We rely on information technology systems, some of which are provided or managed by third-parties, to process, transmit and store electronic information (including sensitive data such as confidential business information and personally identifiable data relating to employees, customers, and other business partners), and to manage or support a variety of critical business processes and activities (such as receiving and fulfilling orders, billing, collecting and making payments, shipping products, providing services and support to customers and fulfilling contractual obligations). In addition, some products or software we sell to customers may connect to our systems for maintenance or other purposes. These systems, products and services (including those we acquire through business acquisitions) may be damaged, disrupted or shut down due to attacks by computer hackers, computer viruses, ransomware, human error or malfeasance, power outages, hardware failures, telecommunication or utility failures, catastrophes or other unforeseen events, and in any such circumstances our system redundancy and other disaster recovery planning may be ineffective or inadequate. Attacks may also target hardware, software and information installed, stored or transmitted in our products after such products have been purchased and incorporated into third-party products, facilities or infrastructure. Security breaches of systems provided or enabled by us, regardless of whether the breach is attributable to a vulnerability in our products or services, could result in the misappropriation, destruction or unauthorized disclosure of confidential information or personal data belonging to us or to our employees, partners, customers, or suppliers. Our information technology systems have been subject to computer viruses, malicious codes, unauthorized access and other cyber-attacks and we expect the sophistication and frequency of such attacks to continue to increase. Unauthorized tampering, adulteration or interference with our products may also adversely affect product functionality and result in loss of data, risk to product safety and product recalls or field actions.
Any attacks, breaches or other disruptions or damage could interrupt our operations or the operations of our customers and partners, delay production and shipments, result in theft of our and our customers' intellectual property and trade secrets, damage customer, business partner, and employee relationships, and our reputation, or result in defective products or services, legal claims and proceedings, liability and penalties under privacy laws and increased costs for security and remediation, each of which could adversely affect our business, reputation and financial statements.
Further, a significant number of our employees work remotely, which exposes us to greater cybersecurity risks. Any inability to maintain reliable information technology systems and appropriate controls with respect to global data privacy and security requirements and prevent data breaches can result in adverse regulatory consequences, business consequences and litigation.