high match confidence
Sentence-level differences:
- Reworded sentence: "We rely on information technology systems, some of which are managed by third-parties, to process, transmit and store electronic information (including sensitive data such as confidential business information and personally identifiable data relating to employees, customers, other business partners and patients), and to monitor, manage, and support a variety of critical business processes and activities including receiving and fulfilling orders, billing, collecting and making payments, shipping products, providing services and support to customers and fulfilling contractual obligations."
- Reworded sentence: "Further, we also face information security risks due to our reliance on internet technology and use of hybrid work arrangements, which could strain our technology resources or create additional opportunity for cyber-attackers to exploit vulnerabilities."
- Added sentence: "Further, given the increasing sophistication of cyber-attacks and the complexity of techniques used, any of these attacks or breaches could potentially persist for an extended period before being detected."
- Added sentence: "As a result, it could take a significant time before an investigation can be completed and new disclosure regulations could result in us being required to disclose information about a material cybersecurity incident before it has been mitigated or resolved, or even fully investigated."
- Added sentence: "14 14 14 Table of Contents Table of Contents"
Current (2024):
We rely on information technology systems, some of which are managed by third-parties, to process, transmit and store electronic information (including sensitive data such as confidential business information and personally identifiable data relating to employees, customers,…
Read full text
We rely on information technology systems, some of which are managed by third-parties, to process, transmit and store electronic information (including sensitive data such as confidential business information and personally identifiable data relating to employees, customers, other business partners and patients), and to monitor, manage, and support a variety of critical business processes and activities including receiving and fulfilling orders, billing, collecting and making payments, shipping products, providing services and support to customers and fulfilling contractual obligations. Despite our implementation of certain controls to protect our systems and sensitive, confidential or personal data or information, these systems, products, data and services may be damaged, compromised, disrupted or shut down due to attacks by computer hackers, computer viruses, ransomware, human error or malfeasance, power outages, hardware failures, telecommunication or utility failures, catastrophes or other unforeseen events. In any such circumstances our system redundancy and other disaster recovery planning may be ineffective or inadequate. Further, we also face information security risks due to our reliance on internet technology and use of hybrid work arrangements, which could strain our technology resources or create additional opportunity for cyber-attackers to exploit vulnerabilities. Attacks may also target hardware, software and information installed, stored or transmitted in our products after such products have been purchased and incorporated into third-party products, facilities or infrastructure. Like most multinational corporations, our information technology systems have been subject to computer viruses, malicious codes, unauthorized access and other cyber-attacks and we expect the sophistication and frequency of such attacks to continue to increase. Any of the attacks, breaches or other disruptions or damage described above could interrupt our operations or the operations of our customers and partners, delay production and shipments, result in theft of intellectual property and trade secrets, damage customer and business partner relationships and our reputation or result in defective products or services, legal claims and proceedings, liability and penalties under privacy laws and increased costs for security and remediation, each of which could adversely affect our business, reputation and financial statements. Further, given the increasing sophistication of cyber-attacks and the complexity of techniques used, any of these attacks or breaches could potentially persist for an extended period before being detected. As a result, it could take a significant time before an investigation can be completed and new disclosure regulations could result in us being required to disclose information about a material cybersecurity incident before it has been mitigated or resolved, or even fully investigated. Although we maintain cyber risk insurance, damages and claims arising from such incidents may not be covered or may exceed the amount of any insurance available. 14 14 14 Table of Contents Table of Contents
View prior text (2023)
We rely on information technology systems, some of which are managed by third-parties, to process, transmit and store electronic information (including sensitive data such as confidential business information and personally identifiable data relating to employees, customers, other business partners and patients), and to manage or support a 15 15 15 Table of Contents Table of Contents variety of critical business processes and activities (such as receiving and fulfilling orders, billing, collecting and making payments, shipping products, providing services and support to customers and fulfilling contractual obligations). These systems, products and services may be damaged, disrupted or shut down due to attacks by computer hackers, computer viruses, ransomware, human error or malfeasance, power outages, hardware failures, telecommunication or utility failures, catastrophes or other unforeseen events. In any such circumstances our system redundancy and other disaster recovery planning may be ineffective or inadequate. Further, given a significant subset of our employees have transitioned to working from home, disaster recovery may take longer to complete. Attacks may also target hardware, software and information installed, stored or transmitted in our products after such products have been purchased and incorporated into third-party products, facilities or infrastructure. Like most multinational corporations, our information technology systems have been subject to computer viruses, malicious codes, unauthorized access and other cyber-attacks and we expect the sophistication and frequency of such attacks to continue to increase. Any of the attacks, breaches or other disruptions or damage described above could interrupt our operations or the operations of our customers and partners, delay production and shipments, result in theft of intellectual property and trade secrets, damage customer and business partner relationships and our reputation or result in defective products or services, legal claims and proceedings, liability and penalties under privacy laws and increased costs for security and remediation, each of which could adversely affect our business, reputation and financial statements. Although we maintain cyber risk insurance, damages and claims arising from such incidents may not be covered or may exceed the amount of any insurance available.