high match confidence
Sentence-level differences:
- Reworded sentence: "We rely extensively on our technology infrastructure, including associated information technology systems, applications, processes, and related personnel to operate our day-to-day business and to collect, use, retain, manage, transmit, and protect transactions and data."
- Reworded sentence: "In managing our business, we also rely heavily on the integrity of, security of, and consistent access to, systems that provide operational and financial data and capabilities related to sales (both in store and online), customer data, supplier data, associate data, jobseeker data, partner data, demand forecasting, merchandise ordering, inventory replenishment, supply chain management, payment processing, order fulfillment, customer service, and post-purchase support."
- Reworded sentence: "Our technology infrastructure and the third-party systems with which we interact, as well as any systems those third parties utilize, are subject to, and on occasion have experienced, damage, interruption, or malicious activity from a number of causes, including power and other critical infrastructure outages; computer and telecommunications failures; computer viruses; data or security breaches; internal or external data theft or misuse; cyber-attacks, including the use of malicious codes, worms, phishing, smishing, vishing, spyware, denial of service attacks, and ransomware; responsive containment measures by us that may involve voluntarily taking systems offline; natural disasters and catastrophic events such as fires, floods, earthquakes, tornadoes, hurricanes, or other extreme weather events; public health concerns, such as pandemics and quarantines; geopolitical tensions or conflicts, military conflicts, acts of war, terrorism or civil unrest; other systems outages; inadequate or ineffective redundancy; and design or usage errors or malfeasance by our associates, contractors or third-party service providers."
- Reworded sentence: "In addition, we are currently making, and expect to continue to make, substantial investments in our technology infrastructure, systems, processes, and personnel, in certain cases with the assistance of strategic partners and other third-party service providers."
Current (2026):
We rely extensively on our technology infrastructure, including associated information technology systems, applications, processes, and related personnel to operate our day-to-day business and to collect, use, retain, manage, transmit, and protect transactions and data. Some of…
Read full text
We rely extensively on our technology infrastructure, including associated information technology systems, applications, processes, and related personnel to operate our day-to-day business and to collect, use, retain, manage, transmit, and protect transactions and data. Some of these systems are managed or provided by third-party service providers, including certain cloud platform providers. In managing our business, we also rely heavily on the integrity of, security of, and consistent access to, systems that provide operational and financial data and capabilities related to sales (both in store and online), customer data, supplier data, associate data, jobseeker data, partner data, demand forecasting, merchandise ordering, inventory replenishment, supply chain management, payment processing, order fulfillment, customer service, and post-purchase support. For these information technology systems, applications, and processes to operate effectively, we or our service providers must maintain and update them. Delays in the maintenance, updates, upgrading, or patching of these systems, applications or processes, as well as the actions taken to maintain, update, upgrade and patch, could, and on occasion have, impaired their operation and effectiveness or exposed us to security risks. Our technology infrastructure and the third-party systems with which we interact, as well as any systems those third parties utilize, are subject to, and on occasion have experienced, damage, interruption, or malicious activity from a number of causes, including power and other critical infrastructure outages; computer and telecommunications failures; computer viruses; data or security breaches; internal or external data theft or misuse; cyber-attacks, including the use of malicious codes, worms, phishing, smishing, vishing, spyware, denial of service attacks, and ransomware; responsive containment measures by us that may involve voluntarily taking systems offline; natural disasters and catastrophic events such as fires, floods, earthquakes, tornadoes, hurricanes, or other extreme weather events; public health concerns, such as pandemics and quarantines; geopolitical tensions or conflicts, military conflicts, acts of war, terrorism or civil unrest; other systems outages; inadequate or ineffective redundancy; and design or usage errors or malfeasance by our associates, contractors or third-party service providers. In addition, as more business activities have shifted online, and as certain of our support center associates work in a remote or hybrid environment, we continue to face an increased risk due to the potential failure of internal or external technology infrastructure as well as increased cybersecurity threats and attempts to breach our security networks. Although we and our third-party service providers seek to maintain our respective technology infrastructure and related systems and processes effectively and to successfully address the risk of compromise of their integrity, security and consistent operations of these systems, such efforts are not always successful. As a result, we or our service providers could experience, and on occasion have experienced, errors, interruptions, delays or cessations of service in key portions of our technology infrastructure, which could significantly disrupt our operations or impair data security; prevent us from efficiently accepting or fulfilling orders or providing services to customers; impact our ability to operate or access communications, financial or banking systems; be costly, time-consuming and resource-intensive to remedy; and adversely impact our reputation and relationship with our customers, associates, suppliers, shareholders or regulators. We may have to expend significant resources to mitigate the impact of any errors, interruptions, delays or cessations of service and may have insufficient recourse against service providers who experience such events. In addition, we are currently making, and expect to continue to make, substantial investments in our technology infrastructure, systems, processes, and personnel, in certain cases with the assistance of strategic partners and other third-party service providers. These investments involve replacing existing systems, some of which are older, legacy systems that are less flexible and efficient, with successor systems, and updating applications and websites; outsourcing certain technology and business processes to third-party service providers; making changes to existing systems, including the migration of applications to the cloud; maintaining or enhancing legacy systems that are not currently being replaced; designing or cost-effectively acquiring new systems with new functionality; or testing, developing and deploying AI tools, including generative AI. These efforts could result, and on occasion have resulted, in significant potential risks, including failure of the technology infrastructure to operate as designed, unexpected impacts on related systems or processes, potential loss or corruption of data, failures in security processes and internal controls, cost overruns, implementation delays or errors, disruption of operations, and the potential inability to meet business and reporting requirements. Any technology infrastructure implementation and transition difficulty may result in operational challenges, security or internal control failures, reputational harm, lost sales, increased costs, or other financial losses that could adversely affect our business, our relationships with our customers, and results of operations. Fiscal 2025 Form 10-K13 Fiscal 2025 Form 10-K13 Fiscal 2025 Form 10-K13 Fiscal 2025 Form 10-K 13 Table of Contents Table of Contents
View prior text (2025)
We rely extensively on information technology systems and related personnel to collect, use, retain, manage, transmit, and protect transactions and data. Some of these systems are managed or provided by third-party service providers, including certain cloud platform providers. In managing our business, we also rely heavily on the integrity of, security of, and consistent access to, systems that provide operational and financial data and capabilities related to sales (both in store and online), customer data, supplier data, associate data, job applicant data, partner data, demand forecasting, merchandise ordering, inventory replenishment, supply chain management, payment processing, order fulfillment, customer service, and post-purchase matters. For these information technology systems, applications, and processes to operate effectively, we or our service providers must maintain and update them. Delays in the maintenance, updates, upgrading, or patching of these systems, applications or processes, as well as the actions taken to maintain, update, upgrade and patch, could, and on occasion have, impaired their operation and effectiveness or exposed us to security risks. Our systems and the third-party systems with which we interact, as well as any systems those third parties utilize, are subject to, and on occasion have experienced, damage, interruption, or malicious activity from a number of causes, including power and other critical infrastructure outages; computer and telecommunications failures; computer viruses; data or security breaches; internal or external data theft or misuse; cyber-attacks, including the use of malicious codes, worms, phishing, smishing, vishing, spyware, denial of service attacks, and ransomware; responsive containment measures by us that may involve voluntarily taking systems offline; natural disasters and catastrophic events such as fires, floods, earthquakes, tornadoes, hurricanes, or other extreme weather events; public health concerns, such as pandemics and quarantines; geopolitical or military conflicts, acts of war, terrorism or civil unrest; other systems outages; inadequate or ineffective redundancy; and design or usage errors or malfeasance by our associates, contractors or third-party service providers. In addition, as more business activities have shifted online, and as many of our store support associates continue to work in a remote or hybrid environment, we face an increased risk due to the potential failure of internal or external information technology infrastructure as well as increased cybersecurity threats and attempts to breach our security networks. Although we and our third-party service providers seek to maintain our respective systems effectively and to successfully address the risk of compromise of the integrity, security and consistent operations of these systems, such efforts are not always successful. As a result, we or our service providers could experience, and on occasion have experienced, errors, interruptions, delays or cessations of service in key portions of our information technology Fiscal 2024 Form 10-K13 Fiscal 2024 Form 10-K13 Fiscal 2024 Form 10-K13 Fiscal 2024 Form 10-K 13 Table of Contents Table of Contents infrastructure, which could significantly disrupt our operations or impair data security; impact our ability to operate or access communications, financial or banking systems; be costly, time-consuming and resource-intensive to remedy; and adversely impact our reputation and relationship with our customers, associates, suppliers, shareholders or regulators. We may have to expend significant resources to mitigate the impact of any errors, interruptions, delays or cessations of service and may have insufficient recourse against service providers who experience such events. In addition, we are currently making, and expect to continue to make, substantial investments in our information technology systems, infrastructure and personnel, in certain cases with the assistance of strategic partners and other third-party service providers. These investments involve replacing existing systems, some of which are older, legacy systems that are less flexible and efficient, with successor systems; outsourcing certain technology and business processes to third-party service providers; making changes to existing systems, including the migration of applications to the cloud; maintaining or enhancing legacy systems that are not currently being replaced; designing or cost-effectively acquiring new systems with new functionality; or testing the use and incorporation of artificial intelligence, including generative artificial intelligence. These efforts could result, and on occasion have resulted, in significant potential risks, including failure of the systems to operate as designed, unexpected impacts on related systems or processes, potential loss or corruption of data, failures in security processes and internal controls, cost overruns, implementation delays or errors, disruption of operations, and the potential inability to meet business and reporting requirements. Any system implementation and transition difficulty may result in operational challenges, security or internal control failures, reputational harm, lost sales, increased costs, or other financial losses that could adversely affect our business, our relationships with our customers, and results of operations.