The Company is dependent on information technology systems and infrastructure ("IT systems") owned and operated by the Company or managed by third-party service providers, suppliers and contract manufacturers. IT systems enable us to conduct, monitor and/or protect our business, operations, systems, data and other assets. In the ordinary course of our business, we and our providers collect, process, transmit and store sensitive data, including intellectual property, our proprietary information and that of our customers, suppliers and business partners, as well as personally identifiable information. Intrusion into a supplier or contract manufacturer system not integrated with a Corning IT system could result in service disruption and/or loss of financial control.
Our IT systems, and those of our providers, may be vulnerable to compromise or disruption due to human error or malfeasance, outdated applications, computer viruses or malware (e.g., ransomware), natural disasters, unauthorized access, cyber-attacks and other similar incidents and disruptions. Inadequate account security or organizational security practices may also result in unauthorized access. Increased work-from-home, at both the Company and our providers, presents additional operational risk. Companies that provide utilities, water, transportation, natural gas and other resources and services across our supply chain, are critical to our manufacturing operations and are vulnerable to cyber-attacks. From time to time, both we and certain of our providers, have been subject to cyberattacks and security incidents. We may be unable to anticipate, detect, prevent or remediate future attacks, particularly as attackers are becoming more sophisticated in their ability to circumvent controls and remove forensic evidence.
Any significant disruption, breakdown, intrusion, interruption or corruption, data breach, or compromise to the accessibility, security or integrity of our or our providers' IT systems, or the misappropriation or disclosure of any confidential, proprietary or personally identifiable information, could result in the loss of data or intellectual property, equipment or systems damage, downtime, safety related issues and could have a material adverse effect on our business, including by harming our competitive position and reputation, disrupting our manufacturing, reducing the value of our investment in research and development and other strategic initiatives, impairing our ability to access suppliers, contract manufacturers, customers and cloud-based services, subjecting us to litigation or regulatory investigations or fines, increasing the costs of compliance and remediation, or otherwise adversely affecting our business.? We may be required to invest significant additional resources to comply with evolving cybersecurity regulations and to modify and enhance our IT systems, information security and controls, and to investigate and remediate any security vulnerabilities. Any losses, costs or liabilities may not be covered by, or may exceed the coverage limits of, any, or all, of our applicable insurance policies.