We and the third parties upon which we rely face a variety of evolving threats, which could cause security incidents, such as cyber-attacks, malicious internet-based activity, online and offline fraud, and other similar activities. Such threats are prevalent and continue to rise, are increasingly difficult to detect, and come from a variety of sources.
Despite the implementation of security and back-up measures designed to protect against security incidents, our internal computer, server, and other information technology systems as well as those of our third-party collaborators, consultants, contractors, suppliers, and service providers upon which we rely, may be vulnerable to various threats including, but not limited to, damage from physical or electronic break-ins, computer viruses, malware, ransomware, personnel misconduct or error, supply chain attacks, natural disasters, terrorism, war, telecommunication and electrical failure, denial of service, attacks enhanced or facilitated by artificial intelligence (AI), and other cyberattacks or disruptive incidents that could result in unauthorized access to, use or disclosure of, corruption of, or loss of sensitive, and/or proprietary data, including personal data, and health-related information, and could subject us to significant liabilities and regulatory and enforcement actions, and reputational damage. In particular, severe ransomware attacks are becoming increasingly prevalent and can lead to significant interruptions in our operations.
For example, the loss of clinical trial data from completed or ongoing clinical trials could result in delays in any regulatory approval or clearance efforts and significantly increase our costs to recover or reproduce the data, and subsequently commercialize the product. Additionally, theft of our intellectual property or proprietary business information could require substantial expenditures to remedy. Such theft could also lead to loss of intellectual property rights through disclosure of our proprietary business information, and such loss may not be capable of remedying.
In addition, our reliance on third-party partners could introduce new cybersecurity risks and vulnerabilities. If we or our third-party collaborators, consultants, contractors, suppliers, or service providers upon which we rely were to suffer an attack or breach, for example, that resulted in the unauthorized access to or use or disclosure of personal data, we may have to notify consumers, partners, collaborators, government authorities, other stakeholders and the media, and may be subject to investigations, civil penalties, administrative and enforcement actions, and litigation, any of which could harm our business and reputation. Any such disclosures may involve inconsistent requirements and are costly, and the disclosure or the failure to comply with such requirements could lead to adverse consequences. Likewise, we rely on third parties to conduct clinical trials, and similar events relating to their computer systems could also have a material adverse effect on our business. While we may be entitled to damages if these providers fail to satisfy their data privacy or security-related obligations to us, any award may be insufficient to cover our damages, or we may be unable to recover such award. In addition, supply-chain attacks have increased in frequency and severity, and we cannot guarantee that third parties' infrastructure in our supply chain or our third-party partners' supply chains have not been compromised.
Our reliance on internet technology and the number of our employees, and those of our CROs, who continue to work remotely may create additional opportunities for cybercriminals to exploit vulnerabilities, as this has caused an increased usage of computers operated on home networks, while in transit, or in public locations. Furthermore, because the techniques used to obtain unauthorized access to, or to sabotage, systems change frequently and often are not recognized until launched against a target, we may be unable to anticipate these techniques or implement adequate preventative measures. We may also experience security breaches that may remain undetected for an extended period.
We take steps to detect and remediate vulnerabilities, but we may not be able to detect and remediate all vulnerabilities because the threats and techniques used to exploit the vulnerability change frequently and are often sophisticated in nature. Therefore, such vulnerabilities could be exploited but may not be detected until after a security incident has occurred. Unremediated high risk or critical vulnerabilities pose material risks to our business.
To the extent that any disruption or security breach were to result in a loss of, or damage to, our data or systems, or inappropriate or unauthorized access to or disclosure or use of confidential, proprietary, and/or sensitive data, we could incur liability and suffer reputational harm, and the development and commercialization of denifanstat, or future drug candidates could be delayed.
Our contracts may not contain limitations of liability, and even where they do, there can be no assurance that limitations of liability in our contracts are sufficient to protect us from liabilities, damages, or claims related to our data privacy and security obligations. We cannot be sure that any insurance coverage that we do or will obtain will be adequate or sufficient to protect us from or to mitigate liabilities arising out of our privacy and security practices, that such coverage will continue to be available on commercially reasonable terms or at all, or that such coverage will pay future claims.
In addition to experiencing a security incident, third parties may gather, collect, or infer sensitive information about us from public sources, data brokers, or other means that reveals competitively sensitive details about our organization and could be used to undermine our competitive advantage or market position. Furthermore, our sensitive information could be leaked, disclosed or revealed as a result of or in connection with our employees', personnel's or vendors' use of generative AI technologies.