Our operations depend on effective and secure information technology systems. Threats to information technology systems, including as a result of cyber-attacks and cyber incidents continue to grow. Cybersecurity risks could include, but are not limited to, malicious software, attempts to gain unauthorized access to our data and the unauthorized release, corruption or loss of our data and personal information, interruptions in communication, loss of our intellectual property or theft of our sensitive or proprietary technology, loss or damage to our data delivery systems, or other electronic security, including with our property and equipment. The security risks associated with information technology systems have increased in recent years because of the increased sophistication, activities and evolving techniques of perpetrators of cyber-attacks.
These cybersecurity risks could:
- Disrupt our operations and damage our information technology systems;- Subject us to various legal claims, penalties and fees by third parties;- Negatively impact our ability to compete;- Enable the theft or misappropriation of funds;- Cause the loss, corruption or misappropriation of proprietary or confidential information, expose us to litigation; and - Result in injury to our reputation, downtime, loss of revenue, and increased costs to prevent, respond to or mitigate cybersecurity events.
For example, in December 2020, we detected a ransomware incident (the "Ransomware Incident") impacting our operational and information technology systems, which caused service delays for our customers. If another cybersecurity event occurs, such as the Ransomware Incident, it could harm our business and reputation and could result in a loss of customers. Likewise, data privacy breaches by employees and others who access our systems may pose a risk that sensitive customer or vendor data may be exposed to unauthorized persons or to the public, adversely impacting our customer service, employee relationships and our reputation. Furthermore, any failure to comply with data privacy, security or other laws and regulations could result in claims, legal or regulatory proceedings, inquires or investigations.
While we continue to make efforts to evaluate and improve our systems and particularly the effectiveness of our security program, procedures and systems, it is possible that our business, financial and other systems could be compromised, which could go unnoticed for a prolonged period of time, and there can be no assurance that the actions and controls that we implement, or we cause third-party service providers to implement, will be sufficient to protect our systems, information or other property. Additionally, customers or third parties upon whom we rely on face similar threats, which could directly or indirectly impact our business and operations. The occurrence of a cyber-incident or attack could have a material adverse effect on our business, financial condition and results of operations. For more information about our cybersecurity oversight, see "Item 1C, Cybersecurity".