high match confidence
Sentence-level differences:
- Reworded sentence: "Any improper handling of confidential data, or significant disruption to our systems or networks, including, but not limited to, new system implementations, computer viruses, security breaches, facility issues, natural disasters, terrorism, war, telecommunication failures or energy blackouts could have a material adverse impact on our business, operations, supply chain, sales and operating results."
- Reworded sentence: "However, our system improvements have not been fully effective in preventing attacks on our IT systems and data, including breaches of our security measures, and there can be no assurance that any future system improvements will be effective in preventing future cyber-attacks or disruptions or limiting the damage from any future cyber-attacks or disruptions."
- Added sentence: "Our products, or IP that we purchase or license from third parties for use in our products, as well as industry-standard specifications that we implement in our products, may be subject to security vulnerabilities."
- Added sentence: "And, while some of our products contain encryption or security algorithms to protect third-party content or user-generated data stored on our products, these products could still be hacked or the encryption schemes could be compromised, breached, or circumvented by motivated and sophisticated attackers."
- Added sentence: "Our products are being used in application areas that create new or increased cybersecurity, privacy or safety risks including applications that gather and process data, such as the cloud or Internet of Things, and automotive applications."
Current (2023):
We rely on the uninterrupted operation of complex IT systems and networks to operate our business. Any improper handling of confidential data, or significant disruption to our systems or networks, including, but not limited to, new system implementations, computer viruses,…
Read full text
We rely on the uninterrupted operation of complex IT systems and networks to operate our business. Any improper handling of confidential data, or significant disruption to our systems or networks, including, but not limited to, new system implementations, computer viruses, security breaches, facility issues, natural disasters, terrorism, war, telecommunication failures or energy blackouts could have a material adverse impact on our business, operations, supply chain, sales and operating results. Such improper handling of confidential data, or system or network disruption, could result in an unauthorized release of our, our suppliers’ or our customers’ intellectual property or confidential, proprietary or sensitive information, or the release of personal data. Any release of such information or data could harm our business or competitive position, result in a loss of customer confidence, and cause us to incur significant costs to remedy the damages. In addition, any release of such information or data or the failure to properly manage the collection, handling, transfer or disposal of such information may result in regulatory inquiries or penalties, enforcement actions, remediation obligations, claims for damages, litigation, and other sanctions. We have experienced verifiable attacks on our IT systems and data, including network compromises, attempts to breach our security measures and attempts to introduce malicious software into our IT systems. For example, in fiscal 2019, we learned of an ongoing compromise of our computer networks by what is believed to be sophisticated hackers. We engaged outside legal counsel and a leading forensic investigatory firm with experience in such matters. We took steps to identify malicious activity on our network including a compromise of our network and, in May 2019, we began implementing a containment plan. We routinely evaluate the effectiveness of the containment mechanisms that were implemented and continue to implement additional measures. We have analyzed the information that was compromised. We do not believe that this IT system compromise has had a material adverse effect on our business or resulted in any material damage to us. As a result of the IT system compromise, our management, including our chief executive officer and our chief financial officer, concluded that our internal controls related to IT system access were not effective resulting in a material weakness in our internal controls for fiscal 2019. Although this material weakness in our internal control was remediated in fiscal 2020, there can be no assurance that similar control issues will not be identified in future periods. Due to the types of products we sell and the significant amount of sales we make to government agencies or customers whose principal sales are to U.S. government agencies, we have experienced and expect to continue to experience in the future, attacks on our IT systems and data, including attempts to breach our security, network compromises and attempts to introduce malicious software into our IT systems. Were any future attacks to be successful, we may be unaware of the incident, its magnitude, or its effects until significant harm is done. In recent years, we have regularly implemented improvements to our protective measures which include, but are not limited to, implementation of the following: firewalls, endpoint intrusion detection and response software, regular patches, log monitors, event correlation tools, network segmentation, routine backups with offsite retention of storage media, system audits, dual factor identification, data partitioning, privileged account segregation and monitoring, routine password modifications, and an enhanced information security program including training classes and phishing exercises for employees and contractors with system access, along with tabletop exercises conducted by information security personnel. As a result of the material weakness in our internal controls resulting from the IT systems compromise in fiscal 2019, we have taken remediation actions and implemented additional controls and we are continuing to take actions to attempt to address evolving threats. However, our system improvements have not been fully effective in preventing attacks on our IT systems and data, including breaches of our security measures, and there can be no assurance that any future system improvements will be effective in preventing future cyber-attacks or disruptions or limiting the damage from any future cyber-attacks or disruptions. Such system improvements have resulted in increased costs to us and any future improvements, attacks or disruptions could result in additional costs related to rebuilding our internal systems, defending litigation, complaints or other claims, providing notices to regulatory agencies or other third parties, responding to regulatory actions, or paying damages. Such attacks or disruptions could have a material adverse impact on our business, operations and financial results. Our products, or IP that we purchase or license from third parties for use in our products, as well as industry-standard specifications that we implement in our products, may be subject to security vulnerabilities. And, while some of our products contain encryption or security algorithms to protect third-party content or user-generated data stored on our products, these products could still be hacked or the encryption schemes could be compromised, breached, or circumvented by motivated and sophisticated attackers. Our products are being used in application areas that create new or increased cybersecurity, privacy or safety risks including applications that gather and process data, such as the cloud or Internet of Things, and automotive applications. We, our customers, and the users of our products may not promptly learn of or have the ability to 25 25 25 Table of Contents Table of Contents fully assess the magnitude or effects of a vulnerability, including the extent, if any, to which a vulnerability has been exploited. Security vulnerabilities and any limitations of, or adverse effects resulting from, mitigation techniques can adversely affect our results of operations, financial condition, sales, customer relationships, share price, prospects, and reputation in a number of ways, any of which may be material. Adverse publicity about security vulnerabilities or mitigations could damage our reputation with customers or users and reduce demand for our products and services. These effects may be greater to the extent that competing products are not susceptible to the same vulnerabilities or if vulnerabilities can be more effectively mitigated in competing products. Moreover, third parties can release information regarding potential vulnerabilities of our products before mitigations are available. This, in turn, could lead to attempted or successful exploits of vulnerabilities, adversely affect our ability to introduce mitigations, or otherwise harm our business and reputation. Third-party service providers, such as wafer foundries, assembly and test contractors, distributors, credit card processors and other vendors have access to portions of our and our customers' data. In the event that these service providers do not properly safeguard the data that they hold, security breaches and loss of data could result. Any such breach or loss of data by our third-party service providers could negatively impact our business, operations and financial results, as well as our relationship with our customers.
View prior text (2022)
We rely on the uninterrupted operation of complex IT systems and networks to operate our business. Any significant disruption to our systems or networks, including, but not limited to, new system implementations, computer viruses, security breaches, facility issues, natural disasters, terrorism, war, telecommunication failures or energy blackouts could have a material adverse impact on our business, operations, supply chain, sales and operating results. Such disruption could result in an unauthorized release of our, our suppliers’ or our customers’ intellectual property or confidential, proprietary or sensitive information, or the release of personal data. Any release of such information or data could harm our business or competitive position, result in a loss of customer confidence, and cause us to incur significant costs to remedy the damages. In addition, any release of such information or data or the failure to properly manage the collection, handling, transfer or disposal of such information may result in regulatory inquiries or penalties, enforcement actions, remediation obligations, claims for damages, litigation, and other sanctions. We have experienced verifiable attacks on our IT systems and data, including network compromises, attempts to breach our security measures and attempts to introduce malicious software into our IT systems. For example, in fiscal 2019, we learned of an ongoing compromise of our computer networks by what is believed to be sophisticated hackers. We engaged outside legal counsel and a leading forensic investigatory firm with experience in such matters. We took steps to identify malicious activity on our network including a compromise of our network and, in May 2019, we began implementing a containment plan. We routinely evaluate the effectiveness of the containment mechanisms that were implemented and continue to implement additional measures. We have analyzed the information that was compromised. We do not believe that this IT system compromise has had a material adverse effect on our business or resulted in any material damage to us. As a result of the IT system compromise, our management, including our chief executive officer and our chief financial officer, concluded that our internal controls related to IT system access were not effective resulting in a material weakness in our internal controls for fiscal 2019. Although this material weakness in our internal control was remediated in fiscal 2020, there can be no assurance that similar control issues will not be identified in future periods. Due to the types of products we sell and the significant amount of sales we make to government agencies or customers whose principal sales are to U.S. government agencies, we have experienced and expect to continue to experience in the future, attacks on our IT systems and data, including attempts to breach our security, network compromises and attempts to introduce malicious software into our IT systems. Were any future attacks to be successful, we may be unaware of the incident, its magnitude, or its effects until significant harm is done. In recent years, we have regularly implemented improvements to our protective measures which include, but are not limited to, implementation of the following: firewalls, endpoint intrusion detection and response software, regular patches, log monitors, event correlation tools, network segmentation, routine backups with offsite retention of storage media, system audits, dual factor identification, data partitioning, privileged account segregation and monitoring, routine password modifications, and an enhanced information security program including training classes and phishing exercises for employees and contractors with system access, along with tabletop exercises conducted by information security personnel. As a result of the material weakness in our internal controls resulting from the IT systems compromise in fiscal 2019, we have taken remediation actions and implemented additional controls and we are continuing to take actions to attempt to address evolving threats. However, recent system improvements have not been fully effective in preventing attacks on our IT systems and data, including breaches of our security measures, and there can be no assurance that any future system improvements will be effective in preventing future cyber-attacks or disruptions or limiting the damage from any future cyber-attacks or disruptions. Such system improvements have resulted in increased costs to us and any future improvements, attacks or disruptions could result in additional costs related to rebuilding our internal systems, defending litigation, complaints or other claims, providing notices to regulatory agencies or other third parties, responding to regulatory actions, or paying damages. Such attacks or disruptions could have a material adverse impact on our business, operations and financial results. Third-party service providers, such as wafer foundries, assembly and test contractors, distributors, credit card processors and other vendors have access to portions of our and our customers' data. In the event that these service providers do not properly safeguard the data that they hold, security breaches and loss of data could result. Any such breach or loss of data by our third-party service providers could negatively impact our business, operations and financial results, as well as our relationship with our customers. 23 23 23 Table of Contents Table of Contents