high match confidence
Sentence-level differences:
- Reworded sentence: "The Company’s operations rely on the secure processing, storage and transmission of confidential, sensitive, proprietary and other types of information."
- Reworded sentence: "Although Moody’s devotes significant resources to maintain and regularly update such systems and processes, measures that Moody’s takes to avoid, detect, mitigate or recover from material incidents can be expensive, and may be insufficient, circumvented, or may become ineffective."
- Reworded sentence: "Because the methods used for these systems cyberattacks are rapidly changing, the Company or its third-party vendors, despite significant focus and investment, may be unable to anticipate and/or deploy sufficient protections against such incidents."
- Reworded sentence: "Recent well-publicized security breaches at other companies have led to enhanced government and regulatory scrutiny of the measures taken by companies to protect against cyber-attacks, and may in the future result in heightened cybersecurity compliance requirements, including additional regulatory expectations for oversight of third-party vendors and service providers."
Current (2024):
The Company’s operations rely on the secure processing, storage and transmission of confidential, sensitive, proprietary and other types of information. Such information relates to its business operations and confidential and sensitive information about its MOODY'S 2023 10-K 33…
Read full text
The Company’s operations rely on the secure processing, storage and transmission of confidential, sensitive, proprietary and other types of information. Such information relates to its business operations and confidential and sensitive information about its MOODY'S 2023 10-K 33 MOODY'S 2023 10-K 33 MOODY'S 2023 10-K 33 Table of Contents Table of Contents customers and employees in the Company’s computer systems and networks, and in those of its third-party vendors. The Company also often has access to MNPI and other confidential information concerning its customers, including public and private companies, sovereigns, and other third parties, and their customers, suppliers or transaction counterparties. Unauthorized disclosure of the foregoing information could cause our customers to lose faith in our ability to protect their confidential information, affecting the trading of their securities, damage their reputations or competitive positions and therefore cause customers to cease doing business with us, and potentially expose us to risk of litigation. The risks the Company faces range from cyber-attacks common to most industries, to more advanced threats that target the Company because of its prominence in the global marketplace, or due to its ratings of sovereign debt and corporate issuers. The Company and its third-party service providers, including our vendors, regularly experience cyber-attacks and data breaches of varying degrees. Cyber-attacks targeting Moody’s or Moody’s vendors’ technology and systems, whether from circumvention of security systems, denial-of-service attacks, ransomware, malware, hacking, social engineering or "phishing" attacks, computer viruses, employee or insider threats, malfeasance, supply chain attacks, physical breaches, payment fraud or other cyber-attacks some of which may be carried out by state-sponsored actors, may result in unauthorized access, exfiltration, manipulation or corruption of sensitive data, material interruptions or malfunctions in the Company’s or such vendors’ web sites or systems, applications, data processing, or disruption of other business operations. Such events may compromise the confidentiality, integrity, or availability of material information held by the Company (including information about Moody’s business, employees or customers), as well as other sensitive data, including personally identifiable information, the disclosure of which could lead to identity theft. The Company's MNPI concerning customers and clients could be improperly used by authorized or unauthorized parties, including for insider trading. The Company has implemented administrative, technical, and physical measures to detect and prevent unauthorized activity, but such precautions may not be successful. As the Company has grown and acquired businesses, IT guidelines have been developed and applied within business units or inherited from legacy organizations, which can result in internal differences in the Company's approach to IT standards until acquired entities are integrated. This creates a risk of developing unintended vulnerabilities and could result in additional costs, difficulty meeting new regulatory standards, or failing to meet customer expectations. The Company may be exposed to additional threats as it migrates its data from legacy systems to cloud-based solutions, and increased dependence on third-parties to store cloud-based data subjects the Company to further cyber risks. Further, many of our employees work remotely, which magnifies the importance of the integrity of our remote access security measures and may expose the Company to additional cyber risks. The Company has invested and continues to invest in risk management and information security measures in order to protect its systems and data, including employee training, disaster plans, and technical defenses. Although Moody’s devotes significant resources to maintain and regularly update such systems and processes, measures that Moody’s takes to avoid, detect, mitigate or recover from material incidents can be expensive, and may be insufficient, circumvented, or may become ineffective. Further, Moody’s relies on third-party technical subject matter experts to assist in managing its cyber security risk management processes. While Moody’s employs such third parties to assist in strengthening its cybersecurity defenses, there can be no guarantee that any action taken as advised by such third party will be adequate or sufficient to address the evolving threat landscape. Additionally, any measures that Moody’s takes in connection with such third parties to avoid, detect, mitigate or recover from material cyber security threats or incidents can be expensive, and may be insufficient, circumvented, or may become ineffective. Additionally, the cost and operational consequences of implementing, maintaining and enhancing further data or system protection measures could increase significantly to overcome increasingly intense, complex and sophisticated global cyber threats. Despite the Company’s best efforts, it is not fully insulated from, and has in the past experienced, security threats and system disruptions. Although past incidents have not had a material adverse effect on the Company's operating results, there can be no assurance of a similar result in the future. Because the methods used for these systems cyberattacks are rapidly changing, the Company or its third-party vendors, despite significant focus and investment, may be unable to anticipate and/or deploy sufficient protections against such incidents. Further, the extent of a particular security incident and the steps needed to investigate may not be immediately clear, and it may take a significant amount of time before such an investigation can be completed and full and reliable information about the incident, including the extent of the harm and how best to remediate it, is known. Recent well-publicized security breaches at other companies have led to enhanced government and regulatory scrutiny of the measures taken by companies to protect against cyber-attacks, and may in the future result in heightened cybersecurity compliance requirements, including additional regulatory expectations for oversight of third-party vendors and service providers. Cybersecurity incidents, including the accidental loss, inadvertent disclosure or unapproved dissemination of proprietary information or sensitive or confidential data, could cause reputational harm, loss of customers and revenue, fines, regulatory actions and scrutiny, sanctions or other statutory penalties, litigation, liability for failure to safeguard the Company’s customers’ information, or financial losses that are either not insured against or not fully covered through any insurance maintained by the Company. In addition, disclosure or media reports of actual or perceived security vulnerabilities to the Company’s systems or those of the Company’s third parties, even if no breach has been attempted or occurred, could lead to reputational harm, loss of customers and revenue, or increased regulatory actions oversight and scrutiny. Any of the foregoing may have a material adverse effect on Moody’s business, operating results and financial condition.
View prior text (2023)
The Company’s operations rely on the secure processing, storage and transmission of confidential, sensitive, proprietary and other types of information relating to its business operations and confidential and sensitive information about its customers and employees in the Company’s computer systems and networks, and in those of its third party vendors. Unauthorized disclosure of 30 MOODY'S 2022 10-K 30 MOODY'S 2022 10-K 30 MOODY'S 2022 10-K Table of Contents Table of Contents this information could cause our customers to lose faith in our ability to protect their confidential information and therefore cause customers to cease doing business with us. The risks the Company faces range from cyber-attacks common to most industries, to more advanced threats that target the Company because of its prominence in the global marketplace, or due to its ratings of sovereign debt. Breaches of Moody’s or Moody’s vendors’ technology and systems, whether from circumvention of security systems, denial-of-service attacks or other cyber-attacks some of which may be carried out by state-sponsored actors, hacking, “phishing” attacks, computer viruses, social media impersonation, ransomware, or malware, employee or insider error, malfeasance, social engineering, physical breaches or other actions, may result in manipulation or corruption of sensitive data, material interruptions or malfunctions in the Company’s or such vendors’ web sites or systems, applications, data processing, or disruption of other business operations, or may compromise the confidentiality and integrity of material information held by the Company (including information about Moody’s business, employees or customers), as well as sensitive personally identifiable information (PII), the disclosure of which could lead to identity theft. Measures that Moody’s takes to avoid, detect, mitigate or recover from material incidents can be expensive, and may be insufficient, circumvented, or may become ineffective. Additionally, the Company may be exposed to additional threats as the Company migrates its data from legacy systems to cloud-based solutions, and increased dependence on third parties to store cloud-based data subjects the Company to further cyber risks. Further, many of our employees work remotely, which magnifies the importance of the integrity of our remote access security measures and may expose the Company to additional cyber risks. The Company has invested and continues to invest in risk management and information security measures in order to protect its systems and data, including employee training, disaster plans, and technical defenses. The cost and operational consequences of implementing, maintaining and enhancing further data or system protection measures could increase significantly to overcome increasingly intense, complex, and sophisticated global cyber threats. Despite the Company’s best efforts, it is not fully insulated from, and has in the past experienced, security threats and system disruptions. Although past incidents have not had a material adverse effect on the Company's operating results, there can be no assurance of a similar result in the future. Because the methods used for these systems cyberattacks are rapidly changing, the Company, despite significant focus and investment, may be unable to anticipate/deploy sufficient protections against such incidents. Further, the extent of a particular security incident and the steps needed to investigate may not be immediately clear, and it may take a significant amount of time before such an investigation can be completed and full and reliable information about the incident, including the extent of the harm and how best to remediate it, is known. Recent well-publicized security breaches at other companies have led to enhanced government and regulatory scrutiny of the measures taken by companies to protect against cyber-attacks, and may in the future result in heightened cybersecurity compliance requirements, including additional regulatory expectations for oversight of vendors and service providers. Cybersecurity incidents, including the accidental loss, inadvertent disclosure or unapproved dissemination of proprietary information or sensitive or confidential data, could cause reputational harm, loss of customers and revenue, fines, regulatory actions and scrutiny, sanctions or other statutory penalties, litigation, liability for failure to safeguard the Company’s customers’ information, or financial losses that are either not insured against or not fully covered through any insurance maintained by the Company. In addition, disclosure or media reports of actual or perceived security vulnerabilities to the Company’s systems or those of the Company’s third parties, even if no breach has been attempted or occurred, could lead to reputational harm, loss of customers and revenue, or increased regulatory actions oversight and scrutiny. Any of the foregoing may have a material adverse effect on Moody’s business, operating results and financial condition.