattack or other security incident (for example phishing, advanced persistent threats, or social engineering) were to result in unauthorized access to, or deletion of, and/or modification and/or exfiltration of our customers' data, other external data or our own data or our IT systems or if the services we provide to our customers were disrupted, customers could lose confidence in the security and reliability of our products and services, including our cloud offerings, and perceive them not to be secure. This in turn could lead to fewer customers using our products and services and result in reduced revenue and earnings. The costs we would incur to address and fix these security incidents would increase our expenses. These risks will increase as we continue to grow our cloud solutions and network offerings and store and process increasingly large amounts of data, including personal information and our customers' confidential information and data and other external data, and host or manage parts of our customers' businesses in cloud-based IT environments. In addition, we have acquired certain companies, products, services and technologies over the years and have partnered with other companies for certain of our other offerings. While we make significant efforts to address any IT security issues with respect to our acquired companies and partners, we may still inherit such risks when we integrate these companies, products, services and technologies or work with our partners.
Any of the events described above could cause our customers to make claims against us for damages allegedly resulting from a security breach or service disruption, which could adversely affect our business, results of operation and financial condition.
non-EU cause us to incur substantial costs or require us to change our business practices. Additionally, new local privacy laws have been enacted recently as part of an overall trend, including in Brazil. In the United States, there have been proposals for federal privacy legislation and state-level privacy laws have also recently been enacted, including the California Consumer Privacy Act. Noncompliance with our legal obligations relating to privacy and data protection could result in penalties, fines, legal proceedings by governmental entities or others, loss of reputation, legal claims by individuals and customers and significant legal and financial exposure and could affect our ability to retain and attract customers. In addition, Guernsey has introduced legislation similar in form to the GDPR, the Data Protection (Bailiwick of Guernsey) Law, 2017 (as amended), which will apply globally in a similar fashion as the GDPR to our activities conducted from and within Guernsey.