In the ordinary course of our business, it may process, as defined above, proprietary, confidential, and sensitive data, including personal data (such as health-related patient data), intellectual property, and trade secrets (collectively, sensitive information). We may rely upon third-party service providers and technologies to operate critical business systems to process sensitive information in a variety of contexts, including, without limitation, third-party providers of cloud-based infrastructure, employee email, CROs, and other functions. Our ability to monitor these third parties' information security practices is limited, and these third parties may not have adequate information security measures in place. We may share or receive sensitive information with or from third parties.
The risk of a security breach or disruption, particularly through cyber-attacks, cyber-intrusion, malicious internet-based activity, and online and offline fraud, are prevalent and have generally increased as the number, intensity, and sophistication of attempted attacks and intrusions from around the world have increased. These threats are becoming increasingly difficult to detect and come from a variety of sources, including traditional computer hackers, threat actors, personnel (such as through theft or misuse), sophisticated nation states, and nation-state-supported actors. Some actors now engage and are expected to continue to engage in cyber-attacks, including without limitation nation-state actors for geopolitical reasons and in conjunction with military conflicts and defense activities. During times of war and other major conflicts, we and the third parties upon which we rely may be vulnerable to a heightened risk of these attacks, including cyber-attacks that could materially disrupt our systems and operations, supply chain, and ability to produce, sell and distribute our products.
We and the third parties upon which we rely may be subject to a variety of evolving threats, including but not limited to social engineering attacks (including through phishing attacks), malicious code (such as viruses and worms), malware (including as a result of advanced persistent threat intrusions), denial-of-service attacks (such as credential stuffing), personnel misconduct or error, ransomware attacks, supply-chain attacks, software bugs, server malfunctions, software or hardware failures, loss of data or other information technology assets, adware, natural disasters, terrorism, war, and telecommunication and electrical failures. Ransomware attacks, including by organized criminal threat actors, nation-states, and nation-state-supported actors, are becoming increasingly prevalent and can lead to significant interruptions in our operations, loss of data and income, reputational harm, and diversion of funds. Extortion payments may alleviate the negative impact of a ransomware attack, but we may be unwilling or unable to make such payments due to, for example, applicable laws or regulations prohibiting such payments. Similarly, supply-chain attacks have increased in frequency and severity.
Furthermore, our remote workforce poses increased risks to our information technology systems and data, as most of our employees work from home, utilizing network connections outside our premises.
Any of the previously identified or similar threats could cause a security breach or disruption. While we have not experienced any such security breach or other disruption to date, if such an event were to occur, it could result in unauthorized, unlawful, or accidental acquisition, modification, destruction, loss, alteration, encryption, disclosure of, or access to our sensitive information and cause interruptions in our operations, including material disruptions of our development programs and business operations.
We may expend significant resources or modify our business activities (including our clinical trial activities) to try to protect against security breaches and disruptions. While we have implemented security measures designed to protect against security incidents, there can be no assurance that these measures will be effective. We may be unable in the future to detect vulnerabilities in our information technology systems because such threats and techniques change frequently, are often sophisticated in nature, and may not be detected until after a security breach or disruption has occurred. Despite our efforts to identify and remediate vulnerabilities, if any, in our information technology systems, our efforts may not be successful. Further, we may experience delays in developing and deploying remedial measures designed to address any such identified vulnerabilities.
Applicable data privacy and security obligations may require us to notify relevant parties of certain security breaches and disruptions. Such disclosures are costly, and the disclosure or the failure to comply with such requirements could lead to adverse consequences. If we (or a third party upon whom we rely) experience a security breach or other disruption, or are perceived to have experienced such events, we may experience adverse consequences, including: government enforcement actions (for example, investigations, fines, penalties, audits, and inspections); additional reporting requirements and/or oversight; restrictions on processing sensitive information (including personal data); litigation (including class claims); indemnification obligations; negative publicity; reputational harm; monetary fund diversions; interruptions in our operations (including availability of data); financial loss; and other similar harms. In particular, since we sponsor clinical trials, any breach or disruption that compromises patient data and identities could generate significant reputational damage, which may affect trust in us and our ability to recruit for future clinical trials. Additionally, the loss of clinical trial data from completed or future clinical trials could result in delays in our regulatory approval efforts and significantly increase our costs to recover or reproduce the data.
Our contracts may not contain limitations of liability, and even where they do, there can be no assurance that limitations of liability in our contracts are sufficient to protect us from liabilities, damages, or claims related to our data privacy and security obligations. Furthermore, we cannot be sure that our insurance coverage will be adequate or sufficient to protect us from or to mitigate liabilities arising out of our privacy and security practices, that such coverage will continue to be available on commercially reasonable terms or at all, or that such coverage will pay future claims.