high match confidence
Sentence-level differences:
- Reworded sentence: "We rely on our information systems, as well as third-party information systems, to provide access to our web-based products and services, keep financial records, analyze results of operations, process orders and shipments, manage inventory, store confidential or proprietary information, and operate other critical functions."
- Reworded sentence: "While we have implemented network security and internal control measures, especially for the purpose of protecting our connected products and services from cyberattacks, and invested in our data and information technology infrastructure, these efforts have not always been successful in preventing, and there can be no assurance that these efforts (or any future investments or efforts) will prevent, a system disruption, attack, or security breach."
- Reworded sentence: "We have adopted measures to mitigate potential risks associated with information technology disruptions and cybersecurity threats; however, given the unpredictability of the timing, nature and scope of such disruptions and the evolving nature of cybersecurity threats, which vary in technique and sources, if we or our business partners or suppliers were to experience a system disruption, attack or security breach or incident that impacts any of our critical functions, or our customers were to experience a system disruption, attack or security breach or incident via any of our software or connected products and services, we could potentially be subject to production downtimes, operational and/or productivity delays, other detrimental impacts on our operations or ability to provide products and services to our customers, the compromise, misappropriation and/or unauthorized acquisition or disclosure of confidential or otherwise protected information, destruction or corruption of data, security breaches, other manipulation or misuse of our systems or networks, financial losses and additional costs from remedial actions, repairs to infrastructure, physical systems or data processing systems, increased cybersecurity and information technology protection costs, loss of business or potential liability, and/or damage to our reputation, any of which could have a material adverse effect on our business strategy, competitive position, results of operations, cash flows, financial condition, or prospects."
- Reworded sentence: "Furthermore, access to, public disclosure of, or other loss of data or information (including any of our confidential or proprietary information or personal data or information) as a result of an attack or security breach or incident has given, and in the future may give, rise to notification obligations to individuals, regulators, customers, employees, and others, and could result in governmental actions or private claims or proceedings, any of which could damage our reputation, cause a loss of confidence in our products and services, damage our ability to develop (and protect our rights to) our differentiated technologies and have a material adverse effect on the Company, our business strategy, financial condition, results of operations or prospects."
Current (2025):
We rely on our information systems, as well as third-party information systems, to provide access to our web-based products and services, keep financial records, analyze results of operations, process orders and shipments, manage inventory, store confidential or proprietary…
Read full text
We rely on our information systems, as well as third-party information systems, to provide access to our web-based products and services, keep financial records, analyze results of operations, process orders and shipments, manage inventory, store confidential or proprietary information, and operate other critical functions. In addition, some of our products and services include information systems that collect and use data on behalf of customers (e.g., veterinary practice management systems and customer communication tools and services), and some products and services rely on third-party providers for cloud computing and storage. Although we maintain security policies and measures, employ system backup measures, and engage in redundancy planning and processes, such policies, measures, planning and processes, as well as our current disaster recovery plans, may be ineffective or inadequate to address all eventualities. Further, our information systems and our business partners’ and suppliers’ information systems have experienced, and will likely continue to experience, attacks by hackers and other threat actors and other cybersecurity breaches and incidents, including, among other things, computer viruses and malware, ransomware, denial of service actions, phishing schemes, the compromise, misappropriation and/or unauthorized acquisition or disclosure of confidential or otherwise protected information and similar events through the internet (including via devices and applications connected to the internet), and through email attachments and persons with access to these information systems, such as our employees or third parties with whom we do business. The continued use of remote and hybrid work arrangements may additionally result in some increased risk associated with our employees accessing our data and systems remotely. In addition, security industry experts and government officials have warned about the risks of threat actors, such as hackers, nation state actors, and organized groups, targeting U.S. organizations, and recent developments in the cyber threat landscape include the growing use of AI, which could enable or create more sophisticated cybersecurity attacks and increase attack volume and frequency. As information systems and the use of software and related applications by us, our business partners, suppliers, and customers become more cloud-based and connected to the “Internet of Things” (“IoT”), there has been an increase in global cybersecurity vulnerabilities and threats, including more sophisticated and targeted cyber-related attacks that pose a risk to the security of our information systems and networks and the security, confidentiality, availability and integrity of data and information. We process credit card payments electronically over secure networks and offer IoT products and services, such as our connected devices (e.g., IDEXX VetLab instruments). Any such attack or breach could compromise our networks and the information stored thereon could be accessed, publicly disclosed, lost, or stolen. While we have implemented network security and internal control measures, especially for the purpose of protecting our connected products and services from cyberattacks, and invested in our data and information technology infrastructure, these efforts have not always been successful in preventing, and there can be no assurance that these efforts (or any future investments or efforts) will prevent, a system disruption, attack, or security breach. Our software and some of our other products and services incorporate or rely on information technology and systems that are highly technical and complex, and the timely development, testing, release and deployment of software updates are important for defending against security vulnerabilities. If we or our business partners and suppliers fail to timely develop, test and deploy software updates, the security of our and our customers’ networks and information systems may be at risk. Vulnerabilities may persist even after a software update is released if the update fails to address the vulnerability’s root cause or is otherwise insufficient, testing of the update delays its timely deployment, there is a failure to install the most recent updates, or customers persist in using solutions that are end of life and no longer receive updates. Furthermore, updates or other software changes can lead to software or system inoperability or inadvertently introduce security vulnerabilities, including vulnerabilities 25 25 25 that had been previously remedied or from malicious code injected in a “supply chain” cyberattack. In addition, in some cases, we rely on third-party providers to develop, test and release software updates on a timely basis, and there can be no assurance that these third-party providers will timely or effectively remedy vulnerabilities. We, and some of our third-party vendors, have experienced cybersecurity attacks and incidents in the past and will likely experience further attacks and incidents in the future, potentially with more frequency. To our knowledge, none have resulted in any material adverse impact to the Company, our business strategy, results of operations or financial condition. We have adopted measures to mitigate potential risks associated with information technology disruptions and cybersecurity threats; however, given the unpredictability of the timing, nature and scope of such disruptions and the evolving nature of cybersecurity threats, which vary in technique and sources, if we or our business partners or suppliers were to experience a system disruption, attack or security breach or incident that impacts any of our critical functions, or our customers were to experience a system disruption, attack or security breach or incident via any of our software or connected products and services, we could potentially be subject to production downtimes, operational and/or productivity delays, other detrimental impacts on our operations or ability to provide products and services to our customers, the compromise, misappropriation and/or unauthorized acquisition or disclosure of confidential or otherwise protected information, destruction or corruption of data, security breaches, other manipulation or misuse of our systems or networks, financial losses and additional costs from remedial actions, repairs to infrastructure, physical systems or data processing systems, increased cybersecurity and information technology protection costs, loss of business or potential liability, and/or damage to our reputation, any of which could have a material adverse effect on our business strategy, competitive position, results of operations, cash flows, financial condition, or prospects. Additionally, the post-acquisition integration process of acquired companies that may have less sophisticated information systems, cybersecurity practices, or training, may result in an increased risk of cybersecurity incidents. Our customers and/or employees could also face negative consequences such as the compromise of sensitive or critical information or systems. Furthermore, access to, public disclosure of, or other loss of data or information (including any of our confidential or proprietary information or personal data or information) as a result of an attack or security breach or incident has given, and in the future may give, rise to notification obligations to individuals, regulators, customers, employees, and others, and could result in governmental actions or private claims or proceedings, any of which could damage our reputation, cause a loss of confidence in our products and services, damage our ability to develop (and protect our rights to) our differentiated technologies and have a material adverse effect on the Company, our business strategy, financial condition, results of operations or prospects. While we maintain a cyber risk insurance policy intended to address risk of loss due to certain types of cybersecurity events, it may not cover any or all claims, costs or losses associated with such events. For more information regarding personal data and information privacy and data protection risks, refer to “Our operations and reputation may be impaired if we, our products, or our services do not comply with our global privacy policy or evolving laws and regulations regarding data privacy and protection” below.
View prior text (2024)
We rely on our information systems, as well as our third-party business partners’ and suppliers’ information systems, to provide access to our web-based products and services, keep financial records, analyze results of operations, process customer orders, manage inventory, process shipments to customers, store confidential or proprietary information, and operate other critical functions. In addition, some of our products and services include information systems that collect and use data on behalf of customers (e.g., veterinary practice management systems and customer communication tools and services), and some of these products and services rely on third-party providers for cloud computing and storage. Although we maintain security policies, employ system backup measures, and engage in redundancy planning and processes, such policies, measures, planning and processes, as well as our current disaster recovery plans, may be ineffective or inadequate to address all eventualities. Further, our information systems and our business partners’ and suppliers’ information systems have experienced, and will likely continue to experience, attacks by hackers and other security breaches, including, among other things, computer viruses and malware, ransomware, denial of service actions, the compromise, misappropriation and/or unauthorized acquisition or disclosure of confidential or otherwise protected information and similar events through the internet (including via devices and applications connected to the internet), and through email attachments and persons with access to these information systems, such as our employees or third parties with whom we do business. The continued use of remote working and hybrid work-from-home arrangements may additionally result in some increased risk of attacks associated with a number of our employees accessing our data and systems remotely. In addition, security industry experts and government officials have warned about the risks of hackers and cybersecurity attacks targeting U.S. organizations, such as IDEXX, and recent developments in the cyber threat landscape include the growing use of AI, which could enable or create more sophisticated cybersecurity attacks and increase the volume and frequency of attacks. As information systems and the use of software and related applications by us, our business partners, suppliers, and customers become more cloud-based and connected to the “Internet of Things,” which is inherently susceptible to cyberattacks, there has been an increase in global cybersecurity vulnerabilities and threats, including more sophisticated and targeted cyber-related attacks that pose a risk to the security of our information systems and networks and the security, confidentiality, availability and integrity of data and information. We process credit card payments electronically over secure networks and also offer products and services that connect to and are part of the “Internet of Things,” such as our connected devices (e.g., IDEXX VetLab instruments). Any such attack or breach could compromise our networks and the information stored thereon could be accessed, publicly disclosed, lost, or stolen. While we have implemented network security and internal control measures, especially for the purpose of protecting our connected products and services from cyberattacks, and invested in our data and information technology infrastructure, these efforts have not always been successful in preventing, and there can be no assurance that these efforts will in the future prevent, a system disruption, attack, or security breach and, as such, there continues to be risk of system disruptions and security breaches from a cyberattack. We, and some of our third-party vendors, have experienced cybersecurity attacks in the past and will likely experience further attacks in the future, potentially with more frequency. To our knowledge, none have resulted in any material adverse impact to the Company, our business strategy, results of operations or financial condition. We have adopted measures to mitigate potential risks associated with information technology disruptions and cybersecurity threats; however, given the unpredictability of the timing, nature and scope of such disruptions and the evolving nature of cybersecurity threats, which vary in technique and sources, if we or our business partners or suppliers were to experience a system disruption, attack or security breach that impacts any of our critical functions, or our customers were to experience a system disruption, attack or security breach via any of our connected products and services, we could potentially be subject to production downtimes, operational and/or productivity delays, other detrimental impacts on our operations or ability to provide products and services to our customers, the compromise, misappropriation and/or unauthorized acquisition or disclosure of confidential or otherwise protected information, destruction or corruption of data, security breaches, other manipulation or improper use of our systems or networks, financial losses and additional costs from remedial actions, repairs to infrastructure, physical systems or data processing systems, increased cybersecurity and information technology protection costs, loss of business or potential liability, and/or damage to our reputation, any of which could have a material adverse effect on our business strategy, competitive position, results of operations, cash flows, financial condition, or prospects. Our customers and/or employees could also face negative consequences such as the compromise of sensitive or critical information or systems. Furthermore, access to, public disclosure of, or other loss of data or information (including any of our confidential or proprietary information or personal data or information) as a result of an attack or security breach has given, and in the future may give, rise to notification obligations to individuals, regulators, customers, employees, and others, and could result in governmental actions or private claims or proceedings, any of which could damage our reputation, cause a loss of confidence in our products and services, damage our ability to develop (and protect our rights to) our differentiated technologies and have a material adverse effect on the Company, our business strategy, financial condition, results of operations or prospects. For more information regarding personal data and 25 25 25 information privacy and data protection risks, refer to “Our operations and reputation may be impaired if we, our products, or our services do not comply with our global privacy policy or evolving laws and regulations regarding data privacy and protection” below.