In the ordinary course of our business, we collect, use, and store sensitive data, including intellectual property, our proprietary business information and that of our suppliers and business partners, as well as personally identifiable information of our customers and employees. We also have outsourced elements of our information technology structure and, as a result, we are managing independent vendor relationships with third parties who may or could have access to our confidential information. Similarly, our business partners and other third-party providers possess certain of our sensitive data. The secure maintenance of this information is critical to our operations and business strategy. Our ability to conduct our business may be negatively impacted if our or our service providers' computer resources or connectivity are compromised, degraded, damaged, or if they fail.
Despite our security measures, our information technology and infrastructure may be vulnerable to cybersecurity attacks by hackers or breached due to employee error, malfeasance, or other disruptions, particularly with employees and others on data networks working increasingly from home. We, our partners, vendors, and other third-party providers could be susceptible to third-party attacks on our and their information security systems, which attacks are of ever-increasing levels of sophistication and are made by groups and individuals with a wide range of motives and expertise, including criminal groups. Any such breach could compromise our networks and the information stored there could be accessed, publicly disclosed, lost, or stolen. Any such access, disclosure, or other loss of information could result in legal claims or proceedings, liability under laws that protect the privacy of personal information, disrupt our operations, and damage our reputation, any of which could adversely affect our business.