Our internal computer systems and those of our current and any future customers, vendors, licensees, collaborators and other contractors or consultants are vulnerable to damage from computer viruses, unauthorized access, natural disasters, terrorism, war and telecommunication and electrical failures. While we have not experienced any such material system failure, accident or security breach to date, if such an event were to occur and cause interruptions in our operations, it could result in a disruption of our research and development and our business operations, whether due to a loss of our trade secrets or other proprietary information or other similar disruptions. To the extent that any disruption or security breach were to result in a loss of, or damage to, our data or applications, or inappropriate disclosure of confidential or proprietary information, we could incur liability, our competitive position could be harmed and the further development and commercialization of our recycling technologies could be delayed.
We could be subject to risks caused by misappropriation, misuse, leakage, falsification or intentional or accidental release or loss of information maintained in the information systems and networks of our company and our customers, vendors, licensees, collaborators and other contractors or consultants, including personal information of our employees and others, and company and third-party confidential data. In addition, outside parties may attempt to penetrate our systems or those of our customers, vendors, licensees, collaborators and other contractors or consultants or fraudulently induce our personnel or the personnel of third parties to disclose sensitive information in order to gain access to our data and/or systems. We may experience threats to our data and systems, including malicious codes and viruses, phishing and other cyberattack. The number and complexity of these threats continue to increase over time. If a material breach of, or accidental or intentional loss of data from, our information technology systems or those of our customers, vendors, licensees, collaborators and other contractors or consultants occurs, the market perception of the effectiveness of our security measures could be harmed and our reputation and credibility could be damaged. We could be required to expend significant amounts of money and other resources to repair or replace information systems or networks. In addition, we could be subject to regulatory actions and/or claims made by individuals and groups in private litigation involving privacy issues related to data collection and use practices and other data privacy laws and regulations, including claims for misuse or inappropriate disclosure of data, as well as unfair or deceptive practices.
Although we develop and maintain systems and controls designed to prevent these events from occurring, and we have a process to identify and mitigate threats, the development and maintenance of these systems, controls and processes is costly and requires ongoing monitoring and updating as technologies change and efforts to overcome security measures become increasingly sophisticated. Moreover, despite our efforts, the possibility of these events occurring cannot be eliminated entirely. As we outsource more of our information systems to vendors, engage in more electronic transactions with third parties, and rely more on cloud-based information systems, the related security risks will increase and we will need to expend additional resources to protect our technology and information systems. In addition, there can be no assurance that our internal information technology systems or those of our customers, vendors, licensees, collaborators and other contractors or consultants will be sufficient to protect us against breakdowns, service disruption, data deterioration or loss in the event of a system malfunction, or prevent data from being stolen or corrupted in the event of a cyberattack, security breach, industrial espionage attacks or insider threat attacks which could result in financial, legal, business or reputational harm.