In the ordinary course of our business, we may collect, process, store and transmit proprietary, confidential and sensitive information, including personal data (including health information), intellectual property, trade secrets, and proprietary business information owned or controlled by ourselves or other parties. We may also share or receive sensitive information with our partners, CROs, CMOs, or other third parties. Our ability to monitor these third parties'1 According to SEC definition, a material weakness is a deficiency, or combination of deficiencies, in internal control over financial reporting, such that there is a reasonable possibility that a material misstatement of the Company's annual or interim financial statements will not be prevented or detected on a timely basis.
information security practices is limited, and these third parties may not have adequate information security measures in place.
Despite the implementation of security measures, our internal computer systems and those of our third-party contractors and consultants are vulnerable to damage from computer viruses, cyber-attacks, unauthorized access, natural disasters, terrorism, war and telecommunication and electrical failures. Cyberattacks, malicious internet-based activity, and online and offline fraud are prevalent and are increasing in their frequency, sophistication and intensity, and have become increasingly difficult to detect. These threats come from a variety of sources, including traditional computer "hackers," threat actors, personnel (such as through theft or misuse), sophisticated nation-states, and nation-state-supported actors. Some actors now engage and are expected to continue to engage in cyber-attacks, including without limitation nation-state actors for geopolitical reasons and in conjunction with military conflicts and defense activities. During times of war and other major conflicts, we, and the third parties upon which we rely, may be vulnerable to a heightened risk of these attacks, including retaliatory cyber-attacks, that could materially disrupt our systems and operations, supply chain, and ability to produce and distribute our product candidates. Cyberattacks could include, but are not limited to, the deployment of harmful malware (including as a result of advanced persistent threat intrusions), denial-of-service (such as credential stuffing), credential harvesting, social engineering attacks (including through phishing attacks), viruses, ransomware, supply chain attacks, personnel misconduct or error and other similar threats. We may also be the subject of software bugs, server malfunction, software or hardware failures, loss of data or other information technology assets, adware, telecommunications failures or other similar issues. In particular, ransomware attacks are becoming increasingly prevalent and severe and can lead to significant interruptions, delays, or outages in our operations, disruptions to our clinical trials, loss of data (including data related to clinical trials), significant expense to restore data or systems, reputational loss and the diversion of funds. Extortion payments may alleviate the negative impact of a ransomware attack, but we may be unwilling or unable to make such payments due to, for example, applicable laws or regulations prohibiting such payments. Similarly, supply chain attacks have increased in frequency and severity, and we cannot guarantee that third parties and infrastructure in our supply chain have not been compromised or that they do not contain exploitable defects or bugs that could result in a breach to our information technology systems or the third-party information technology systems that support us and our services. Future or past business transactions (such as acquisitions or integrations) could expose us to additional cybersecurity risks and vulnerabilities, as our systems could be negatively affected by vulnerabilities present in acquired or integrated entities' systems and technologies.
Although we have implemented security measures designed to protect against security incidents, there can be no assurance that these measures will be effective. We have experienced attempts to compromise our information technology systems or otherwise cause a security incident. While we do not believe that we have experienced any significant system failure, accident, or security breach to date, if such an event were to occur and cause interruptions in our operations, it could result in unauthorized, unlawful, or accidental acquisition, modification, destruction, loss, alteration, encryption, disclosure of, or access to our sensitive information. A security incident or other interruption could disrupt our ability (and that of third parties upon whom we rely) to manufacture or deliver our product candidates. For example, the loss of clinical trial data for our product candidates could result in delays in our regulatory approval efforts and significantly increase our costs to recover or reproduce the data. To the extent that any disruption or security breach results in a loss of or damage to our data or applications or other data or applications relating to our technology or product candidates, or inappropriate disclosure of confidential or proprietary information, we could incur liabilities and the further development of our product candidates could be delayed.
We may be unable to detect vulnerabilities in our information technology systems because such threats and techniques change frequently, are often sophisticated in nature, and may not be detected until after a security incident has occurred. Despite our efforts to identify and remediate exploitable critical vulnerabilities, if any, in our information technology systems, our efforts may not be successful. Further, we may experience delays in developing and deploying remedial measures designed to address any such identified vulnerabilities. Any failure to prevent or mitigate security incidents or improper access to, use of, or disclosure of our clinical data or patients' personal data could result in significant liability under state, federal, and international law and may cause a material adverse impact to our reputation, affect our ability to conduct our clinical trials and potentially disrupt our business.