We are increasingly dependent upon information technology systems, infrastructure and data to operate our business. In the ordinary course of business, we may collect, store and transmit confidential information, including, but not limited to, information related to our intellectual property and proprietary business information, personal information and other confidential information. We may outsource elements of our operations to third party vendors, who each have access to our confidential information, which increases our disclosure risk. Although we plan to implement internal security and business continuity measures, our information technology and other internal infrastructure systems may breakdown, incur damage or be interrupted by system malfunctions, natural disasters, terrorism, war or telecommunication and electrical failures, as well as by inadvertent or intentional security breaches by our employees, contractors, consultants, business partners and/or other third parties, or from cyber-attacks by malicious third parties, each of which could compromise our system infrastructure or lead to the loss, destruction, alteration, disclosure or dissemination of, or damage or unauthorized access to, our data or other assets. Such a security breach may cause loss, damage or disclosure of proprietary or confidential information, which could in turn result in significant legal and financial exposure and reputational damage that could adversely affect our business.
The costs related to significant security breaches or disruptions could be material and our insurance policies may not be adequate to compensate us for the potential losses arising from any such security breach. In addition, such insurance may not be available to us on economically reasonable terms, if at all, may not cover all claims made against us, and may have high deductibles. Furthermore, if the information technology systems of our third-party vendors and other contractors and consultants become subject to disruptions or security breaches, we may have insufficient recourse against such third parties and we may have to expend significant resources to mitigate the impact of such an event, and to develop and implement protections to prevent future events of this nature from occurring.