In the ordinary course of our business, we generate and store sensitive data, including research data, intellectual property and proprietary business information owned or controlled by ourselves or our employees, partners and other parties. We manage and maintain our applications and data utilizing a combination of on-site systems and cloud-based data centers. For example, VetGuardian cannot work without its dedicated cloud backend and, similarly, TRUVIEW™ would be greatly inhibited without the myZomedica cloud backend. We utilize external security and infrastructure vendors to manage parts of our data centers. These applications and data encompass a wide variety of business-critical information, including research and development information, commercial information and business and financial information. We face several risks relative to protecting this critical information, including loss of access risk, inappropriate use or disclosure, accidental exposure, unauthorized access, inappropriate modification, and the risk of our being unable to adequately monitor and audit and modify our controls over our critical information. This risk extends to the third-party vendors and subcontractors we use to manage this sensitive data or otherwise process it on our behalf.
Further, to the extent our employees are working away from the office, additional risks may arise as a result of dependance on the networking and security put into place by the employees. The secure processing, storage, maintenance, and transmission of this critical information is vital to our operations and business strategy, and we devote significant resources to protecting such information. Although we take reasonable measures to protect sensitive data from unauthorized access, use, or disclosure, no security measures can be perfect and our information technology and infrastructure may be vulnerable to attacks by hackers, infections by viruses or other malware, breaches due to erroneous actions or inaction by our employees or contractors, malfeasance, or other malicious or inadvertent disruptions. Any such breach or interruption could compromise our networks and the information stored there could be accessed by unauthorized parties, publicly disclosed, lost, or stolen. Any such access, breach, or other loss of information could result in legal claims or proceedings. Unauthorized access, loss, or dissemination could also disrupt our operations and damage our reputation, any of which could adversely affect our business.
Although we currently maintain cybersecurity insurance coverage, we cannot be certain that such coverage will be adequate for data security liabilities actually incurred, will cover any indemnification claims against us relating to any incident, will continue to be available to us on economically reasonable terms, or at all, or that any insurer will not deny coverage as to any future claim. The successful assertion of one or more large claims against us that exceed available insurance coverage, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or co-insurance requirements, could adversely affect our reputation, business, financial condition, and results of operations.