We rely on information technology systems and data processing that we or our service providers, collaborators, consultants, contractors or partners operate to collect, process, transmit and store electronic information in our day-to-day operations, including a variety of personal data, such as name, mailing address, email addresses, phone number and potentially clinical trial information. Additionally, we, and our service providers, collaborators, consultants, contractors or partners, do or will collect, receive, store, process, generate, use, transfer, disclose, make accessible, protect and share personal information, health information and other information to host or otherwise process some of our anticipated future clinical data and that of users, develop our products, to operate our business, for clinical trial purposes, for legal and marketing purposes, and for other business-related purposes. Our internal computer systems and data processing and those of our third-party vendors, consultants, collaborators, contractors or partners, including future CROs may be vulnerable to a cyber-attack (including supply chain cyber-attacks), malicious intrusion, breakdown, destruction, loss of data privacy, actions or inactions by our employees or contractors that expose security vulnerabilities, theft or destruction of intellectual property or other confidential or proprietary information, business interruption or other significant security incidents. As the cyber-threat landscape evolves, these attacks are growing in frequency, level of persistence, sophistication and intensity, and are becoming increasingly difficult to detect. In addition to traditional computer "hackers," threat actors, software bugs, malicious code (such as viruses and worms), employee theft or misuse, denial-of-service attacks (such as credential stuffing), phishing and ransomware attacks, sophisticated nation-state and nation-state supported actors now engage in attacks (including advanced persistent threat intrusions). These risks may be increased as a result of the COVID-19 pandemic, owing to an increase in personnel working remotely and higher reliance on internet technology. Furthermore, because the techniques used to obtain unauthorized access to, or to sabotage, systems change frequently and often are not recognized until launched against a target, we may be unable to anticipate these techniques or implement adequate preventative measures. We may also experience security breaches that may remain undetected for an extended period.
There can be no assurance that we, our service providers, collaborators, consultants, contractors or partners will be successful in efforts to detect, prevent or fully recover systems or data from all breakdowns, service interruptions, attacks or breaches of systems that could adversely affect our business and operations and/or result in the loss of critical or sensitive data. Any failure by us or our service providers, collaborators, consultants, contractors or partners to detect, prevent, respond to or mitigate security breaches or improper access to, use of, or inappropriate disclosure of any of this information or other confidential or sensitive information, including patients' personal data, or the perception that any such failure has occurred, could result in claims, litigation, regulatory investigations and other proceedings, significant liability under state, federal and international law, and other financial, legal or reputational harm to us. Further, such failures or perceived failures could result in liability and a material disruption of our development programs and our business operations, which could lead to significant delays or setbacks in our research, delays to commercialization of our product candidates, lost revenues or other adverse consequences, any of which could have a material adverse effect on our business, results of operations, financial condition, prospects and cashflow. For example, the loss or alteration of clinical trial data from future clinical trials could result in delays in our regulatory approval efforts and significantly increase our costs to recover or reproduce the data.
Additionally, applicable laws and regulations relating to privacy, data protection or cybersecurity, external contractual commitments and internal privacy and security policies may require us to notify relevant stakeholders if there has been a security breach, including affected individuals, business partners and regulators. Such disclosures are costly, and the disclosures or any actual or alleged failure to comply with such requirements could lead to a materially adverse impact on the business, including negative publicity, a loss of confidence in our services or security measures by our business partners or breach of contract claims. There can be no assurance that the limitations of liability in our contracts would be enforceable or adequate or would otherwise protect us from liabilities or damages if we fail to comply with applicable data protection laws, privacy policies or other data protection obligations related to information security or security breaches.