Our business requires collecting, receiving, processing, generating, transferring, disposing of, transmitting, sharing, manipulating, analyzing, disclosing, storing, making accessible and otherwise using (collectively, processing) large amounts of proprietary, confidential and sensitive data, including personal data about our employees and others, information we collect from samples we process, intellectual property, trade secrets, and proprietary business information owned or controlled by ourselves or other third parties (collectively, sensitive data).
The confidentiality, availability, integrity and protection of our data and information technology systems is critical to our business and relevant stakeholders have a high expectation that we will adequately protect sensitive data. Our business therefore depends on the continuous, effective, reliable and secure operation of our data and information technology systems.
To the extent that our information technology systems malfunction or access to our data is interrupted or otherwise compromised, our business could suffer. If we or the third parties upon which we rely have experienced or in the future experience any security incident(s) or other interruption(s) that result in any data loss, deletion or destruction, unauthorized, unlawful or accidental access to, loss of, acquisition of or disclosure of, alteration, encryption or exposure of sensitive data, or compromise related to the security, confidentiality, integrity or availability of our (or their) information technology systems or data, it may result in material adverse impacts.
We and third parties upon which we rely are vulnerable to cyberattacks, malicious internet-based activity and online and offline fraud and other similar activities, such as social-engineering attacks, credential harvesting, supply-chain attacks, software bugs, malicious code (such as viruses and worms), employee theft or misuse, denial-of-service attacks (such as credential stuffing), ransomware attacks, phishing attacks, viruses, malware installation, server malfunction, software or hardware failures, telecommunications failures, physical or software break-ins, loss of data and other computer assets, adware or other similar issues. Such threats are prevalent and continue to increase and come from a variety of sources, including traditional computer "hackers", threat actors, "hacktivists", organized criminal threat actors, personnel (such as through theft or misuse), sophisticated nation states, and nation-state-supported actors. Some actors now engage and are expected to continue to engage in cyber-attacks, including without limitation nation-state actors for geopolitical reasons and in conjunction with military conflicts and defense activities. During times of war and other major conflicts, we and the third parties upon which we rely may be vulnerable to a heightened risk of these attacks, including retaliatory cyber-attacks, that could materially disrupt our systems and operations, supply chain, and ability to produce, sell and distribute our services. For example, some third parties upon which we rely to support our business are located in unstable regions and regions experiencing (or expected to experience) geopolitical or other conflicts, including Ukraine which was attacked by Russia in February 2022 through various means, including cyberattacks.
In particular, severe ransomware attacks, including those from organized criminal threat actors, nation-states and nation-state supported actors, are becoming increasingly prevalent and severe and can lead to significant interruptions, delays, or outages in our operations, loss of data (including sensitive data) and income, significant extra expenses to restore data or systems, reputational loss and the diversion of funds. To alleviate the financial, operational and reputational impact of a ransomware attack, it may be preferable to make extortion payments, but we may be unwilling or unable to do so (including, for example, if applicable laws or regulations prohibit such payments).
Additionally, as remote work has become more common, there is an increased risk to our information technology systems and data, as more of our employees utilize network connections, computers and devices outside our premises or network, including working at home, while in transit and in public locations. Moreover, future or past business transactions (such as acquisitions or integrations) could expose us to additional cybersecurity risks and vulnerabilities, as our systems could be negatively affected by vulnerabilities present in acquired or integrated entities' systems and technologies. Furthermore, we may discover security issues that were not found during due diligence of such acquired or integrated entities, and it may be difficult to integrate companies into our information technology environment and security program.
In addition, we rely on enterprise software systems and third-party service providers and sub-processors to operate and manage our business, and to process sensitive data in a variety of contexts, including, without limitation, cloud-based infrastructure, data center facilities, encryption and authentication technology, employee email, content delivery to customers, and other functions. Our ability to monitor these third parties' information security practices is limited, and these third parties may not have adequate information security measures in place. If our third-party service providers experience a security incident or other interruption, we could experience adverse consequences. While we may be entitled to damages if our third-party service providers fail to satisfy their privacy or security-related obligations to us, any award may be insufficient to cover our damages, or we may be unable to recover such award. Additionally, supply chain attacks have increased in frequency and severity, and we cannot guarantee that third parties and infrastructure in our supply chain have not been compromised or that they do not contain exploitable defects or bugs that could result in a breach of or disruption to our systems and networks or the systems and networks of third parties that support us and our services.
While we have implemented security measures designed to protect against security incidents, and take steps to detect and remediate vulnerabilities, we may not be able to detect and remediate all vulnerabilities because the threats and techniques used to exploit the vulnerability change frequently and are often sophisticated in nature. Therefore, such vulnerabilities could be exploited but may not be detected until after a security incident has occurred. Further, we may experience delays in developing and deploying remedial measures designed to address any such identified vulnerabilities. We could be required to expend significant resources, fundamentally change our business activities and practices or modify our services, software, operations or information technology in an effort to protect against security incidents and to mitigate, detect and remediate actual and potential vulnerabilities and security incidents. There can be no assurances that our security measures or those of the third parties upon which we rely will be effective in protecting against all security incidents and the material adverse impacts that may arise from such incidents.
Despite the security controls we have in place, security incidents are very difficult to avoid. We have experienced specific instances of cyber events, including attempted compromises, in the past, and there could be unauthorized access, acquisition, disclosure and use of non-public information (including personal data) in the future. The techniques used to attack information technology systems are sophisticated and change. As a result, we or the third parties upon which we rely may not be able to address these techniques proactively or implement adequate preventative measures. If our data or information technology systems (or those of third parties upon which we rely) are compromised, we could be subject to restrictions on processing sensitive data (including personal data), negative publicity, monetary fund diversions, interruptions in our operations (including availability of data), financial loss, reputational damage, fines, penalties, damages, litigation (including class claims) and enforcement actions (for example, investigations, audits and inspections), and we could lose trade secrets, the occurrence of which could harm our business. In addition, a security incident may require notification to governmental agencies, supervisory bodies, credit reporting agencies, the media or individuals pursuant to various obligations. Such disclosures are costly, and the disclosures or the failure to comply with such requirements, could lead to material adverse impacts, including without limitation, negative publicity, a loss of customer confidence in our services or security measures or breach of contract claims.
There can be no assurance that the limitations of liability in our contracts would be enforceable or adequate or would otherwise protect us from liabilities or damages if we fail to comply with obligations related to security incidents. We cannot be sure that our insurance coverage will be adequate or sufficient to protect us from or adequately mitigate liabilities or damages with respect to claims, costs, expenses, litigation, fines, penalties, business loss, data loss, regulatory actions or material adverse impacts arising out of our privacy and security practices, processing or security incidents we may experience, or that such coverage will continue to be available on commercially reasonable terms or at all. The successful assertion of one or more large claims against us that exceeds our available insurance coverage, or results in changes to our insurance policies (including premium increases or the imposition of large deductible or co-insurance requirements) could have an adverse effect on our business. In addition, we cannot be sure that our existing insurance coverage and coverage for errors and omissions will continue to be available on acceptable terms or that our insurers will not deny coverage as to any future claim.