high match confidence
Sentence-level differences:
- Reworded sentence: "We use information technology and operational technology assets, including computer and information networks and artificial intelligence technologies and services in substantially all aspects of our business operations."
- Reworded sentence: "Additionally, while we have implemented measures to prevent security breaches and cyber incidents, like many companies we have periodically experienced cyber incidents, and our preventive measures and incident response efforts may not be entirely effective."
Current (2026):
We use information technology and operational technology assets, including computer and information networks and artificial intelligence technologies and services in substantially all aspects of our business operations. We also use mobile devices, social networking and other…
Read full text
We use information technology and operational technology assets, including computer and information networks and artificial intelligence technologies and services in substantially all aspects of our business operations. We also use mobile devices, social networking and other online activities to connect with our employees, customers and vendors. Such uses give rise to cybersecurity risks, including security breach, espionage, system disruption, theft and inadvertent release of information. Our business involves the storage and transmission of numerous classes of sensitive and/or confidential information and intellectual property, including customers’ personal information, private information about employees and financial and strategic information about us and our business partners. We also rely on a Payment Card Industry compliant third party to protect our customers’ credit card information. In connection with our strategy to grow through acquisitions and to pursue new initiatives that improve our operations and cost structure, we are also expanding and improving our information technologies, resulting in a larger technological presence and corresponding exposure to cybersecurity risk. If we fail to assess and identify cybersecurity threats associated with acquisitions and new initiatives, we may become increasingly vulnerable to such threats. Additionally, while we have implemented measures to prevent security breaches and cyber incidents, like many companies we have periodically experienced cyber incidents, and our preventive measures and incident response efforts may not be entirely effective. Also, the regulatory environment surrounding information security and privacy is increasingly demanding, with the frequent imposition of new and constantly changing requirements. This changing regulatory landscape may cause increasingly complex compliance challenges, which may increase our compliance costs. Any failure to comply with these changing security and privacy laws and regulations could result in significant penalties, fines, legal challenges and reputational harm. The theft, destruction, loss, misappropriation, or release of sensitive and/or confidential information or intellectual property, or interference with our information technology systems or the technology systems of third parties on which we rely, could result in business disruption, negative publicity, brand damage, violation of privacy laws, loss of customers, potential liability and competitive disadvantage.
View prior text (2025)
We use information technology and operational technology assets, including computer and information networks, in substantially all aspects of our business operations. We also use mobile devices, social networking and other online activities to connect with our employees and our customers. Such uses give rise to cybersecurity risks, including security breach, espionage, system disruption, theft and inadvertent release of information. Our business involves the storage and transmission of numerous classes of sensitive and/or confidential information and intellectual property, including customers’ personal information, private information about employees and financial and strategic information about us and our business partners. We also rely on a Payment Card Industry compliant third party to protect our customers’ credit card information. In connection with our strategy to grow through acquisitions and to pursue new initiatives that improve our operations and cost structure, we are also expanding and improving our information technologies, resulting in a larger technological presence and corresponding exposure to cybersecurity risk. If we fail to assess and identify cybersecurity threats associated with acquisitions and new initiatives, we may become increasingly vulnerable to such threats. Additionally, while we have implemented measures to prevent security breaches and cyber incidents, our preventive measures and incident response efforts may not be entirely effective. Also, the 29 29 29 Table of Contents Table of Contents regulatory environment surrounding information security and privacy is increasingly demanding, with the frequent imposition of new and constantly changing requirements. This changing regulatory landscape may cause increasingly complex compliance challenges, which may increase our compliance costs. Any failure to comply with these changing security and privacy laws and regulations could result in significant penalties, fines, legal challenges and reputational harm. The theft, destruction, loss, misappropriation, or release of sensitive and/or confidential information or intellectual property, or interference with our information technology systems or the technology systems of third parties on which we rely, could result in business disruption, negative publicity, brand damage, violation of privacy laws, loss of customers, potential liability and competitive disadvantage.