We rely extensively on information technology ("IT") and operational technology ("OT") systems, networks and services, including Internet sites, data hosting and processing facilities and tools and other hardware, software and technological applications and platforms, some of which are managed, hosted, provided and/or used by third parties or their vendors, to assist in conducting business. The various uses of these systems, networks and services include, but are not limited to:
- ordering and managing materials from suppliers;- converting materials to finished products;- managing our supply chain network;- shipping products to customers;- marketing and selling products to consumers;- processing transactions;- summarizing and reporting results of operations;- hosting, processing and sharing confidential and proprietary research, business plans and financial information;- complying with regulatory, legal or tax requirements;- providing data security; and - handling other processes necessary to manage our business.
Increased cyber-security threats and cyber-crime, including advanced persistent threats, computer viruses, ransomware, other types of malicious code, hacking, phishing and social engineering schemes designed to provide access to our networks or data, pose a potential risk to the security of our IT and OT systems, networks and services, as well as the confidentiality, availability and integrity of our data. In addition, the rapid evolution and increased adoption of emerging technologies, such as artificial intelligence, may intensify our cybersecurity risks. Cyber threats are becoming more sophisticated, are constantly evolving and are being made by groups and individuals with a wide range of expertise and motives, increasing the difficulty of preventing, detecting and successfully defending against them. Furthermore, our relationships with, and access provided to, third parties and their vendors may create difficulties in anticipating and implementing adequate preventative measures or fully mitigating harms after an attack or breach occurs.
We cannot guarantee that our security efforts will prevent attacks and resulting breaches or breakdowns of our, or our third-party service providers', databases or systems. If the IT or OT systems, networks or service providers relied upon fail to function properly, or if we suffer a loss or disclosure of customers' and consumers' data, business or stakeholder information, due to any number of causes, ranging from catastrophic events to power outages to security breaches, or the inability to effectively address these failures on a timely basis, we may suffer interruptions in our ability to manage and conduct operations, a risk of government enforcement action, litigation and possible liability, and reputational, competitive and/or business harm, which may adversely impact our results of operations and/or financial condition. In addition, if our service providers, suppliers or customers experience a breach or unauthorized disclosure or system failure, their business could be disrupted or otherwise negatively affected, which may result in a disruption in our supply chain or reduced customer orders or other business operations, which would adversely affect us.