We rely on information technology systems, some of which are provided or managed by third parties, to process, transmit and store electronic information (including sensitive data such as confidential business information and/or personally identifiable data relating to employees, customers, and other business partners), and to manage or support a variety of critical business processes and activities (such as receiving and fulfilling orders, billing, collecting and making payments, shipping products, providing services and support to customers and fulfilling contractual obligations). Errors, defects, security issues or other vulnerabilities in third-party technology or in the integration of third-party technology with our systems could result in issues that could harm our business. In addition, some products or software we sell to customers may connect to our systems for maintenance or other purposes. These systems, products and services (including those we acquire through business acquisitions) may be damaged, disrupted or shut down due to attacks by computer hackers, computer viruses, ransomware, human error or malfeasance, power outages, hardware failures, telecommunication or utility failures, catastrophes or other unforeseen events, and in any such circumstances our system redundancy and other disaster recovery planning may be ineffective or inadequate. Attacks may also target hardware, software and information installed, stored or transmitted in our products after such products have been purchased and incorporated into third-party products, facilities or infrastructure. Our information technology systems have been subject to computer viruses, malicious codes, unauthorized access and other cyber-attacks, and we expect the sophistication and frequency of such attacks to continue to increase. Unauthorized tampering, adulteration or interference with our products may adversely affect product functionality and result in loss of data, risk to product safety and product recalls or field actions.
Any attacks, breaches, incidents, compromises or other disruptions or damage could: interrupt our operations or the operations of our customers and partners; delay production and shipments; result in misappropriation, destruction or unauthorized disclosure of our and our customers' intellectual property, trade secrets, personal data, or other confidential information; damage customer, business partner, and employee relationships, and our reputation; or result in defective products or services, legal claims and proceedings, liability and penalties under privacy laws and increased costs for security and remediation, each of which could adversely affect our business, reputation and financial statements.
Further, a significant number of our employees work remotely, which exposes us to greater cybersecurity risks. Any inability to maintain reliable information technology systems and appropriate controls with respect to global data privacy and security requirements and prevent data breaches can result in adverse regulatory consequences, business consequences and litigation.