Security breaches in our facilities, computer networks, and data repositories may cause harm to our business and reputation and result in a loss of customers. Many of our solutions involve the storage and transmission of proprietary information and sensitive or confidential data, which are significantly complex with various uses across businesses and locations. With a large number of inter-related systems, keeping the technology current and managing vulnerabilities is challenging. As with other global companies, our systems are regularly subject to cyber-attacks, cyber-threats, attempts at fraudulent access, physical break-ins, computer viruses, attacks by hackers and similar disruptive problems. As cyber-threats continue to evolve, we are required to expend significant additional resources to continue to modify and enhance our protective measures and to investigate and remediate any information security vulnerabilities and incidents. Despite efforts to ensure the integrity of our systems and implement controls, processes, policies and other protective measures, we may not be able to anticipate or detect all security breaches or fraudulent access attempts, nor may we be able to implement guaranteed preventive measures against such security breaches or fraudulent access attempts. Cyber-threats are rapidly evolving and we may not be able to anticipate, prevent or detect all such attacks and could be held liable for any security breach or loss.
Third-party contractors, including cloud-based service providers, also may experience security breaches involving the storage and transmission of proprietary information. If users gain improper access to our data repositories, they may be able to steal, publish, delete or modify confidential third-party information that is stored or transmitted on our networks. Our business relies on the secure processing, transmission, storage and retrieval of confidential, proprietary and other information in our computer and data management systems and networks, and in the computer and data management systems and networks of third parties. In addition, to access our network, products and services, our customers and other third parties may use personal mobile devices or computing devices that are outside of our network environment and are subject to their own cybersecurity risks.
In addition, customers', employees' or other's misuse of and/or gaining fraudulent or unpermitted access to or failure to properly secure our information or services could cause harm to our business and reputation and result in loss of customers. Any such misappropriation and/or misuse of or failure to properly secure our information could result in us, among other things, being in breach of certain data protection and related legislation.
A security or privacy breach may affect us in the following ways:
- deterring customers from using our solutions; - deterring data suppliers from supplying data to us; - harming our reputation; - exposing us to liability; - increasing operating expenses to correct problems caused by the breach; - affecting our ability to meet customers' expectations; and/or - causing inquiry from governmental authorities.
Incidents in which consumer data has been fraudulently or improperly acquired or viewed, or any other security or privacy breaches, have in the past occurred, and may in the future occur and could go undetected. The number of potentially affected consumers identified by any future incidents is inherently uncertain. Any such incident could materially adversely affect our business, reputation, financial condition, operating results and cash flows. In addition, media or other reports of perceived security vulnerabilities to our systems or those of our third-party suppliers, even if no breach has been attempted or occurred, could also adversely impact our reputation and materially impact our business.