The development and operation of our online networks are subject to physical, technological, security and other risks which may result in interruption in service or reduced capacity. These risks include physical damage, power loss, telecommunications failure, capacity limitation, hardware or software failures or defects and breaches of physical and cybersecurity by computer viruses, system break-ins or otherwise. An increase in the volume of usage of online services could strain the capacity of the software and hardware employed to prevent and identify such failures, breaches and attacks, which could result in slower response time or system failures. In particular, our industry has witnessed an increase in the number, intensity and sophistication of cybersecurity incidents caused by hackers and other malicious actors such as foreign governments, criminals, hacktivists, terrorists and insider threats. Hackers and other malicious actors may be able to penetrate our network security and misappropriate or compromise our confidential, sensitive, personal or proprietary information, or that of third parties, and engage in the unauthorized use or dissemination of such information. They may be able to create system disruptions, or cause shutdowns. Hackers and other malicious actors may be able to develop and deploy viruses, worms, ransomware and other malicious software programs that attack our products or otherwise exploit any security vulnerabilities of our systems. In addition, sophisticated hardware and operating system software and applications that we procure from third parties may contain defects in design or manufacture, including "bugs," cybersecurity vulnerabilities and other problems that could unexpectedly interfere with the operation or security of our systems.
We have a variety of backup servers at our primary site to deal with possible system failures. However, we do not have redundant facilities in the event of an emergency. The occurrence of any of these events could result in interruptions, delays or cessation in service to users of our online services, which could have a material adverse effect on our business and results of operations. We may be required to expend significant capital or other resources to protect against the threat of security breaches and attacks or to alleviate problems caused by such actions, including the following:
- expenses to rectify the consequences of the damage, security breach or cyber attack;- liability for stolen assets or leaked information;- costs of repairing damage to our systems;- lost revenue and income resulting from any system downtime caused by such breach or attack;- loss of competitive advantage if our proprietary information is obtained by competitors as a result of such breach or attack;- increased costs of cyber security protection;- costs of incentives we may be required to offer to our customers or business partners to retain their business; and - damage to our reputation.
In addition, any compromise of security from a security breach or cyber attack could deter customers or business partners from entering into transactions that involve providing confidential information to us. As a result, any compromise to the security of our systems could have a material adverse effect on our business, reputation, financial condition, and operating results.
Our network may be vulnerable to unauthorized access, computer viruses, denial of service and other disruptive problems. For example, in recent years, we have detected and mitigated incidents of denial-of-service attacks against network providers that affected latency of connections to our games. Such incidents, however, did not result in significant financial impact on our operations and financial results. We have experienced in the past, and may experience in the future, security breaches or attacks. There can be no assurance that any measures implemented will not be circumvented in the future.
The audit committee of the board of directors oversees our cyber risk management and periodically reviews summaries of recent cybersecurity incidents, if any, and updates on the execution of our risk management program, as prepared by our management team. If a material cybersecurity incident were to occur, our board of directors would be responsible for making a prompt assessment of our countermeasures and mitigation actions. See Item 16K, "Cybersecurity" in this annual report.
Our business is also vulnerable to delays or interruptions due to our reliance on infrastructure and related services provided by third parties. End-users of our offerings depend on Internet Service Providers ("ISPs") and our system infrastructure for access to the Internet games and services we offer. Some of these services have experienced service outages in the past and could experience service outages, delays and other difficulties due to system failures, stability or interruption. For example, prior earthquakes in Taiwan, Indonesia and Japan have caused damage to undersea fiber optic cables linking Malaysia, Singapore, Australia, Japan, South Korea, China, the United States and Europe, causing disruptions in Internet traffic worldwide. We may lose customers as a result of delays or interruption in service, including delays or interruptions relating to high volumes of traffic or technological problems, which may prevent communication over the Internet and could materially adversely affect our business, revenues, results of operations and financial condition.