We rely on information technology networks and systems, including the Internet, to process, transmit and store electronic information, and to manage or support a variety of business processes and activities. In addition, the provision of service to our customers and the operation of our networks and systems involve the storage and transmission of proprietary information and sensitive or confidential data, including personal information of customers, employees and others. These systems, some of which are managed by third-parties, may be susceptible to damage, disruptions or shutdowns due to failures during the process of upgrading or replacing software, databases, power outages, hardware failures, computer viruses, cyber-attacks (including denial of service, ransom or other attacks), malicious insiders, telecommunication failures, user errors or catastrophic events.
We seek to maintain a robust program of information security and controls. However, information technology security threats are increasing in both frequency and sophistication. As a result, we may be unable to anticipate these threats or to implement adequate preventative measures. Additionally, with a portion of our employees working from home during the COVID-19 pandemic, there may be increased opportunities for unauthorized access and cyber-attacks.
Security breaches and information technology disruptions could create financial liability, disrupt our operations, damage our reputation with customers, suppliers and other stakeholders, result in loss or misuse of proprietary or competitively sensitive information, compromise personally identifiable information, delay our ability to deliver services to customers, and jeopardize the security of our facilities. Breaches and disruptions could also result in a violation of U.S. and international privacy and other laws and subject us to litigation and other legal and regulatory proceedings or sanctions. Any of these occurrences could result in the loss of existing or potential customers and have a material adverse effect on our competitive position, results of operations, financial condition and cash flows. In addition, the cost and operational consequences of implementing further data or system protection measures could be significant and our efforts to deter, identify, mitigate and/or eliminate any security breaches may not be successful.