Our business is increasingly dependent on information technology systems that are complex and vital to continuing operations, resulting in an expansion of our technological presence and corresponding risk exposure. If we were to experience difficulties maintaining or operating existing systems or implementing new systems, we could incur significant losses due to disruptions in our operations. As we modernize legacy systems, if we are unable to successfully implement those systems in a coordinated manner across internal and external stakeholders, we could be subject to business interruption or reputation risk with our customers, suppliers or associates.
?
Through our sales and marketing activities, we collect and store some personal information that our customers provide to us. We also gather and retain information about our associates in the normal course of business. Under certain circumstances, we may share information with vendors that assist us in conducting our business, as required by law, or otherwise in accordance with our privacy policy.
Our technology systems have been, and may be in the future, disrupted from circumstances beyond our control, as we regularly defend against and respond to data security incidents. Cyber-attackers have targeted and accessed, and may in the future again target and, if successful, access information stored in our or our vendors' systems in order to misappropriate confidential customer or business information. Due to ongoing geopolitical conflicts, there is an increased possibility of cyberattacks that could either directly or indirectly affect our operations. Although we have implemented procedures to protect our information, and require our vendors to do the same, we cannot be certain that our security systems will successfully defend against, or be able to effectively respond to, rapidly evolving, increasingly sophisticated cyber-attacks as they become more difficult to detect and defend against. Further, a Kroger associate, a contractor or other third party with whom we do business may in the future circumvent our security measures in order to obtain information or may inadvertently cause a breach involving information. In addition, hardware, software or applications we may use may have inherent defects, vulnerabilities, or could be inadvertently or intentionally applied or used in a way that could compromise our information security.
Our cybersecurity program, continued investment in our information technology systems, and our processes to evaluate and select vendors with reasonable information security controls may not effectively insulate us from potential attacks, data breaches or disruptions to our business operations, which could result in a loss of customers or business information, negative publicity, damage to our reputation, and exposure to claims from customers, financial institutions, regulatory authorities, payment card associations, associates and other persons. Any such events could have an adverse effect on our business, financial condition, results of operations or cash flows and may not be covered by our insurance. In addition, compliance with privacy and information security laws and standards may result in significant expense due to increased investment in technology and the development of new operational processes and may require us to devote significant management resources to address these issues. The costs of attempting to protect against the foregoing risks and the costs of responding to cyber-attacks are significant. Following a cyber-attack, our and/or our vendors' remediation efforts may not be successful, and a cyber-attack could result in interruptions, delays or cessation of service, and loss of existing or potential customers. In addition, breaches of our and/or our vendors' security measures and the unauthorized dissemination of sensitive personal information or confidential information about us or our customers could expose our customers' private information and our customers to the risk of financial or medical identity theft, or expose us or other third parties to a risk of loss or misuse of this information, and result in investigations, regulatory enforcement actions, material fines and penalties, loss of customers and business relationships, litigation or other actions which could have a material adverse effect on our brands, reputation, business, financial condition, results of operations or cash flows.
Data governance failures can adversely affect our reputation and business. Our business depends on our customers' willingness to entrust us with their personal information. Events that adversely affect that trust, including inadequate disclosure to our customers of our uses of their information, failures to honor new and evolving data privacy rights, failing to keep our information technology systems and our customers' sensitive information secure from significant attack, theft, damage, loss or unauthorized disclosure or access, whether as a result of our action or inaction (including human error) or that of our business associates, vendors or other third parties, could adversely affect our brand and reputation and operating results and also could expose and/or has exposed us to mandatory disclosure to the media, litigation (including class action litigation), governmental investigations and enforcement proceedings, material fines, penalties and/or remediation costs, and compensatory, special, punitive and statutory damages, consent orders, and/or injunctive relief, any of which could adversely affect our businesses, financial condition, results of operations or cash flows. Large scale data breaches at other entities, including supply chain security vulnerabilities, increase the challenge we and our vendors face in maintaining the security of our information technology systems and proprietary information and of our customers' information. There can be no assurance that such failures will not occur, or if any do occur, that we will detect them or that they can be sufficiently remediated.
The use of data by our business and our business associates is highly regulated. Privacy and information-security laws and regulations change, and compliance with them may result in cost increases due to, among other things, systems changes and the development of new processes. If we, our third-party service providers, or those with whom we share information fail to comply with laws and regulations, or self-regulatory regimes, that apply to all or parts of our business, such as section 5 of the FTC Act, the California Consumer Privacy Act (CCPA), the Health Insurance Portability and Accountability Act (HIPAA), or applicable international laws such as the EU General Data Protection Regulation (GDPR), our reputation could be damaged, possibly resulting in lost business, and we could be subjected to additional legal risk or financial losses as a result of non-compliance.