high match confidence
Sentence-level differences:
- Reworded sentence: "This modernization includes the innovative, responsible, and secure use of artificial intelligence ("AI")."
- Reworded sentence: "As a result of increasingly complex AI risks, more frequent and sophisticated cyberattacks and the highly regulated nature of the insurance industry, we must continually implement new, and maintain existing, technology or adapt existing technology to protect against security and privacy incidents and to meet compliance requirements of new and proposed regulations."
Current (2026):
Our business is highly dependent upon the internet, third-party service providers, and information systems to operate in an efficient and resilient manner. We gather and maintain data for the purpose of conducting marketing, actuarial analysis, sales, and policy administration…
Read full text
Our business is highly dependent upon the internet, third-party service providers, and information systems to operate in an efficient and resilient manner. We gather and maintain data for the purpose of conducting marketing, actuarial analysis, sales, and policy administration functions. Our ability to modernize and maintain our information technology systems and infrastructure requires us to commit significant resources and effective planning and execution. This modernization includes the innovative, responsible, and secure use of artificial intelligence ("AI"). Malicious third parties, employee or agent errors or disasters affecting our information systems could impair our business operations, regulatory compliance, and financial condition. Employee or agent malfeasance or errors in the handling of our information systems may result in unauthorized access to customer or proprietary information, or an inability to use our information systems to efficiently support business operations. As a result of increasingly complex AI risks, more frequent and sophisticated cyberattacks and the highly regulated nature of the insurance industry, we must continually implement new, and maintain existing, technology or adapt existing technology to protect against security and privacy incidents and to meet compliance requirements of new and proposed regulations. Any incident affecting confidential information systems resulting from the above factors could damage our reputation in the marketplace, deter potential customers from purchasing our products, result in the loss of existing customers, 14 GL 2025 FORM 10-K 14 GL 2025 FORM 10-K 14 GL 2025 FORM 10-K Table of Contents Table of Contents subject us to significant civil and criminal liability, constrain cash flows, or require us to incur significant technical, legal, or other expenses. In addition, should we be unable to implement or maintain our technology effectively, efficiently, or in a timely manner, it could result in poor customer experience, poor agent experience, additional expenses, reputational harm, legal and regulatory actions, and other adverse consequences. This could also result in the inability to effectively support business operations.
View prior text (2025)
Our business is highly dependent upon the internet, third-party service providers, and information systems to operate in an efficient and resilient manner. We gather and maintain data for the purpose of conducting marketing, actuarial analysis, sales, and policy administration functions. Our ability to modernize and maintain our information technology systems and infrastructure requires us to commit significant resources and effective planning and execution. This modernization includes the responsible and secure use of emerging technologies like artificial intelligence. Malicious third parties, employee or agent errors or disasters affecting our information systems could impair our business operations, regulatory compliance, and financial condition. Employee or agent malfeasance or errors in the handling of our information systems may result in unauthorized access to customer or proprietary information, or an inability to use our information systems to efficiently support business operations. As a result of more frequent and sophisticated cyberattacks and the highly regulated nature of the insurance industry, we must continually implement new, and maintain existing, technology or adapt existing technology to protect against security and privacy incidents and to meet compliance requirements of new and proposed regulations. Any incident affecting confidential information systems resulting from the above factors could damage our reputation in the marketplace, deter potential customers from purchasing our products, result in the loss of existing customers, subject us to significant civil and criminal liability, constrain cash flows, or require us to incur significant technical, legal, or other expenses. In addition, should we be unable to implement or maintain our technology effectively, efficiently, or in a timely manner, it could result in poor customer experience, poor agent experience, additional expenses, reputational harm, legal and regulatory actions, and other adverse consequences. This could also result in the inability to effectively support business operations.