We rely on networks, information systems, and other technology, or IT systems, including the Internet and third-party hosted platforms and services, to support a variety of business processes and activities, including procurement and supply chain, manufacturing, distribution, invoicing, collection of payments and storage of client, third-party and employee personal data. We also use IT systems to process financial information and results of operations for internal reporting purposes and to comply with regulatory financial reporting and legal and tax requirements. Because IT systems are critical to many of our operating activities, our business may be impacted by network or hardware failures or impairments, malicious or disruptive software, unintentional or malicious actions of employees or contractors, cyberattacks by hackers or criminal groups (which may include deepfake or social engineering schemes, ransomware and other forms of malware, business email compromise, cyber extortion, denial of service, or attempts to exploit vulnerabilities or gain unauthorized access), or other events. Cybercriminals have increasingly demonstrated advanced capabilities, such as use of zero-day vulnerabilities and generative artificial intelligence. Cybersecurity incidents could result in the unauthorized disclosure of confidential information, regulated individual personal data, or delays in reporting our financial results, and we may lose revenue and profits as a result of our inability to timely produce or distribute our products. Any severe damage, disruption, or shutdown in our IT systems could adversely affect our business, financial condition, and results of operations.
Our IT systems may be target of attacks. Although the cybersecurity incidents that we have experienced to date have not had a material effect on our business, financial condition or results of operations, such cybersecurity incidents could have a material adverse effect on us in the future. In order to address risks to our IT systems, we invest in specialized personnel, technologies, controls, cyber insurance, and personnel training to prevent these possible impacts. As a means of preventing such impacts, we maintain a cyber risk management program overseen by the audit committee and our senior management. However, there is no assurance that the measures we implement will be sufficient to prevent such incidents.