The Company experiences malicious attacks and other attempts to gain unauthorized access to its systems on a regular basis.
These attacks seek to compromise the confidentiality, integrity or availability of confidential information or disrupt normal
business operations, and could, among other things, impair the Company’s ability to attract and retain customers for its products
and services, impact the Company’s
stock price, materially damage commercial relationships, and expose the Company to
litigation or government investigations, which could result in penalties, fines or judgments against the Company. Globally, attacks
are expected to continue accelerating in both frequency and sophistication with increasing use by actors of tools and techniques
that are designed to circumvent controls, avoid detection, and remove or obfuscate forensic evidence, all of which hinders the
Company’s ability to identify, investigate and recover from incidents. In addition, attacks against the Company and its customers
can escalate during periods of severe diplomatic or armed conflict.
Although malicious attacks perpetrated to gain access to confidential information,
including personal information, affect many
companies across various industries, the Company is at a relatively greater risk of being targeted because of its high profile and
the value of the confidential information it creates, owns, manages, stores and processes.
The Company has implemented systems and processes intended to secure its information technology systems and prevent
unauthorized access to or loss of sensitive data, and mitigate the impact of unauthorized access, including through the use of
encryption and authentication technologies. As with all companies, these security measures may
not be sufficient for all
eventualities and may be vulnerable to hacking, ransomware attacks, employee error, malfeasance,
system error, faulty
password management or other irregularities. For example, third parties can fraudulently induce the Company’s or its vendors’
employees or customers into disclosing user names, passwords or other sensitive information, which can, in turn, be used for
unauthorized access to the Company’s or its vendors’ systems and services. To help protect customers and the Company, the
Company deploys and makes available technologies like multifactor authentication, monitors its services and systems for
unusual activity and may freeze accounts under suspicious circumstances, which, among other things, can result in the delay or
loss of customer orders or impede customer access to the Company’s products and services.
While the Company maintains insurance coverage that is intended to address certain
aspects of data security risks, such
insurance coverage may be insufficient to cover all losses or all types of claims that may arise.
Dostları ilə paylaş: