We use information technology and other computer resources to carry out important operational activities and to maintain our business records. As part of our normal business activities, we permit certain employees to perform some or all of their business activities remotely, we collect and store certain personal identifying and/or confidential information relating to our employees, customers, vendors and suppliers, and we maintain operational and financial information related to our business. Furthermore, we rely on products and services provided by third-party suppliers to operate certain critical business systems, including without limitation, cloud-based infrastructure, encryption and authentication technology, email, and other functions, which exposes us to supply-chain attacks or other business disruptions.
We face risks associated with security breaches through cyber-attacks or cyber-intrusions, malware, computer viruses and malicious codes, ransomware, attachments to e-mail, unauthorized access attempts, denial of service attacks,phishing, social engineering, persons with access to systems inside our organization, and other significant disruptions of our information technology networks and related systems. The risk of a security breach has generally increased as the frequency, intensity and sophistication of attempted attacks and intrusions from around the world have increased. Even the most well protected information, networks, systems and facilities remain potentially vulnerable because the techniques, tools and tactics used in such attempted security breaches evolve and generally are not recognized until launched against a target, and in some cases are designed to not be detected and, in fact, may not be detected. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers, disaster recovery or other preventative or corrective measures, and thus it is impossible for us to entirely counteract this risk or fully mitigate the harms after such an attack.
We have implemented certain systems and processes intended to address ongoing and evolving cybersecurity risks, secure our information technology, applications and computer systems, and prevent unauthorized access to or loss of sensitive, confidential and personal data. Although we and our service providers employ what we believe are adequate security, disaster recovery and other preventative and corrective measures, our security measures, taken as a whole, may not be sufficient for all possible situations and may be vulnerable to, among other things, fraud, hacking, employee error, system error, and faulty password management. Additionally, we rely on third-parties for virtually all of our operating infrastructure, who may themselves have standards of materiality of cybersecurity risks that differ from the materiality standards of Tivic itself.
Our ability to conduct our business may be impaired if our or our services providers' information technology networks, systems or resources, including our and their websites or e-mail systems, are compromised, degraded, damaged or fail, whether due to a virus or other harmful circumstance, fraud, intentional penetration or disruption of our or their information technology resources by:
- a third party,- natural disaster,- a failure of hardware or software due to a design or programmatic flaw,- a failure of hardware or software security controls,- telecommunications system failure,- service provider error or failure,- fraudulent transactions,- intentional or unintentional personnel actions,- lost connectivity to our networked resources, or - a failure of disaster recovery system.
A significant and extended disruption could damage our business or reputation and cause, amongst other things, loss of revenues or customer relationships, unintended and/or unauthorized public disclosure or the misappropriation of proprietary, personal identifying and confidential information, and us to incur significant expenses to address and remediate or otherwise resolve these kinds of issues. Our disaster recovery procedures and contingency planning rely heavily on third-party providers and may prove insufficient to fully protect Tivic operations and business interests
The release of confidential information may also lead to litigation or other proceedings against us by affected individuals, business partners and/or regulators, and the outcome of such proceedings, which could include losses, penalties, fines, injunctions, expenses and charges recorded against our earnings and cause us reputational harm and/or could have a material and adverse effect on our business, financial position or results of operations.