We rely extensively on global information technology systems, networks and services, certain of which are managed, hosted, provided and/or used by third parties or their vendors, to conduct our business. We use information technology systems, networks, and services throughout many of our key business processes, including, but not limited to, receiving customer orders, purchasing materials, producing inventory, shipping inventory to customers, collecting customer payments, and paying our employees and vendors.
Numerous and evolving information security threats, including advanced persistent threats and ransomware, pose a risk to the security of our systems, networks and services, as well as to the confidentiality, availability and integrity of our data and of our critical business operations. In addition, because the techniques, tools and tactics used in cyber-attacks frequently change and may be difficult to detect for periods of time, we may face difficulties in anticipating and implementing adequate preventative measures or fully mitigating harms after such an attack. Our information technology systems, networks and services have been, and will likely continue to be, subject to cybersecurity attacks. We have implemented and operate a cybersecurity program designed to protect and preserve the confidentiality, integrity and availability of our networks and systems as well as information that we own or is in our care. Notwithstanding our cybersecurity preparedness activities, we cannot guarantee that our security efforts or the security efforts of our third-party service providers will prevent all cybersecurity events. A material cybersecurity event could result in negative publicity, theft or other financial loss, modification or destruction of proprietary information or key information, manufacture of defective products, theft of personally identifiable information, and/or production downtimes and operational disruptions, which could adversely affect our results of operations.