Certain elements of our business and software solutions, particularly our origination and analytics solutions, involve the processing and storage of personally identifiable information, or PII, such as banking information and PII of our customers' clients. We may also have access to PII during various stages of the implementation process of our solutions or during the course of providing customer support. Furthermore, as we develop additional functionality, we may gain greater access to PII and process additional PII. While we maintain policies, procedures, and technological safeguards designed to protect the confidentiality, integrity, and availability of this information and our information technology systems, we cannot entirely eliminate the risk of improper, unlawful, or unauthorized access to, or disclosure, alteration, corruption, unavailability, or loss of PII or other data that we process or maintain, other security events that impact the integrity or availability of PII or other data or our systems and operations, or the related costs we may incur to mitigate the consequences from certain events such as the following:
- third-party social engineering attempts (including phishing attacks) to fraudulently induce our employees, partners, or customers to disclose sensitive information;- malicious intrusions and attacks by individuals or groups of hackers and sophisticated organizations, such as state-sponsored organizations or nation-states, to launch coordinated attacks, such as ransomware and distributed denial-of-service attacks;- cyberattacks such as ransomware on our internally built infrastructure on which many of our solutions operate, or on third-party cloud-computing platform providers;- vulnerabilities resulting from the configuration, implementation, enhancement, or update of our software solutions, as well as in the products or components across the broad ecosystem that our solutions operate in conjunction with and are dependent on;- vulnerabilities or breach of those third-party providers' (cloud, software, data center, and other critical technology vendors) software, systems, or security measures or a failure in our third-party providers' data security procedures, measures, and policies;- vulnerabilities existing within new technologies and infrastructures, including those from acquired companies;- attacks on, or vulnerabilities in, the many different underlying networks and services that power the Internet that our products depend on, most of which are not under our control or the control of our vendors, partners or customers; and - employee or contractor human errors or intentional insider threats that compromise our security systems.
As we integrate artificial intelligence, or AI, technologies to enhance efficiency and innovation, we must acknowledge associated cybersecurity risks. AI systems, while beneficial, can be exploited by cybercriminals for sophisticated attacks that evade traditional security measures. Bad actors around the world use increasingly sophisticated methods, including the use of AI, to engage in illegal activities involving the theft and misuse of PII, confidential data, and intellectual property. Unauthorized access to AI tools may lead to data manipulation, deepfake generation, and highly personalized spear-phishing campaigns. The rapid advancement of AI increases complexity in cyber threats.
Although we have developed systems and processes designed to protect our customers' clients' sensitive data, we can provide no assurances that such measures will provide absolute security or that a cybersecurity incident, data breach, or other compromise will not occur. Our efforts to prevent, contain, and mitigate cyberattacks and other threats to our information technology systems may be impacted by factors such as:
- changes to, and complexity of, techniques used to obtain unauthorized access to, or sabotage IT systems and infrastructure, which generally are not identified until after an initial launch against a target, resulting in a reduced ability to anticipate or implement adequate preventive measures;- continued refinement, updating, and replacement of our internal systems and technology, particularly when adopting new technologies and new methods of sharing data and communicating internally and with customers and partners;- the acquisition of new companies and their solutions, requiring us to integrate, improve, and secure different or more complex IT environments and technologies;- authorization by our customers to third-party technology providers to access their clients' data, which may lead to our customers' inability to protect their data that is stored on our servers;- our limited control over our customers or third-party technology providers, or the processing of data by third-party technology providers, which may not allow us to maintain the integrity or security of such transmissions or processing; and - increased risk of security compromises associated with our employees working remotely.
A cybersecurity incident, data breach, or other compromise could result in operational disruptions, loss, compromise, unauthorized use of, or access to, alteration, or corruption of customer data or customers' client data or data we rely on to provide our software solutions, including our analytics initiatives and offerings, that impair our ability to provide our software solutions and meet our customers' requirements. Such impairment would result in decreased revenues and could otherwise negatively impact our financial results. Also, the occurrence, or perception of an occurrence, of any of these events could results in a loss of confidence in the security of our services, irreparable reputational damage, a decline in current and prospective customer use of our software solutions, business disruptions, increases in cybersecurity insurance premiums, and allocation of significant financial and operational resources in response, including repairing system damage, increasing security protection costs by deploying additional personnel and protection technologies, and defending against and resolving legal and regulatory claims and proceedings.
The detection, prevention, and remediation of known or potential security vulnerabilities, including those arising from third-party hardware or software, may result in additional financial burdens due to additional direct and indirect costs, such as additional infrastructure capacity spending to mitigate any system degradation and the reallocation of resources from development activities. Furthermore, cybersecurity incidents, data breaches, and other compromises could expose us to legal, regulatory, and financial exposure and liability, notification requirements to affected stakeholders (including affected individuals, customers, investors, and regulators), third-party claims and lawsuits, indemnification, or other claims from customers and other third parties, regulatory investigations or proceedings, fines, or other actions or liabilities, which could adversely affect our business and results of operations. In addition, some of our customers contractually require notification of cybersecurity incidents, data breaches, and other compromises and include representations and warranties in their contracts with us that our software solutions comply with certain legal and technical standards related to cybersecurity and privacy and meets certain service levels. In certain of our contracts, a cybersecurity incident, data breach, or other compromise or operational disruption impacting us or one of our vendors, or system unavailability or damage due to other circumstances, may constitute a breach of contract and give rise to a customer's right to terminate their contract with us or may cause us to be liable for certain monetary penalties, including as a result of a failure to meet service level agreements.
We moved to a fully remote work-from-home work model in 2020 and plan to continue operating as remote-first. In connection with the shift, we assessed our IT security measures, identify any vulnerabilities, and enhance protections against unauthorized access to our network and systems. We cannot guarantee these private work environments and electronic connections to our work environment have the same robust security measures deployed in our physical offices. We are unable to unequivocally affirm that the protective measures we have taken will remain sufficient given the ever-changing threat landscape, and any such related security compromise that may occur could materially and adversely impact our business, results of operations, or reputation.
Like other companies in our industry, we, and our third party vendors, have experienced threats and cybersecurity incidents relating to our information technology systems and infrastructure. Because of the frequently changing nature of attack techniques, along with the increased volume and sophistication of the attacks, there is the continued potential for us to be adversely impacted. This impact could result in reputational, competitive, operational or other business harm, as well as financial costs, including fines from regulators and other regulatory action. We maintain cybersecurity insurance in the event of an information security or cyber incident, however, the coverage may not be sufficient to cover all financial losses. In these circumstances, it may be difficult or impossible to cure such a cybersecurity incident, data breach, or other compromise in order to prevent customers from potentially terminating their contracts with us. Furthermore, although our customer contracts typically include limitations on our potential liability, there can be no assurance that such limitations of liability would be adequate. We also cannot be sure that our existing general liability insurance coverage and coverage for errors or omissions will be available on acceptable terms or in sufficient amounts to cover one or more claims or that our insurers will not deny or attempt to deny coverage as to any future claim. The successful assertion of one or more claims against us, the inadequacy or denial of coverage under our insurance policies, litigation to pursue claims under our policies, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or coinsurance requirements, could adversely affect our business and results of operations.