high match confidence
Sentence-level differences:
- Reworded sentence: "We rely on information technology systems to conduct our business."
- Reworded sentence: "Although we implement various controls to try to mitigate risks to our systems, information and other property, there can be no guarantee that the actions and controls we have implemented, or which we have caused third-party service providers to implement, will be sufficient to protect and mitigate risks to our systems, information or other property."
Current (2025):
We rely on information technology systems to conduct our business. Information technology systems are important to many of our business-critical operating and financial processes, including production planning, manufacturing, distribution, communication with our employees,…
Read full text
We rely on information technology systems to conduct our business. Information technology systems are important to many of our business-critical operating and financial processes, including production planning, manufacturing, distribution, communication with our employees, customers and suppliers, sales and customer service, research and development, recording and processing transactions and the production of accurate and timely reports on our financial and operating results. In connection with our digitization initiative, we have begun a multi-year phased process to upgrade and harmonize certain components of our information technology systems, including our financial processing systems. We are making significant investments in this complex, enterprise-wide initiative. Planned implementations will lead to changes in our operating and financial processes as well as our internal control over financial reporting. Disruptions to our information technology systems could occur if we do not effectively design or implement these systems solutions, or otherwise fail to manage resulting changes in processes and controls. This could adversely affect our operations, negatively impact our financial reporting and the effectiveness of our internal control over financial reporting and have a material adverse effect on our business, results of operations and financial condition. Some of the information technology systems we rely on are maintained or operated by third-party providers, including cloud-based systems. Cybersecurity incidents, attacks and cybersecurity threats are increasingly sophisticated, constantly evolving and originate from many sources globally and often cannot be recognized or understood until the target has already been attacked. Despite our efforts to prevent these threats and disruptions to our information technology systems, these systems and those of our third-party providers may be affected by damage or interruption resulting from, among other causes, cybersecurity incidents, attacks, security breaches, power outages, system or operational failures or malware (including ransomware and other programs that operate with malicious intent). These risks are expected to continue to be magnified due to the increased reliance on information technology systems to conduct our business, including those used in furtherance of supporting remote and 8 8 8 Table of Contents Table of Contents hybrid in-office work environments and managing our global operating and financial processes. Disruptions to these systems may impair our ability to conduct business and threaten the availability, confidentiality and integrity of our systems and information and have a material adverse effect on our business, results of operations and financial condition. As part of our business, we collect and handle information about our business, customers, employees and suppliers. Despite the security measures we have in place, our facilities and systems and those of third parties we rely on or do business with, may be vulnerable to cybersecurity incidents, attacks, security breaches, malware (including ransomware and other programs that operate with malicious intent), power outages, system failures, acts of vandalism, human or technical errors, fraud (including through phishing or other social engineering attempts) or other similar events or disruptions. Our information, facilities and systems and those hosted or supported by third parties on our behalf could also be impacted by the intentional or unintentional improper conduct of our employees, vendors or others who have access to and may mishandle or misappropriate information or access systems or facilities. Any such event involving the misappropriation, loss or other unauthorized disclosure of information or disruption of our systems, whether impacting us or third parties we rely on or do business with, could result in losses, damage our reputation or relationships with customers and suppliers, expose us to the risks of litigation, regulatory action and liability, including individual claims or consumer class actions, commercial litigation, administrative and civil or criminal investigations or actions, regulatory intervention and sanctions or fines, investigation and remediation costs, loss of intellectual property, release of confidential information, alteration or corruption of data or systems, costs related to remediation or the payment of ransom, and litigation and possible prolonged negative publicity, and disrupt our operations and have a material adverse effect on our business, results of operations and financial condition. We and third parties we rely on or do business with have experienced cybersecurity attacks and incidents in the past, some of which have resulted in unauthorized access to our information and systems and other disruptions to our business operations, and we could in the future experience similar incidents. Although we implement various controls to try to mitigate risks to our systems, information and other property, there can be no guarantee that the actions and controls we have implemented, or which we have caused third-party service providers to implement, will be sufficient to protect and mitigate risks to our systems, information or other property. The domestic and international regulatory environment related to information security, data collection and transfer, digital marketing or telemarketing and privacy is increasingly rigorous and complex, with new and rapidly changing requirements applicable to our business, which often require changes to our business practices. Compliance with these requirements, including the European Union’s General Data Protection Regulation, China’s Personal Information Protection, Data Security and Cyber Security Laws, the California Consumer Privacy Act as amended by the California Privacy Rights Act, other U.S. state privacy laws and a growing number of other international and domestic regulations, are costly and will result in additional costs in our efforts to continue to comply. These laws and regulations can provide for significant penalties for non-compliance, which could result in additional costs of compliance, enforcement actions, regulatory investigations and fines, individual or class action litigation, commercial litigation or reputational harm. Ongoing efforts to comply with these laws also may divert management and employee attention from other business and growth initiatives.
View prior text (2024)
We rely on information technology systems to conduct our business, including recording and processing transactions, manufacturing and selling our products, researching and developing new products, maintaining and growing our competitive position, and supporting and communicating with our employees, customers, suppliers and other vendors. These information technology systems are important to many business-critical processes including, but not limited to, production planning, manufacturing, distribution, finance, company operations, research and development, sales and customer service. Some of these systems are maintained or operated by third-party providers, including cloud-based systems. Cyber attacks and cybersecurity threats are increasingly sophisticated, constantly evolving and originate from many sources globally, and often cannot be recognized or understood until the target has already been attacked. Despite our efforts to prevent these threats and disruptions to our information technology systems, these systems may be affected by damage or interruption resulting from, among other causes, cyber attacks, security breaches, power outages, system failures or malware (including but not limited to ransomware and other programs that operate with malicious intent). These risks are expected to continue to be magnified due to the increased reliance on information technology systems to conduct our business, including those used in furtherance of supporting remote and hybrid in-office work environments and managing our global operations. Disruptions to these systems may impair our ability to conduct business and have a material adverse effect on our business, results of operations and financial condition. While we maintain cybersecurity insurance, costs related to a cyberattack may exceed the amount of our insurance coverage or may be excluded under the terms of the policy. As part of our business, we collect and handle sensitive and confidential information about our business, customers, employees and suppliers. Despite the security measures we have in place, our facilities and systems, and those of third parties we rely on or do business with, may be vulnerable to cyber attacks, security breaches, malware (including but not limited to ransomware and other programs that operate with malicious intent), power outages, system failures, acts of vandalism, human or technical errors or other similar events or disruptions. Our information, facilities and systems and those hosted or supported by third parties on our behalf could also be impacted by the intentional or unintentional improper conduct of our employees, vendors or others who have access to and may mishandle or misappropriate sensitive and confidential information. Any such event involving the misappropriation, loss or other unauthorized disclosure of information, whether impacting us or third parties we rely on or do business with, could result in losses, damage our reputation or relationships with customers and suppliers, expose us to the risks of litigation, regulatory action and liability, disrupt our operations and have a material adverse effect on our business, results of operations and financial condition. We continue to mitigate these risks in a number of ways, including through additional investment, engagement of third-party experts and consultants, improving the security of our facilities and systems (including through upgrades to our security and information technology systems), providing annual training for all employees (with more enhanced or frequent training based on role or responsibility), assessing the continued appropriateness of relevant insurance coverage and strengthening our controls and procedures to identify, detect, protect against, respond to and mitigate these threats. We and third parties we rely on or do business with have experienced cybersecurity attacks and incidents in the past, some of which have resulted in unauthorized access to our information and systems and other disruptions to our business operations, and we could in the future experience similar incidents. The domestic and international regulatory environment related to information security, data collection and transfer, digital marketing or telemarketing, and privacy is increasingly rigorous and complex, with new and rapidly changing requirements applicable to our business, which often require changes to our business practices. Compliance with these requirements, including the European Union’s General Data Protection Regulation, China’s Personal Information Protection, Data Security, and Cyber Security Laws, the California Consumer Privacy Act as amended by the California Privacy Rights Act, a growing number of other U.S. comprehensive state privacy laws, and other international and domestic regulations, are costly and will result in additional costs in our efforts to continue to comply. These laws and regulations can provide for significant penalties for non-compliance, which could result in additional costs of compliance, enforcement actions, regulatory investigations and fines, individual or class action litigation, or reputational harm. Ongoing efforts to comply with these laws also may divert management and employee attention from other business and growth initiatives.