high match confidence
Sentence-level differences:
- Reworded sentence: "Any improper handling of confidential data, or significant disruption to our systems or networks, including, but not limited to, any that may relate to new system implementations, computer viruses, security breaches or incidents, cyber-attacks, ransom-style attacks, theft or tampering, inadvertent error, facility issues, natural disasters, terrorism, war, telecommunication failures or energy blackouts, security breaches or incidents in our customers’ or third-party providers’ networks, in third-party products we use, or in cloud-based services provided to, by, or enabled by us, or any perception any of the foregoing has occurred, could have a material adverse impact on our business, operations, supply chain, sales and operating results, result in regulatory inquiries, investigations or other proceedings against us, result in claims, demands and litigation against us, or damage our reputation."
- Reworded sentence: "We engaged outside legal counsel and a leading forensic investigatory firm with experience in such 25 25 25 Table of Contents Table of Contents matters."
- Reworded sentence: "We analyzed the information that was compromised and we do not believe that this IT system compromise has had a material adverse effect on our business or resulted in any material damage to us."
- Added sentence: "Additionally, new information can develop that may impact our assessment of cyber events, including information learned as we develop and deploy mitigations."
- Reworded sentence: "Geopolitical events and tensions may increase these risks."
Current (2024):
We rely on the uninterrupted operation of complex IT systems and networks to operate our business. Any improper handling of confidential data, or significant disruption to our systems or networks, including, but not limited to, any that may relate to new system implementations,…
Read full text
We rely on the uninterrupted operation of complex IT systems and networks to operate our business. Any improper handling of confidential data, or significant disruption to our systems or networks, including, but not limited to, any that may relate to new system implementations, computer viruses, security breaches or incidents, cyber-attacks, ransom-style attacks, theft or tampering, inadvertent error, facility issues, natural disasters, terrorism, war, telecommunication failures or energy blackouts, security breaches or incidents in our customers’ or third-party providers’ networks, in third-party products we use, or in cloud-based services provided to, by, or enabled by us, or any perception any of the foregoing has occurred, could have a material adverse impact on our business, operations, supply chain, sales and operating results, result in regulatory inquiries, investigations or other proceedings against us, result in claims, demands and litigation against us, or damage our reputation. Such improper handling of confidential data, or system or network disruption, or any cyber-attack or other means of effectuating a security breach or incident, could result in loss, unavailability, an unauthorized release of, or other unauthorized use or processing of, personal data, or our suppliers’ or our customers’ intellectual property or confidential, proprietary or sensitive information. Any such matter, or any perception that it has occurred, could harm our business or competitive position, result in a loss of customer confidence, and cause us to incur significant costs to remedy the damages, and may result in regulatory investigations, inquiries or other proceedings, enforcement actions, remediation obligations, claims for damages, litigation, and fines, penalties, damages, other liabilities, and other sanctions. We have experienced and continue to experience verifiable attacks on our IT systems and data, including network compromises, attempts to breach our security measures and attempts to introduce malicious software into our IT systems. For example, in fiscal 2019, we learned of an ongoing compromise of our computer networks by what is believed to be sophisticated hackers. We engaged outside legal counsel and a leading forensic investigatory firm with experience in such 25 25 25 Table of Contents Table of Contents matters. We took steps to identify malicious activity on our network including a compromise of our network and, in May 2019, we began implementing a containment plan. We routinely evaluate the effectiveness of the containment mechanisms that were implemented and continue to implement additional measures. We analyzed the information that was compromised and we do not believe that this IT system compromise has had a material adverse effect on our business or resulted in any material damage to us. As a result of the IT system compromise, our management, including our chief executive officer and our chief financial officer, concluded that our internal controls related to IT system access were not effective resulting in a material weakness in our internal controls for fiscal 2019. Although this material weakness in our internal control was remediated in fiscal 2020, there can be no assurance that similar control issues will not be identified in future periods. Additionally, new information can develop that may impact our assessment of cyber events, including information learned as we develop and deploy mitigations. Due to the types of products we sell and the significant amount of sales we make to government agencies or customers whose principal sales are to U.S. government agencies, we have experienced and expect to continue to experience in the future, attacks on our IT systems and data, including attempts to breach our security, network compromises and attempts to introduce malicious software into our IT systems. Geopolitical events and tensions may increase these risks. Also, as AI continues to evolve, cyber-attackers could use AI to develop malicious code, sophisticated phishing attempts, and convincing deep fakes. A deep fake is a manipulation of our content or the voices or images of our leaders to maliciously publish false messages that appear to be authentic. Such messages may harm our reputation, which may in turn have an adverse impact on our revenue and profits, and reduce the trading price of our stock. A threat could also be introduced by our or our customers and business partners use of AI tools. The output of these tools may include threats such as introducing malicious code when AI generated source code is incorporated into products or systems. Were any future attacks to be successful, or through the unintentional introduction of security vulnerability due to AI usage, we may be unaware of the incident, its magnitude, or its effects until significant harm is done. More generally, we may face significant delays in identifying, remediating, and otherwise responding to any interruption, disruption, security breach or incident. In recent years, we have regularly implemented improvements to our protective measures that have included, but have not been limited to, implementation of the following: firewalls, endpoint intrusion detection and response software, regular patches, log monitors, event correlation tools, network segmentation, routine backups with offsite retention of storage media, system audits, dual factor identification, data partitioning, privileged account segregation and monitoring, routine password modifications, and an enhanced information security program including training classes and phishing exercises for employees and contractors with system access, along with tabletop exercises conducted by information security personnel. As a result of the material weakness in our internal controls resulting from the IT systems compromise in fiscal 2019, we have taken remediation actions and implemented additional controls and we are continuing to take actions to attempt to address evolving threats. However, our system improvements have not been fully effective in preventing attacks on our IT systems and data, including breaches of our security measures, and there can be no assurance that any future system improvements will be effective in preventing future cyber-attacks or disruptions, a ransom-style attack, or limiting the damage from any future cyber-attacks or disruptions. Our ability to recover from ransomware and other ransom-style attacks may be limited if our backups have been affected by the attack, or if restoring data from backups is delayed or not feasible. Our system improvements have resulted in increased costs to us and we may be required to dedicate additional expenditures and resources to making system improvements and otherwise addressing cybersecurity matters in the future, whether in response to any disruption, interruption, breach, incident or otherwise. Further any future improvements, attacks or disruptions could result in additional costs related to rebuilding our internal systems, defending litigation, complaints or other claims, providing notices to regulatory agencies or other third parties, responding to regulatory inquiries, actions or other proceedings, or paying damages, fines or penalties. Such attacks or disruptions could have a material adverse impact on our business, operations and financial results. Furthermore, our efforts to comply with evolving laws and regulations related to cybersecurity, such as the recently enacted SEC rules requiring disclosure of a material cybersecurity incident, may be costly and any actual or alleged failure to comply could result in investigations, proceedings, investor lawsuits and reputational damage. In addition, employees and former employees, in particular former employees who become employees of our competitors, customers, licensees, or other third parties, including state actors, have in the past and may in the future misappropriate, wrongfully use, publish, access, process or provide to our competitors, customers, licensees or other third parties, including state actors, our technology, intellectual property, or other proprietary or confidential information. This risk would be exacerbated to the extent our competitors for talent, particularly engineering talent, attempt to hire our employees. Similarly, we provide access to certain of our technology, intellectual property, and other proprietary or confidential information to our direct and indirect customers and licensees and certain of our consultants, who may wrongfully use such technology, intellectual property or information, or wrongfully disclose such technology, intellectual property or information to third parties, including our competitors or state actors. 26 26 26 Table of Contents Table of Contents Third-party service providers, such as wafer foundries, assembly and test contractors, distributors, credit card processors, and other vendors have access to portions of our and our customers' data. These service providers also face significant cybersecurity threats, and they may be subject to cyber-attacks, disruptions, and interruptions to their networks and systems, and otherwise may suffer from security breaches and incidents. Any such breach or incident, including any involving misappropriation, loss or other unauthorized processing of data maintained or otherwise processed by our third-party service providers, or any perception any of these has occurred, could negatively impact our business, operations and financial results, as well as our relationship with our customers. Our contracts may not contain limitations of liability, and even where they do, there can be no assurance that limitations of liability in our contracts are sufficient to protect us from liabilities, damages, or claims related to our cybersecurity practices or measures. We do not have insurance coverage specially for cybersecurity matters. Insurance coverage that we do have may not be adequate or sufficient to protect us from or to mitigate liabilities arising out of our cybersecurity practices or measures or otherwise relating to any cybersecurity breach or incident, and we cannot be sure that such coverage will continue to be available on commercially reasonable terms or at all, or that such coverage will pay future claims.
View prior text (2023)
We rely on the uninterrupted operation of complex IT systems and networks to operate our business. Any improper handling of confidential data, or significant disruption to our systems or networks, including, but not limited to, new system implementations, computer viruses, security breaches, facility issues, natural disasters, terrorism, war, telecommunication failures or energy blackouts could have a material adverse impact on our business, operations, supply chain, sales and operating results. Such improper handling of confidential data, or system or network disruption, could result in an unauthorized release of our, our suppliers’ or our customers’ intellectual property or confidential, proprietary or sensitive information, or the release of personal data. Any release of such information or data could harm our business or competitive position, result in a loss of customer confidence, and cause us to incur significant costs to remedy the damages. In addition, any release of such information or data or the failure to properly manage the collection, handling, transfer or disposal of such information may result in regulatory inquiries or penalties, enforcement actions, remediation obligations, claims for damages, litigation, and other sanctions. We have experienced verifiable attacks on our IT systems and data, including network compromises, attempts to breach our security measures and attempts to introduce malicious software into our IT systems. For example, in fiscal 2019, we learned of an ongoing compromise of our computer networks by what is believed to be sophisticated hackers. We engaged outside legal counsel and a leading forensic investigatory firm with experience in such matters. We took steps to identify malicious activity on our network including a compromise of our network and, in May 2019, we began implementing a containment plan. We routinely evaluate the effectiveness of the containment mechanisms that were implemented and continue to implement additional measures. We have analyzed the information that was compromised. We do not believe that this IT system compromise has had a material adverse effect on our business or resulted in any material damage to us. As a result of the IT system compromise, our management, including our chief executive officer and our chief financial officer, concluded that our internal controls related to IT system access were not effective resulting in a material weakness in our internal controls for fiscal 2019. Although this material weakness in our internal control was remediated in fiscal 2020, there can be no assurance that similar control issues will not be identified in future periods. Due to the types of products we sell and the significant amount of sales we make to government agencies or customers whose principal sales are to U.S. government agencies, we have experienced and expect to continue to experience in the future, attacks on our IT systems and data, including attempts to breach our security, network compromises and attempts to introduce malicious software into our IT systems. Were any future attacks to be successful, we may be unaware of the incident, its magnitude, or its effects until significant harm is done. In recent years, we have regularly implemented improvements to our protective measures which include, but are not limited to, implementation of the following: firewalls, endpoint intrusion detection and response software, regular patches, log monitors, event correlation tools, network segmentation, routine backups with offsite retention of storage media, system audits, dual factor identification, data partitioning, privileged account segregation and monitoring, routine password modifications, and an enhanced information security program including training classes and phishing exercises for employees and contractors with system access, along with tabletop exercises conducted by information security personnel. As a result of the material weakness in our internal controls resulting from the IT systems compromise in fiscal 2019, we have taken remediation actions and implemented additional controls and we are continuing to take actions to attempt to address evolving threats. However, our system improvements have not been fully effective in preventing attacks on our IT systems and data, including breaches of our security measures, and there can be no assurance that any future system improvements will be effective in preventing future cyber-attacks or disruptions or limiting the damage from any future cyber-attacks or disruptions. Such system improvements have resulted in increased costs to us and any future improvements, attacks or disruptions could result in additional costs related to rebuilding our internal systems, defending litigation, complaints or other claims, providing notices to regulatory agencies or other third parties, responding to regulatory actions, or paying damages. Such attacks or disruptions could have a material adverse impact on our business, operations and financial results. Our products, or IP that we purchase or license from third parties for use in our products, as well as industry-standard specifications that we implement in our products, may be subject to security vulnerabilities. And, while some of our products contain encryption or security algorithms to protect third-party content or user-generated data stored on our products, these products could still be hacked or the encryption schemes could be compromised, breached, or circumvented by motivated and sophisticated attackers. Our products are being used in application areas that create new or increased cybersecurity, privacy or safety risks including applications that gather and process data, such as the cloud or Internet of Things, and automotive applications. We, our customers, and the users of our products may not promptly learn of or have the ability to 25 25 25 Table of Contents Table of Contents fully assess the magnitude or effects of a vulnerability, including the extent, if any, to which a vulnerability has been exploited. Security vulnerabilities and any limitations of, or adverse effects resulting from, mitigation techniques can adversely affect our results of operations, financial condition, sales, customer relationships, share price, prospects, and reputation in a number of ways, any of which may be material. Adverse publicity about security vulnerabilities or mitigations could damage our reputation with customers or users and reduce demand for our products and services. These effects may be greater to the extent that competing products are not susceptible to the same vulnerabilities or if vulnerabilities can be more effectively mitigated in competing products. Moreover, third parties can release information regarding potential vulnerabilities of our products before mitigations are available. This, in turn, could lead to attempted or successful exploits of vulnerabilities, adversely affect our ability to introduce mitigations, or otherwise harm our business and reputation. Third-party service providers, such as wafer foundries, assembly and test contractors, distributors, credit card processors and other vendors have access to portions of our and our customers' data. In the event that these service providers do not properly safeguard the data that they hold, security breaches and loss of data could result. Any such breach or loss of data by our third-party service providers could negatively impact our business, operations and financial results, as well as our relationship with our customers.