We and third parties involved in our operations are increasingly dependent upon information technology systems, infrastructure, and data to operate our business. In the ordinary course of business, we currently and will continue to collect, store, and transmit confidential information (including trade secrets or other intellectual property, proprietary business information, including data from our research, preclinical studies, and clinical trials, and personal information). It is critical that we and these third parties do so in a secure manner to maintain the confidentiality, integrity, and availability of such information. For example, we have outsourced elements of our operations to third parties, and as a result we manage a number of third-party vendors that have access to our confidential information, including those that provide information technology and data security systems and services, and we do not have operational control over these third-party vendors. In addition, we currently and may in the future share or exchange confidential information with other third parties, such as collaborators, licensors, or strategic partners, none of which we have control over and all of which are subject to similar security risks as we are. As such, we are subject to risks not only from security incidents involving our own systems and networks, but also those of third parties with whom we work.
Despite the implementation of security measures (including edge technology designed to identify and protect our network from infiltration by third-party systems), our internal computer systems and those of any third parties involved in our operations, including our third-party research institution collaborators, CROs, CDMOs, and other service providers, contractors, and consultants, including vendors of information technology and data security systems and services, are vulnerable to damage and interruptions from cyberattacks, security breaches and incidents, computer viruses, ransomware, fraud, and other compromises and incidents involving or leading to unauthorized access to or loss, modification, unavailability, use, disclosure, or other processing of confidential information. In addition, certain systems or components thereof require enhanced or otherwise different security measures, which may require us to invest additional resources and may leave such systems more vulnerable to security compromises or incidents. These compromises and incidents may involve acts by current or former employees, service providers (including providers of information technology-specific services), nation states (including groups associated with or supported by foreign intelligence agencies), organized crime organizations, "hacktivists," or others. For example, SolarWinds Corporation (SolarWinds), a provider of information technology monitoring and management products and services that we used, experienced a cyberattack in 2020 that was likely the result of a supply chain attack by an outside nation state. We took steps to mitigate the vulnerabilities identified within these products and, following our investigations, concluded that our confidential information was not materially accessed, lost, or stolen as a result of this cyberattack. However, there may be unknown effects from this or other cyberattacks that have occurred or may occur in the future, any of which could have a material negative impact on our business. In addition, in certain cases, we may rely on or incorporate third-party software, code, or other similar materials into our systems, processes, and operations, such as in the case of internal software development, which exposes us to various risks, including that such third-party materials may have harmful components that could enable access and harm to our systems and confidential information. If we are unable to or otherwise do not detect these harmful components, or are unable to manage their effects, our business could be significantly harmed.
In addition, the geo-political climate, tensions between the United States and certain countries, including Russia and China, and other geopolitical events may increase our vulnerability to such cybersecurity attacks. For example, the conflict between Russia and Ukraine may create heightened threats of ransomware attacks and other cybersecurity threats for certain industries, including healthcare and pharmaceuticals. We continue to monitor and take steps to mitigate this risk, but we cannot ensure that such efforts will be sufficient to protect us from any such cyberattacks or other incidents. In addition, in July 2022, the heads of the FBI and MI5 issued joint warnings regarding the threat posed by China to national security due to the Chinese government's increasing use of cyber espionage to steal technology from Western corporations and disrupt Western business. Moreover, the biotechnology industry is one of the top industries that China has targeted for domestic growth and development, and it therefore may be a primary target for such cyber espionage efforts. We continue to monitor our systems and upgrade our security capabilities in order to mitigate risk. However, any access to or loss or theft of our confidential information in connection with a future cyberattack could have a material adverse effect on our business.
Threats involving the misuse of access to our network, systems, and information by our current or former employees or third parties involved in our operations, including service providers, contractors, vendors, or partners, whether intentional or unintentional, also pose a risk to the security of our network, systems, and information, including data. For example, we are subject to the risk that employees may inadvertently share confidential information with unintended third parties, or that departing employees may take, or create their own information based on, our confidential information upon leaving the company. In addition, any such insiders may be the victims of social engineering attacks that enable unauthorized third parties to access our network, systems, and information using an authorized person's credentials. We and our network, systems, and information are also vulnerable to malicious acts by insiders, including leaking, modifying, or deleting confidential information, or performing other acts that could materially interfere with our operations and business. Although we provide regular training to our employees regarding cybersecurity threats and best practices, we cannot ensure that such training or other efforts will prevent unauthorized access to or sabotage of our network, systems, and information.
Although we have not, to our knowledge, experienced any material system failure, accident, or security breach to date, because techniques used to obtain unauthorized access to or to sabotage systems are constantly evolving and generally are not recognized until they are launched against a target, we cannot be sure that our current practices, including our security and data protection efforts and investment in information security and technology will detect or prevent future significant breakdowns, data leakages, breaches in our systems or the systems of third parties involved in our operations, such as service providers, contractors, and collaborators, or other compromises or incidents that could have a material adverse effect upon our reputation, business, operations, or financial condition. If such an event were to occur, it could materially disrupt our operations and programs, the development of our product candidates could be delayed or otherwise negatively impacted, and our business could be significantly harmed. Any such event that leads to unauthorized access to or loss, modification, unavailability, use, disclosure, or other processing of personal information, including personal information regarding our clinical trial subjects or employees, or any reporting or belief that any such event or impact has occurred, could delay further development and commercialization of our product candidates, harm our reputation directly, require us to comply with federal or state breach notification laws and foreign law equivalents, subject us to mandatory corrective action, and otherwise subject us to liability under laws and regulations that protect the privacy and security of personal information. As a result, we could incur significant legal and financial exposure and reputational harm that could have a material adverse effect on our business. In any case, if we experience a cyberattack or security breach or incident, we could incur significant costs to remedy the resulting damage, including costs to deploy additional personnel and security and protection technologies, train employees, and engage third-party experts and consultants. We and the third parties involved in our operations may face difficulties and delays in identifying, responding to, and remediating security breaches and incidents, and we may find it necessary or appropriate to put in place additional measures designed to identify, protect against, and otherwise address cyberattacks and security breaches and incidents. Although we maintain cyber liability insurance, we cannot be certain that our coverage will be adequate for liabilities actually incurred or that insurance will continue to be available to us on commercially reasonable terms or at all.
Further, our personnel, and those of any third parties involved in our operations, including vendors, service providers, collaborators, contractors, and consultants, may develop and use artificial intelligence technologies in the course of performing work for us, including generative artificial intelligence technologies (GenAI) that have the ability to output new content and information based on user inputs. GenAI has the potential to benefit our business and operations, possibly significantly, including by potentially creating efficiencies and enabling powerful research and development that may otherwise not be possible, and we may be at a competitive disadvantage if we do not or are unable to use GenAI, or only use it for limited purposes. However, use of GenAI in connection with our confidential, proprietary, or otherwise sensitive information, including personal data, may result in leaks, disclosure, or otherwise unauthorized or unintended access to or use or other processing of such information, including incorporation of such information into the applicable GenAI system or use of such information to further refine and train the GenAI models. Any such access or use, or any improper or inappropriate use, of GenAI could, for example, reveal trade secrets or other confidential information that may enable third parties to replicate or improve upon our technologies and programs, advance their technologies or programs more rapidly than we do, or otherwise negatively impact the value of, or our ability to obtain or maintain, intellectual property rights. Access to and use and other processing of personal data may subject us to risks and potential liability and obligations under applicable data privacy laws, as described elsewhere in these Risk Factors. Further, we may use the output of GenAI in our technologies, programs, and other aspects of our business, and such output could incorporate third party intellectual property, or we may otherwise be unable to own, protect, further develop, or ultimately use such output, which could significantly harm our business to the extent such technologies, programs, or other aspects of our business rely upon such output. Such output may also be false, non-sensical, biased, or otherwise harmful to our operations and business if incorporated therein. Further, our ability to use GenAI or further develop or use its output may depend on access to specific third-party software and infrastructure, such as processing hardware or third-party artificial intelligence models, and we cannot control the availability or pricing of such software and infrastructure, especially in a highly competitive environment. We may also face novel and urgent cybersecurity risks and emerging ethical risks relating to the use of GenAI, which could adversely affect our operations, assets, including intellectual property and data, and reputation, as well as those of any third parties involved in our operations. Use of artificial intelligence technologies in general, and GenAI in particular, in our business could subject us to additional costs and expenses, litigation, regulatory actions and investigations, and other negative consequences. There is significant uncertainty with respect to the nature of the laws and regulations that have been and may in the future be adopted, including how such laws and regulations will be interpreted and applied, both within and outside of the U.S., with respect to the use of artificial intelligence technologies in general, and GenAI in particular, including the ownership of or right to use the output of GenAI. We may need to expend significant resources to modify and maintain our business practices to comply with such laws and regulations and to otherwise ensure appropriate and lawful use of artificial intelligence technologies, including GenAI and its output, in our technologies, programs, and other aspects of our business.
In addition, we have entered into and expect to continue to enter into collaboration, license, contract research, and manufacturing relationships with organizations that operate in certain countries that are at heightened risk of technology, data, and intellectual property theft through direct intrusion by private parties or foreign actors, including those affiliated with or controlled by state actors. If any theft or intrusion affects our technology, data, or intellectual property, the value of such technology, data, or intellectual property to our company may be diminished and our competitive position could be harmed. In such a case, our efforts to protect and enforce our intellectual property rights around the world may be inadequate to obtain a significant commercial advantage from such intellectual property, and we may be at heightened risk of losing our proprietary intellectual property rights around the world, including outside of such countries, to the extent such theft or intrusion destroys the proprietary nature of our intellectual property.