In the ordinary course of our business, we, and the third parties with which we work, process substantial amounts of sensitive information.
Cyberattacks, malicious internet-based activity, online and offline fraud, and other similar activities threaten the confidentiality, integrity, and availability of such sensitive information and IT systems, and those of the third parties on which we rely. Cloud-based platform providers of products and services have been targeted by such activities and are expected to continue to be targeted. The threats posed by such activities are prevalent and continue to grow, are increasingly difficult to detect, and come from a variety of sources, including traditional computer "hackers," threat actors, "hacktivists," organized criminal threat actors, personnel (such as through theft or misuse), sophisticated nation-states, and nation-state-supported actors.
Some actors now engage and are expected to continue to engage in cyberattacks including, without limitation, nation-states and nation-state-supported actors for geopolitical reasons and in conjunction with military conflicts and defense activities. During times of war and other major conflicts, we, the third parties with which we work, and our customers may be vulnerable to a heightened risk of these attacks, including retaliatory cyberattacks, that could materially disrupt our systems and operations, supply chain, and ability to produce, sell, and maintain the availability of our products, services, and platform.
We, the third parties with which we work, and our customers are subject to a variety of evolving threats, including, but not limited to, social-engineering attacks (including through deep fakes, which may be increasingly difficult to identify as fake, and phishing attacks), malicious code (such as viruses and worms), malware (including as a result of advanced persistent threat intrusions), denial-of-service attacks (such as credential stuffing), credential harvesting, personnel misconduct or error, break-ins, ransomware attacks, supply chain attacks, software bugs, server malfunctions, software or hardware failures, loss of data or other IT assets, adware, telecommunications failures, attacks enhanced or facilitated by AI, and other similar threats. Our products and services may also be subject to fraudulent usage and schemes, including from third parties accessing customer accounts or viewing data from our platform. In addition, remote work has become more common and has increased risks to our IT systems and data, as more of our employees utilize network connections, computers, and devices outside our premises or network, including working at home, while in transit, and in public locations.
Severe ransomware attacks, including by organized criminal threat actors, nation-states, and nation-state-supported actors, are becoming increasingly prevalent and severe and can lead to significant interruptions in our operations, loss of sensitive information and income, reputational harm, and diversion of funds. While extortion payments have the potential to alleviate the negative impact of a ransomware attack, we may be unwilling or unable to make such payments for a variety of reasons, including, but not limited to, applicable laws or regulations prohibiting such payments.
Any sensitive information (including confidential, competitive, proprietary, or personal data) that we input into a third-party generative AI platform could be leaked or disclosed to others, including if sensitive information is used to train the third party's AI model. Additionally, where an AI model ingests personal data and makes connections using such data, those technologies may reveal other personal or sensitive information generated by the model.
We employ a shared responsibility model where our customers are responsible for using, configuring, and otherwise implementing security measures related to our products, services, and platform, and products in a manner that meets applicable cybersecurity standards, complies with laws, and addresses their information security risk. As part of this model, we make certain security features available to our customers that can be implemented at our customers' discretion, or identify security areas or measures for which our customers are responsible. For example, depending on the product implementation, our customers are responsible for adding and enforcing multi-factor authentication to access their accounts. In certain cases where our customers choose not to implement, or incorrectly implement, such features or measures, misuse our services, or otherwise experience their own vulnerabilities, policy violations, credential exposure or security incidents, even if we or our platform are not the cause of any customer security issue or incident that may result, our customer relationships, reputation, and operating results may be adversely impacted.
It may be difficult and/or costly to detect, investigate, mitigate, contain, and remediate a security incident. Our efforts to do so may not be successful. Actions taken by us, or the third parties with which we work, to detect, investigate, mitigate, contain, and remediate a security incident could result in outages, data losses, and disruptions of our business. Threat actors may also gain access to other networks and systems after a compromise of our networks and systems.
We rely upon third-party developers, service providers, and technologies to operate critical business systems to process sensitive information in a variety of contexts, including, without limitation, third-party providers of cloud-based infrastructure, encryption and authentication technology, employee email, and other functions. We may also rely on third-party developers, service providers, and technologies to provide other products or services to operate our business. Our ability to monitor these third parties' information security practices is limited, and these third parties may not have adequate information security measures in place. We may also share or receive sensitive information with or from third parties. If our third-party service providers experience a security incident or other interruption, we could experience adverse consequences. While we may be entitled to damages if our third-party service providers fail to satisfy their privacy or security-related obligations to us, any award may be insufficient to cover our damages or we may be unable to recover such award. In addition, supply chain attacks have increased in frequency and severity, and we cannot guarantee that third parties and infrastructure in our supply chain or our third-party partners' supply chains have not been compromised or that they do not contain exploitable defects or bugs that could result in a breach of or disruption to our IT systems (including our products, services, and platform) or the third-party IT systems that support us and our services.
While we have implemented security measures designed to help protect against security incidents, there can be no assurance that these measures are or will be effective. Although we take certain steps to detect, mitigate, and remediate various vulnerabilities in our IT systems (such as our hardware and/or software, including that of third parties with which we work, and those used to operate our products), doing so takes significant time and resources and we are not able to detect, and have not been able to remediate, all vulnerabilities in our IT systems (including those that operate our products and those that are used to provide our services).
Additionally, our business depends upon the appropriate and successful implementation of our services by our customers. If our customers fail to use our service according to our specifications, our customers may suffer a security incident on their own systems or other adverse consequences. Even if such an incident is unrelated to our security practices, it could result in our incurring significant economic and operational costs in investigating, remediating, and implementing additional measures to further protect our customers from their own vulnerabilities, as well as in reputational harm.
For several reasons, including the introduction of new vulnerabilities, resource constraints, competing business demands, dependence on third parties, and technological challenges, a large number of high and critical unremediated vulnerabilities exist in our IT systems and will exist until our remediation efforts are completed. We have taken, and are taking, steps designed to mitigate these vulnerabilities in a prioritized manner based on our assessment of the risk posed by such vulnerabilities. Despite our efforts, there can be no assurance that these vulnerability mitigation measures will be effective. Moreover, we have experienced delays in developing and deploying remedial measures and patches designed to address any identified vulnerabilities. Vulnerabilities could be exploited and result in a security incident.
Any of the previously identified or similar threats could cause a security incident or other interruption. A security incident or other interruption could result in unauthorized, unlawful, or accidental acquisition, modification, destruction, loss, alteration, encryption, disclosure of, or access to our sensitive information or IT systems, or those of the third parties with which we work (including our customers). A security incident or other interruption could disrupt our ability, and that of third parties with which we work, to provide our products, services, and platform. Our current security measures may be insufficient to prevent or deter such incidents or interruptions. We expend significant resources and have modified our business activities to try to protect against security incidents. Certain data privacy and security obligations have required us to implement and maintain security measures or industry-standard or reasonable security measures to protect our IT systems and sensitive information.
In addition, business transactions, such as acquisitions or integrations, have exposed us to these same or additional cybersecurity risks and vulnerabilities, as our systems could be negatively affected by vulnerabilities present in acquired or integrated entities' systems and technologies. Furthermore, we have discovered security issues that were not found during due diligence of such acquired or integrated entities, and it has been and may continue to be difficult to integrate companies into our IT environment and security program.
Applicable data privacy and security obligations, including data breach laws and contractual obligations to various customers, may require us to notify relevant stakeholders, including affected individuals, customers, regulators, and investors, of security incidents. For example, SEC rules require disclosure on Form 8-K of the material aspects of the nature, scope, and timing of any material cybersecurity incident and the material impact or reasonably likely material impact of such incident. Determining whether a cybersecurity incident is notifiable or material may not be straightforward, and any such disclosures could be costly and could lead to negative publicity, loss of customer or partner confidence in the effectiveness of our security measures, diversion of management's attention, governmental investigations, and the expenditure of significant capital and other resources to respond to or alleviate problems caused by the actual or perceived security breach.
If we or third parties with which we work experience a security incident or are perceived to have experienced a security incident, we could experience significant consequences, including, but not limited to, government enforcement actions (e.g., investigations, audits, inspections, fines, and penalties), litigation (including class-related claims), additional reporting requirements and oversight, restrictions or bans on processing sensitive information (including personal data and sensitive third-party and customer data), loss of revenue or profits, loss of customers or sales, interruptions or stoppages in or modifications to our operations (including availability of data), indemnification obligations, negative publicity, and reputational harm. Security incidents and attendant consequences may also cause customers to stop using our products, services, and platform (including by declining to renew their subscriptions), deter new customers from using our products, services, and platform, and negatively impact our ability to grow and operate our business. In addition, security incidents experienced by others, such as competitors or customers, may lead to widespread negative publicity for us, our customers, or the construction software industry generally.
Our contracts may not contain indemnification, limitations of liability, or other protective provisions. Even where they do, there can be no assurance that indemnification clauses, limitations of liability, or other protective provisions in our contracts are applicable, enforceable, or sufficient to protect us from liabilities, damages, or claims related to our data privacy and security obligations. We cannot be sure that our general liability insurance coverage and coverage for cyber liability or errors or omissions will be adequate or sufficient to protect us from, or to mitigate liabilities arising out of, our data privacy and security practices, that such coverage will continue to be available on commercially reasonable terms or at all, or that such coverage will pay future claims. The successful assertion of one or more large claims against us that exceed available insurance coverage, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or co-insurance requirements, could materially adversely affect our business, financial condition, results of operations, and prospects.
In addition to experiencing a security incident, third parties may gather, collect, or infer sensitive information about us from public sources, data brokers, or other means that reveal competitively sensitive details about our organization and could be used to undermine our competitive advantage. Furthermore,sensitive information of our company or our customers could be leaked, disclosed, or revealed as a result of, or in connection with, our employees', personnel's, or vendors' use of generative AI technologies.
Our business depends upon the appropriate and successful implementation of our products by our customers. If our customers fail to use our products according to our specifications, our customers may suffer a security incident on their own systems or other adverse consequences. Even if such an incident is unrelated to our security practices, it could result in our incurring significant economic and operational costs in investigating, remediating, and implementing additional measures to further protect our customers from their own vulnerabilities and could result in reputational harm. To the extent we do not effectively address these risks, our business, financial condition, results of operations, and prospects could be materially adversely affected.