We are increasingly dependent upon information technology systems, infrastructure, and data to operate our business. We also rely on third party vendors and their information technology systems. Despite the implementation of security measures, our recovery systems, security protocols, network protection mechanisms, and other security measures and those of our current or future CROs or other contractors and consultants are vulnerable to system failure, interruption, compromise, or damage from data corruption, breakdown, computer hacking, malicious code (such as computer viruses or worms), fraudulent activity, employee misconduct, theft, or error, denial-of-service attacks, telecommunication, and electrical failures, natural disasters, public health epidemics, such as the COVID-19 pandemic, cyber-attacks by sophisticated nation-state and nation-state supported actors, or other system attacks, disruption, or accidents. We receive, generate and store significant and increasing volumes of personal health data and other confidential and proprietary information. There can be no assurance that we, or our collaborators, CROs, third-party vendors, contractors and consultants, will be successful in efforts to detect, prevent, protect against or fully recover systems or data from all breakdowns, service interruptions, attacks or breaches.
The costs to respond to a security breach and/or to mitigate any security vulnerabilities that may be identified could be significant, our efforts to address these problems may not be successful, and these problems could result in unexpected interruptions, delays, cessation of service, negative publicity, and other harm to our business and our competitive position. Remediation of any potential security breach may involve significant time, resources, and expenses. Despite our best efforts, our network security and data recovery measures and those of our vendors may still not be adequate to protect against such security breaches and disruptions, which could cause harm to our business, financial condition and results of operations.
Any cybersecurity incident could adversely affect our business, by leading to, for example, the loss of confidential information or other intellectual property, demands for ransom or other forms of blackmail or the unauthorized disclosure of personal, confidential or proprietary information of our employees, clinical trial participants, customers and others. We could be subject to regulatory actions taken by governmental authorities, litigation under laws that protect the privacy and security of personal information, or other forms of legal proceedings, which could result in significant investigations, liabilities or penalties.
We may not have adequate insurance coverage for security incidents or breaches. The successful assertion of one or more large claims against us that exceeds our available insurance coverage, or results in changes to our insurance policies (including premium increases or the imposition of large deductible or co-insurance requirements), could have an adverse effect on our business. In addition, we cannot be sure that our existing insurance coverage and coverage for errors and omissions will continue to be available on acceptable terms or that our insurers will not deny coverage as to any future claim.