high match confidence
Sentence-level differences:
- Reworded sentence: "The supply chains for our businesses could also be disrupted by supplier capacity constraints, bankruptcy or exiting of the business for other reasons, decreased availability or increased cost of key raw materials or commodities, such as energy, and external events such as global economic downturns and macroeconomic trends, sanctions and trade restrictions, natural disasters, pandemic health issues, geopolitical developments, war, terrorist actions, governmental actions and legislative or regulatory changes."
- Reworded sentence: "In addition, our customers rely upon our products (i.e., instruments, etc.) within their environments, which may be at risk of compromise."
- Added sentence: "Cyber-attacks, disruptions or other incidents described above, or breaches of security in our networks, in our customers’ or third-party providers’ networks, in third-party products we use, or in cloud-based services provided to us, regardless of whether the breach is attributable to a vulnerability in our products or services, a privileged account compromise, or a failure to maintain the digital security infrastructure or security tools that protect the integrity of our products, services, and systems and data, could materially interrupt our operations or our customer’s operations, delay production and shipments, impact quality, result in theft of our and our customers’ intellectual property and trade secrets, damage our reputation or key relationships, result in defective products or services, legal claims and proceedings, liability and penalties under privacy laws and increased cost for security and remediation, in each case resulting in an adverse effect on our business and financial results."
- Added sentence: "Our success is largely dependent upon our ability to attract and retain a highly qualified workforce, comprised of scientific, technical, clinical, and management talent."
- Added sentence: "We have in the past, and may in the future, have difficulty in attracting and retaining such talent."
Current (2025):
Our reliance upon sole or limited sources of supply for certain materials or components could cause production interruptions, delays and inefficiencies. Some of our businesses purchase certain materials from sole or limited source suppliers for reasons of quality assurance,…
Read full text
Our reliance upon sole or limited sources of supply for certain materials or components could cause production interruptions, delays and inefficiencies. Some of our businesses purchase certain materials from sole or limited source suppliers for reasons of quality assurance, regulatory requirements, cost effectiveness, availability or uniqueness of design. If these or other suppliers encounter financial, operating or other difficulties, or if our relationship with them changes, we might not be able to quickly establish or qualify replacement sources of supply. The supply chains for our businesses could also be disrupted by supplier capacity constraints, bankruptcy or exiting of the business for other reasons, decreased availability or increased cost of key raw materials or commodities, such as energy, and external events such as global economic downturns and macroeconomic trends, sanctions and trade restrictions, natural disasters, pandemic health issues, geopolitical developments, war, terrorist actions, governmental actions and legislative or regulatory changes. Any of these factors could result in production interruptions, delays, extended lead times and inefficiencies. A significant cyber-attack or other disruption in, or breach in security of, our information technology systems could adversely harm our operating results and financial condition, damage our reputation or otherwise materially harm our business. We rely on information technology systems to process, transmit and store electronic information (including sensitive data such as confidential business information, medical information, financial data and personally identifiable data relating to employees, customers and other business partners) and to manage or support a variety of critical business processes and activities (such as interacting with suppliers, selling our products and services, fulfilling orders and billing, collecting and making payments, shipping products, providing services and support to customers, tracking customer activity, fulfilling contractual obligations and otherwise conducting business). We use a risk-based approach to implementing security controls, reviewing the security controls of certain key business partners and third-party service providers and conducting due diligence on companies we propose to acquire. Despite our efforts, any particular system we operate or use may be susceptible to compromise of a vulnerability or a privileged account, damage or interruption from natural disasters, power loss, telecommunication failures, data center failure, third party provider failures (including failures at cloud services), hardware and software failures, human error or sabotage, terrorist attacks, geopolitical events, computer hackers, computer viruses, ransomware, phishing, computer denial-of-service attacks, unauthorized access to customer or employee data or company trade secrets, and other attempts to harm our systems and access our information. We and our third-party providers experience cyber-attacks and other attempts to gain unauthorized access to our products, services, and systems and data on a regular basis, and we anticipate continuing to be subject to such attempts as cyber-attacks become increasingly sophisticated and more difficult to predict and protect against, particularly with the advancement of artificial intelligence. Despite our and our third-party providers’ implementation of security measures, our products, services, and systems and data, are vulnerable to cyber-attacks, data breaches, malware, inadvertent error, disruptions, tampering or other theft or misuse, including by employees, contingent workers, malicious actors, or nation-states or their agents. Although most of our systems leverage data backups, our disaster recovery planning is not sufficient for every eventuality. In addition, our customers rely upon our products (i.e., instruments, etc.) within their environments, which may be at risk of compromise. Risks affecting our products may include those associated with remote access solutions, system vulnerabilities, or delay of security updates, which may require customers to take action such as network isolation, password change, or manual update. Cyber-attacks, disruptions or other incidents described above, or breaches of security in our networks, in our customers’ or third-party providers’ networks, in third-party products we use, or in cloud-based services provided to us, regardless of whether the breach is attributable to a vulnerability in our products or services, a privileged account compromise, or a failure to maintain the digital security infrastructure or security tools that protect the integrity of our products, services, and systems and data, could materially interrupt our operations or our customer’s operations, delay production and shipments, impact quality, result in theft of our and our customers’ intellectual property and trade secrets, damage our reputation or key relationships, result in defective products or services, legal claims and proceedings, liability and penalties under privacy laws and increased cost for security and remediation, in each case resulting in an adverse effect on our business and financial results. Our success is largely dependent upon our ability to attract and retain a highly qualified workforce, comprised of scientific, technical, clinical, and management talent. We have in the past, and may in the future, have difficulty in attracting and retaining such talent. Our success in doing so is largely dependent upon various factors, including a highly competitive market, sought-after skills, management changes, competitor recruitment, and maintaining an attractive workplace culture. Macroeconomic shifts such as increased competition for employees and wage inflation, have previously and could in the future affect our talent retention, turnover rates and operational costs. We cannot ensure that we will be able to hire or retain the personnel necessary for our operations or that the departure of any personnel will not have a material impact on our financial condition and results of operations. 12 12 12
View prior text (2024)
Our reliance upon sole or limited sources of supply for certain materials or components could cause production interruptions, delays and inefficiencies. Some of our businesses purchase certain materials from sole or limited source suppliers for reasons of quality assurance, regulatory requirements, cost effectiveness, availability or uniqueness of design. If these or other suppliers encounter financial, operating or other difficulties, or if our relationship with them changes, we might not be able to quickly establish or qualify replacement sources of supply. The supply chains for our businesses could also be disrupted by supplier capacity constraints, bankruptcy or exiting of the business for other reasons, decreased availability or increased cost of key raw materials or commodities, such as energy, and external events such as global economic downturns and macroeconomic trends, natural disasters, pandemic health issues such as COVID-19, war, terrorist actions, governmental actions and legislative or regulatory changes. Any of these factors could result in production interruptions, delays, extended lead times and inefficiencies. A significant cyber-attack or other disruption in, or breach in security of, our information technology systems could adversely harm our operating results and financial condition, damage our reputation or otherwise materially harm our business. We rely on information technology systems to process, transmit and store electronic information (including sensitive data such as confidential business information, medical information, financial data and personally identifiable data relating to employees, customers and other business partners) and to manage or support a variety of critical business processes and activities (such as interacting with suppliers, selling our products and services, fulfilling orders and billing, collecting and making payments, shipping products, providing services and support to customers, tracking customer activity, fulfilling contractual obligations and otherwise conducting business). We use a risk-based approach to implementing security controls, reviewing the security controls of certain key business partners and third-party service providers and conducting due diligence on companies we propose to acquire. Despite our efforts, any particular system we operate or use may be susceptible to compromise of a vulnerability or a privileged account, damage or interruption from natural disasters, power loss, telecommunication failures, data center failure, third party provider failures (including failures at cloud services), hardware and software failures, human error or sabotage, terrorist attacks, geopolitical events, computer hackers, computer viruses, ransomware, phishing, computer denial-of-service attacks, unauthorized access to customer or employee data or company trade secrets, and other attempts to harm our systems and access our information. We and our third-party providers experience cyber-attacks and other attempts to gain unauthorized access to our products, services, and systems and data on a regular basis, and we anticipate continuing to be subject to such attempts as cyber-attacks become increasingly sophisticated and more difficult to predict and protect against, particularly with the advancement of artificial intelligence. Despite our and our third-party providers’ implementation of security measures, our products, services, and systems and data, are vulnerable to cyber-attacks, data breaches, malware, inadvertent error, disruptions, tampering or other theft or misuse, including by employees, contingent workers, malicious actors, or nation-states or their agents. Although most of our systems leverage data backups, our disaster recovery planning is not sufficient for every eventuality. In addition, our customers rely upon our products (i.e. instruments, etc.) within their environments, which may be at risk of compromise. Risks affecting our products may include those associated with remote access solutions, system vulnerabilities, or delay of security updates, which may require customers to take action such as network isolation, password change, or manual update. 12 12 12