high match confidence
Sentence-level differences:
- Reworded sentence: "Our business depends on a wide variety of complex IT systems and services, including cloud-based and other critical corporate services relating to, among other things, product research and development, financial reporting, product orders and fulfillment, HR, benefit plan administration, IT network management, and electronic communication and collaboration services."
- Reworded sentence: "In addition, software products we use and technologies produced by us have occasionally had in the past and may have in the future, vulnerabilities that, if left unmitigated, could reduce the overall level of security of the systems on which the software is installed."
- Reworded sentence: "Despite our internal controls and investment in security measures, we have, from time to time, been subject to disruptive cyber-attacks and unauthorized network intrusions and malware on our own IT networks or those of our service providers or business partners."
- Reworded sentence: "Businesses we acquire may increase the scope and complexity of our IT networks, and this may increase our risk exposure to cyber-attacks when there are difficulties integrating diverse legacy systems that support operations for the acquired businesses."
Current (2023):
Our business depends on a wide variety of complex IT systems and services, including cloud-based and other critical corporate services relating to, among other things, product research and development, financial reporting, product orders and fulfillment, HR, benefit plan…
Read full text
Our business depends on a wide variety of complex IT systems and services, including cloud-based and other critical corporate services relating to, among other things, product research and development, financial reporting, product orders and fulfillment, HR, benefit plan administration, IT network management, and electronic communication and collaboration services. These systems and services are both internally managed and outsourced, and in many cases we rely upon third-party data centers. Any failure of these internal or third-party systems and services to operate effectively could disrupt our operations and could have a material adverse effect on our business, financial condition and results of operations. Our operations are dependent upon our ability to protect our IT infrastructure against damage from business continuity events that could have a significant disruptive effect. Although these systems are designed to protect and secure our customers’, suppliers’ and employees’ confidential information, as well as our own proprietary information, we are, out of necessity, dependent on our vendors to adequately address cyber security threats to their own systems. In addition, software products we use and technologies produced by us have occasionally had in the past and may have in the future, vulnerabilities that, if left unmitigated, could reduce the overall level of security of the systems on which the software is installed. Cyber-attacks are increasing in number and sophistication, are well-financed, in some cases supported by state actors, and are designed to not only attack, but also to evade detection. Since the techniques used to obtain unauthorized access to systems, or to otherwise sabotage them, change frequently and are often not recognized until launched against a target, we 19 19 19 Table of Contents Table of Contents may be unable to anticipate these techniques or to implement adequate preventative measures. As a critical vendor in the digital supply chain for both governmental entities and critical infrastructure operators, we and our products may be targeted by those seeking to threaten the confidentiality, integrity and availability of systems supporting essential public services. Geopolitical instability may increase the likelihood that we will experience direct or collateral consequences from cyber conflicts between nation-states or other politically motivated actors targeting critical technology infrastructure. Accidental or willful security breaches or other unauthorized access to our information systems or the systems of our service providers and business partners, or the existence of computer viruses or malware (such as ransomware) in our or their data or software have in the past, and could in the future, expose us to a risk of information loss, business disruption, and misappropriation of proprietary and confidential information, including information relating to our products or customers and the personal information of our employees or third parties. Such an event could disrupt our business and result in, among other things, unfavorable publicity, damage to our reputation, loss of our trade secrets and other competitive information, litigation by affected parties and possible financial obligations for liabilities and damages related to the theft or misuse of such information, significant remediation costs, disruption of key business operations and significant diversion of our resources, as well as fines and other sanctions resulting from any related breaches of data privacy regulations (such as the General Data Protection Regulation), any of which could have a material adverse effect on our business, profitability and financial condition. While we may be entitled to damages if our vendors fail to perform under their agreements with us, any award may be insufficient to cover the actual costs incurred by us and, as a result of a vendor’s failure to perform, we may be unable to collect any damages. Despite our internal controls and investment in security measures, we have, from time to time, been subject to disruptive cyber-attacks and unauthorized network intrusions and malware on our own IT networks or those of our service providers or business partners. Although no such cyber security incidents have been material to Broadcom, we continue to devote resources to protect our systems and data from unauthorized access or misuse, and we may be required to expend greater resources in the future. Businesses we acquire may increase the scope and complexity of our IT networks, and this may increase our risk exposure to cyber-attacks when there are difficulties integrating diverse legacy systems that support operations for the acquired businesses. In addition, certain aspects of effective cybersecurity are dependent upon our employees, contractors and other trusted partners reliably safeguarding secrets (e.g., application credentials) and adhering to our security policies and access control mechanisms. We have in the past experienced, and expect in the future to experience, security incidents arising from a failure to properly handle such secrets or adhere to such policies and, although no such events have had a material adverse effect on our business, there can be no assurance that an insider threat will not result in an incident that is material to Broadcom. Our logging, alerting and cyber incident detection mechanisms may not cover every system potentially targeted by threat actors, may not have the capability to detect certain types of unauthorized activities, and may not capture and surface information sufficient to enable us to timely detect and take responsive action to insider or external threats. U.S. and foreign regulators, as well as customers and service providers, have also increased their focus on cyber security vulnerabilities and risks. Compliance with laws, regulations, and contractual provisions concerning privacy, cyber security, secure technology development, data governance, data protection, confidentiality and IP could result in significant expense, and any failure to comply could result in proceedings against us by regulatory authorities or other third parties and may also increase our overall compliance burden.
View prior text (2022)
Our business depends on various internally managed IT systems and outsourced IT services, including cloud-based and other critical corporate infrastructure services relating to, among other things, financial reporting, product orders and shipping, human resources, benefit plan administration, IT network development, network monitoring and electronic communication services, as well as third-party data centers. Any failure of these internal or third-party systems and services to operate effectively could disrupt our operations and could have a material adverse effect on our business, financial condition and results of operations. Our operations are dependent upon our ability to protect our IT infrastructure against damage from business continuity events that could have a significant disruptive effect. Although these systems are designed to protect and secure our customers’, suppliers’ and employees’ confidential information, as well as our own proprietary information, we are, out of necessity, dependent on our vendors to adequately address cyber security threats to their own systems. In addition, software products we use (including technologies produced by us) have occasionally had in the past and may have in the future, vulnerabilities that, if left unmanaged, could reduce the overall level of security of the systems on which the software is installed. 23 23 23 Table of Contents Table of Contents Cyber-attacks are increasing in number and sophistication, are well-financed, in some cases supported by state actors, and are designed to not only attack, but also to evade detection. Since the techniques used to obtain unauthorized access to systems, or to otherwise sabotage them, change frequently and are often not recognized until launched against a target, we may be unable to anticipate these techniques or to implement adequate preventative measures. Geopolitical instability, such as Russia’s invasion of Ukraine, may increase the likelihood that we will experience direct or collateral consequences from cyber conflicts between nation-states or other politically motivated actors targeting critical technology infrastructure. Accidental or willful security breaches or other unauthorized access to our information systems or the systems of our service providers, or the existence of computer viruses or malware (such as ransomware) in our or their data or software could expose us to a risk of information loss, business disruption, and misappropriation of proprietary and confidential information, including information relating to our products or customers and the personal information of our employees or third parties. Such an event could disrupt our business and result in, among other things, unfavorable publicity, damage to our reputation, loss of our trade secrets and other competitive information, litigation by affected parties and possible financial obligations for liabilities and damages related to the theft or misuse of such information, significant remediation costs, disruption of key business operations and significant diversion of our resources, as well as fines and other sanctions resulting from any related breaches of data privacy regulations (such as the General Data Protection Regulation), any of which could have a material adverse effect on our business, profitability and financial condition. While we may be entitled to damages if our vendors fail to perform under their agreements with us, any award may be insufficient to cover the actual costs incurred by us and, as a result of a vendor’s failure to perform, we may be unable to collect any damages. Despite our internal controls and investment in security measures, we have, from time to time, been subject to disruptive cyber-attacks or there have been attempts of unauthorized network intrusions and malware on our own IT networks. Although no such cyber security incidents have been material to Broadcom, we continue to devote resources to protect our systems and data from unauthorized access or misuse, and we may be required to expend greater resources in the future. U.S. and foreign regulators have also increased their focus on cyber security vulnerabilities and risks. Compliance with laws and regulations concerning privacy, cyber security, data governance, and data protection could result in significant expense, and any failure to comply could result in proceedings against us by regulatory authorities or other third parties. Further, customers and service providers increasingly demand rigorous contractual, certification and audit provisions regarding privacy, cyber security, data governance, data protection, confidentiality, and IP, which may also increase our overall compliance burden.