We depend on sophisticated software applications (including artificial intelligence), complex information technology systems, computing infrastructure and cloud service providers (collectively, "IT systems") to conduct critical operations. Certain of these systems are managed, hosted, provided or used by third parties, including Merck pursuant to a transition services agreement (the "Transition Services Agreement" or "TSA"), to assist in conducting our business. Disruption, degradation, destruction or manipulation of these IT systems through intentional or accidental means by our employees, third parties with authorized access or cyber threat actors could adversely affect key business processes. The size and complexity of our IT systems, and those of our third-party providers with whom we contract, make such systems potentially vulnerable to service interruptions. In addition, we and our third-party providers have experienced and expect to continue to experience phishing attempts, scanning attempts of our network, and other attempts of unauthorized access to our computer environment. Such attacks are increasingly sophisticated and are made by groups and individuals with a wide range of motives and expertise, including state and quasi-state actors, criminal groups, "hackers" and others. These attacks could lead to loss of confidentiality, integrity and/or availability of our data, applications or systems.
In the ordinary course of business, we and our third-party providers collect, store and transmit large amounts of confidential information (including trade secrets or other intellectual property, proprietary business information and personal information), and we must do so in a secure manner to maintain the confidentiality and integrity of such confidential information. The size and complexity of we and our third-party providers' systems and the large amounts of confidential information present on them also makes them potentially vulnerable to security breaches from inadvertent or intentional actions by our employees, partners or vendors, or from attacks by malicious third parties. Maintaining the confidentiality, integrity, and availability of this confidential information (including trade secrets or other intellectual property, proprietary business information and personal information) is important to our competitive business position. However, such information can be difficult to protect and could be compromised.
While we have taken steps to protect such information, and to ensure that the third-party providers on which we rely have taken adequate steps to protect such information, there can be no assurance that our efforts to protect our data and IT systems or the efforts of third-party providers to protect their IT systems will be successful in preventing disruptions. A breach of our IT systems or our third-party providers' IT systems, such as cloud-based systems, or the accidental loss, inadvertent disclosure, unapproved dissemination, misappropriation or misuse of trade secrets, proprietary information, or other confidential information, whether as a result of theft, hacking, fraud, trickery, other forms of deception, or any other cause, could enable others to produce competing products, use our proprietary technology or information, and/or adversely affect our business position.
Further, any such interruption, security breach, or loss, misappropriation, and/or unauthorized access, use or disclosure of confidential information, including personal information regarding our patients and employees, or the modification of critical data, could result in financial, legal, business, and reputational harm to us, including loss of revenue, loss of critical or sensitive information from our or our third-party providers' databases or IT systems, and substantial remediation and recovery costs.