We use cloud-based computer systems for our communications (e-mail, voice, data exchange, etc.), for other aspects of our operations and for our business and financial records. Any security breach, data loss, or other compromise, including those resulting from a cybersecurity attack, phishing attack, or any unauthorized access, unauthorized usage, virus or similar breach or disruption could result in the loss or destruction of or unauthorized access to, or use, alteration, disclosure, or acquisition of, data, business disruptions and delays as well as damage to our reputation, litigation, regulatory investigations, or other liabilities. Our website and technology infrastructure also may experience performance issues due to a variety of factors, including infrastructure changes, human or software errors, hosting disruptions, capacity constraints, technical failures, natural disasters, or fraud.
We also rely on cloud technologies from third parties in order to operate critical functions of our business, including financial management services, relationship management services, and aspects of our manufacturing and sales functions. If our service agreements are terminated, or there is a lapse of service, elimination of services or features that we utilize, interruption of internet service provider connectivity or damage to our providers' facilities, we could experience business interruptions as well as significant delays and additional expense in arranging or creating new facilities and services and/or re-architecting our cloud-based offerings for deployment on a different cloud infrastructure service provider, which could adversely affect our business, financial condition and results of operations. Our vendors and service providers may also be the targets of cyberattacks, malicious software, phishing schemes, and fraud. Any of the foregoing could have a material adverse effect on our business, including our financial condition, results of operations and reputation.
Our facilities, as well as the facilities of third-parties that provide or maintain, or have access to our data or network infrastructure, are vulnerable to damage or interruption from earthquakes, hurricanes, floods, fires, cyber security attacks, terrorist attacks, power losses, telecommunications failures and similar events. In the event that our or any third-party provider's systems or service abilities are hindered by any of the events discussed above, our ability to operate may be impaired. A third party's decision to close facilities or terminate services without adequate notice, or other unanticipated problems, could adversely impact our operations. If business continuity and disaster recovery plans of ours or of a third-party provider prove to be inadequate in preventing the loss of data or service interruptions, this could cause further disruptions to our operations or damages to important systems or facilities or damage to our computer hardware or systems or those of our employees, or customers. Our systems have been the target of cyber-attacks. Although we have taken and continue to take steps to enhance our cybersecurity posture, we cannot assure that future cyber incidents will not occur or that our systems will not be targeted or breached in the future.