high match confidence
Sentence-level differences:
- Reworded sentence: "This data includes confidential information, transactional information and IP belonging to us, our customers and our business partners, as well as personally identifiable information of individuals."
- Reworded sentence: "Because the techniques used to obtain unauthorized access to the information systems change frequently and increasingly leverage on technologies such as artificial intelligence (“AI”), may not be recognized until launched against a target and are increasingly designed to circumvent controls, avoid detection and remove or obfuscate forensic artifacts, we may be unable to anticipate these techniques, implement adequate preventative measures, or adequately identify, investigate and recover from cybersecurity incidents."
- Reworded sentence: "For example, in February 2023, one of our suppliers experienced a ransomware event that caused delays in its manufacturing operations, resulting in its shipment delays to us for components we ordered, which in turn caused delays in some of our outbound shipments during the quarter."
Current (2023):
In the conduct of our business, we collect, use, transmit and store data on information systems and networks, including systems and networks owned and maintained by KLA and/or by third-party providers. This data includes confidential information, transactional information and IP…
Read full text
In the conduct of our business, we collect, use, transmit and store data on information systems and networks, including systems and networks owned and maintained by KLA and/or by third-party providers. This data includes confidential information, transactional information and IP belonging to us, our customers and our business partners, as well as personally identifiable information of individuals. We also integrate and use third-party services and products, including software, in our systems, networks and operations. Despite network security and other measures, our, our customers’, suppliers’ and other third-party providers’ information systems and networks are susceptible to computer viruses, ransomware, cyber-related security breaches and similar disruptions from unauthorized intrusions, tampering, misuse or criminal acts made directly against our systems or networks, or through our third-party providers or the supply chain, including phishing, or other events or developments that we may be unable to anticipate or fail to mitigate, including, but not limited to, financial fraud, including check fraud, vulnerabilities or misconfigurations in information systems, networks, software or hardware. In addition, insider actors, malicious or otherwise, could misappropriate our, our customers’ or business partners’ data, tamper with our products or 19 19 19 Table of Contents Table of Contents otherwise cause disruptions to our business operations. We have experienced cyber-related attacks in the past, and expect to experience cyber-related attacks and incidents in the future. Our security measures may also be breached due to employee errors, malfeasance, or otherwise. Third parties may also attempt to influence employees, users, suppliers or customers to disclose sensitive information in order to gain access to our, our customers’ or business partners’ data. Because the techniques used to obtain unauthorized access to the information systems change frequently and increasingly leverage on technologies such as artificial intelligence (“AI”), may not be recognized until launched against a target and are increasingly designed to circumvent controls, avoid detection and remove or obfuscate forensic artifacts, we may be unable to anticipate these techniques, implement adequate preventative measures, or adequately identify, investigate and recover from cybersecurity incidents. AI may be used to generate cyberattacks as AI capabilities improve and are increasingly adopted. These attacks crafted with AI tools could directly attack information systems with greater speed and/or efficiency than a human threat actor or create more effective phishing emails. In addition, the threat could be introduced from the result of our customers and business partners incorporating the output of an AI tool that includes a threat, such as introducing malicious code by incorporating AI generated source code. Any cybersecurity incident or occurrence could impact our business directly, or indirectly by impacting third parties in the supply chain, in many potential ways: disruptions to operations; misappropriation, corruption or theft of confidential information, including IP and other critical data, of KLA, our customers or other business partners; misappropriation of funds and Company assets; reduced value of our investments in research, development and engineering; litigation with, or payment of damages to, third parties; reputational damage; costs to comply with regulatory inquiries or actions; data privacy issues; costs to rebuild our information systems and networks; and increased cybersecurity protection and remediation costs. Cybersecurity incidents affecting our customers could result in substantial delays in our ability to ship to those customers or install our products, which could result in delays in revenue recognition or the cancellation of orders, and cybersecurity incidents affecting our suppliers could result in substantial delays in our ability to obtain necessary components for our products from those suppliers, which could hamper our ability to ship our products to our customers, harming our results of operations. For example, in February 2023, one of our suppliers experienced a ransomware event that caused delays in its manufacturing operations, resulting in its shipment delays to us for components we ordered, which in turn caused delays in some of our outbound shipments during the quarter. Such events could cause disruptions in the future. We carry insurance that provides limited protection against the potential losses arising from a cybersecurity incident, but it will not likely cover all such losses, and the losses it does not cover may be significant.
View prior text (2022)
In the conduct of our business, we collect, use, transmit and store data on information systems and networks, including systems and networks owned and maintained by KLA and/or by third-party providers. This data includes confidential information, transactional information and intellectual property belonging to us, our customers and our business partners, as well as personally identifiable information of individuals. Despite network security and other measures, our, our customers’, suppliers’ and other third-party providers’ information systems and networks are susceptible to computer viruses, ransomware, cyber-related security breaches and similar disruptions from unauthorized intrusions, tampering, misuse, or criminal acts made directly against, or through our third-party providers in the supply chain, and against, our systems and networks, including phishing, or other events or developments that we may be unable to anticipate or fail to mitigate, including but not limited to vulnerabilities or misconfigurations in information systems, networks, software or hardware. We have experienced cyber-related attacks in the past, and are likely to experience cyber-related attacks in the future. Our security measures may also be breached due to employee errors, malfeasance, or otherwise. Third parties may also attempt to influence employees, users, suppliers or customers to disclose sensitive information in order to gain access to our, our customers’ or business partners’ data. Because the techniques used to obtain unauthorized access to the information systems change frequently, may not be recognized until launched against a target and are increasingly designed to circumvent controls, avoid detection and remove or obfuscate forensic artifacts, we may be unable to anticipate these techniques, implement adequate preventative measures, or adequately identify, investigate and recover from cybersecurity incidents. Any cybersecurity incident or occurrence could impact our business directly, or indirectly by impacting third parties in the supply chain, in many potential ways: disruptions to operations; misappropriation, corruption or theft of confidential information, including intellectual property and other critical data, of KLA, our customers or other business partners; misappropriation of funds and Company assets; reduced value of our investments in research, development and engineering; litigation with, or payment of damages to, third parties; reputational damage; costs to comply with regulatory inquiries or actions; data privacy issues; costs to rebuild our information systems and networks; and increased cybersecurity protection and remediation costs. Cybersecurity incidents affecting our customers could result in substantial delays in our ability to ship to those customers or install our products, which could result in delays in revenue recognition or the cancellation of orders, and cybersecurity incidents affecting our suppliers could result in substantial delays in our ability to obtain necessary components for our products from those suppliers, which could hamper our ability to ship our products to our customers, harming our results of operations. We carry insurance that provides limited protection against the potential losses arising from a cybersecurity incident but it will not likely cover all such losses, and the losses it does not cover may be significant.