The Company depends on information technology and computerized systems to communicate and operate effectively, some of which are connected to networks of third parties that are not under the Company's direct control. The Company stores sensitive data on its servers and databases including proprietary business information, intellectual property and confidential employee or other personal data pertaining to the Company's business, customers, suppliers, OEMs, employees and other third parties. Attempts by others to gain unauthorized access to the Company's information technology systems and data have become more frequent and sophisticated. These attempts, which might be related to industrial or foreign government espionage, activism, or other motivations, include covertly introducing malware and "ransomware" to the Company's computers and networks, performing reconnaissance, impersonating authorized users, and stealing, corrupting or restricting the Company's access to data, among other activities.
As with most companies, the Company has experienced cyber-attacks, attempts to breach the Company's systems and other similar incidents, none of which, has resulted in loss of data or materially affected the Company's business, operations or financial results. The Company has addressed past cybersecurity breaches by working with leading providers of incident response, risk management and digital forensics services. In coordination with such service providers, Park also continues to update its infrastructure, security tools (including firewalls and anti-virus software), and employee training and processes, to protect against security incidents and to prevent their recurrence. While Company personnel have been tasked to detect and investigate such incidents, cybersecurity attacks and other data security breaches can and are expected to occur in the future and the Company may be unable to implement adequate preventive or remediation measures, as breach and disruption techniques change frequently and are generally not detected until after an incident has occurred.
The unauthorized use of the Company's intellectual property and/or confidential or personal information or any material disruption in the systems that store such information could materially harm the Company's competitive position, reduce the value of the Company's investment in research and development (through the loss of trade secrets or other proprietary and competitively sensitive information) and other strategic initiatives, compromise personally identifiable information regarding customers or employees, delay the Company's ability to access its information systems at critical times, cause operational disruptions and delays, jeopardize the security of the Company's facilities or otherwise materially and adversely affect the Company's business or financial results. Any intrusion may also result in material fines, penalties, governmental investigations and proceedings, litigation, diminished competitive advantages through reputational damages and increased operational expenses (including remediation and damage expenses). Many victims of cyber-attacks also are forced to pay significant ransoms or incur significant expenses to recover critical business systems and data. Additionally, the Company may incur additional costs to comply with its customers', including the U.S. Government's, requirements for data security and increased cybersecurity protections and standards. The Company may be similarly harmed if any of the foregoing incidents occur at third parties that are connected to the Company's networks and that are not under the Company's direct control.