T-Mobile US Inc.: 10-K Risk Factor Changes

2024 vs 2023  ·  SEC EDGAR  ·  2026-05-10
Other years: 2026 vs 2025 · 2025 vs 2024
⚠ AI-Generated

The summary below was generated by an AI language model and may contain errors or omissions. All other content on this page is deterministically extracted from the original SEC EDGAR filing.

T-Mobile restructured its competitive and operational risk disclosures by replacing a broad competition risk with a narrower customer attraction and retention risk, while simultaneously adding three new risk categories addressing modernization execution, sociopolitical volatility, and intellectual property protection. The company eliminated risks related to Sprint billing system integration and synergy realization - reflecting progress on legacy merger integration - while expanding disclosure on cybersecurity threats and regulatory compliance. These changes suggest a strategic shift from merger-integration concerns toward technology modernization challenges, geopolitical sensitivities, and IP management as the company's primary risk priorities.

✓ Deterministic extraction — no AI-generated data

Classification is based on semantic text similarity scoring and may include approximations. “No match” means no high-confidence textual match was found — not necessarily that a section was removed.

5
New Risks
6
Removed
5
Modified
17
Unchanged
🟢 New in Current Filing

We operate in a highly competitive industry. If we are unable to attract and retain customers, our business, financial conditions, and operating results would be negatively affected.

The wireless communications services industry is highly competitive. As the industry reaches saturation with a relatively fixed pool of customers, competition will likely further intensify, putting pressure on pricing and margins for us and all our competitors. Our ability to…

Read full text

The wireless communications services industry is highly competitive. As the industry reaches saturation with a relatively fixed pool of customers, competition will likely further intensify, putting pressure on pricing and margins for us and all our competitors. Our ability to attract and retain customers will depend on key factors such as network quality and capacity, customer service excellence, effective marketing strategies, competitive pricing, and compelling value propositions. Additionally, targeted marketing approaches for diverse customer segments, including Prepaid, Postpaid, Business and Government customers, coupled with continuous innovation in products and services, are essential for retaining and expanding our customer base. If we are unable to successfully differentiate our services from our competitors, it would adversely affect our competitive position and ability to grow our business. We have seen and expect to continue to see intense competition in all market segments from traditional Mobile Network Operators (MNOs), such as AT&T and Verizon, particularly as they invest in spectrum, their wireless network and services, and device promotions, and DISH as it continues to build out its wireless network and roll out services. Numerous other smaller and regional MNOs and MVNOs offering wireless services may also compete with us in some markets, including cable providers, such as Comcast, Charter, Cox, and Altice, as they continue to diversify their offerings to include wireless services offered under MVNO agreements. As new products and services emerge, we may also be forced to compete against non-traditional competitors from outside of the wireless communications services industry, such as satellite providers, offering similar connectivity services using alternative technologies. In broadband connectivity services, AT&T and Verizon, as well as numerous other players, such as satellite providers and cable companies, compete for customers in an increasingly competitive environment. If we are unable to compete effectively in attracting and retaining customers, it could negatively impact our business, financial condition, and operating results.

🟢 New in Current Filing

As we work to modernize our existing applications and systems, challenges with execution could have adverse operational, financial, and reputational effects on our business.

We are currently integrating, upgrading, and replacing many of our existing applications and systems, including numerous legacy systems from previous acquisitions. This process is complex and involves challenges in integrating and modernizing outdated IT infrastructure within a…

Read full text

We are currently integrating, upgrading, and replacing many of our existing applications and systems, including numerous legacy systems from previous acquisitions. This process is complex and involves challenges in integrating and modernizing outdated IT infrastructure within a limited timeframe. The success of these efforts depends on the effective allocation of resources, expansion of our technology development capabilities, leveraging artificial intelligence and emerging technologies, and ensuring access to subject-matter experts. Any delays or failures in these initiatives could impact our ability to comply with legal or regulatory requirements, ensure reliable system performance and effective cybersecurity, recover promptly from system outages, and maintain satisfactory customer and employee experiences. These issues could also hinder our ability to meet customer expectations in terms of future service capabilities and offerings and to grow our business, potentially affecting our operational and financial results and our reputational standing.

🟢 New in Current Filing

Sociopolitical volatility and polarization may adversely affect our business operations and reputation.

The current sociopolitical environment is characterized by deep complexity, volatility, and polarization on various social and political issues. The increasing intersection of technology and politics has led to rapid and unpredictable shifts in public sentiment. Social media and…

Read full text

The current sociopolitical environment is characterized by deep complexity, volatility, and polarization on various social and political issues. The increasing intersection of technology and politics has led to rapid and unpredictable shifts in public sentiment. Social media and digital platforms have amplified the voices of various stakeholders, creating the potential for swift change in public opinion and stronger reactions to corporate actions. As a company that sells products and services across the nation to millions of customers, these dynamics increase the risk of potential reputational damage, boycotts, and shifts in consumer behavior that could adversely affect our sales and profitability. In this fluid and volatile sociopolitical environment, our ability to respond effectively, sensitively, and authentically to the expectations and concerns of our customers, employees, and other stakeholders is key to mitigating these risks. If we are unable to manage these challenges effectively, there may be adverse impacts to our business, reputation, financial condition, and operating results.

🟢 New in Current Filing

Our business may be adversely impacted if we are not able to protect our intellectual property rights or if we infringe on the intellectual property rights of others.

We rely on a variety of intellectual property assets, including patents, copyrights, trademarks, and domains, to maintain our competitiveness. If we are unable to protect our intellectual property due to factors such as changes in US intellectual property laws, the value of our…

Read full text

We rely on a variety of intellectual property assets, including patents, copyrights, trademarks, and domains, to maintain our competitiveness. If we are unable to protect our intellectual property due to factors such as changes in US intellectual property laws, the value of our intellectual property may become impaired, which may adversely impact our business and financial results. Additionally, we have faced and will continue to face various litigations alleging that our products or services infringe patents or other intellectual property of third parties. If successful, these litigations could result in an award of financial compensation, including damages or royalties, business disruptions, reputational harm, or an order requiring that we cease offering, selling, and using the relevant products, equipment, services, and network functions. Defending against such litigation is not only costly and time-consuming, but it may also be disruptive to our business operations and divert resources and attention. Furthermore, the outcomes of these litigations are inherently uncertain. Our suppliers and vendors also have and will continue to face intellectual property litigation related to the technology used in the products, equipment, and services they provide to us. If successful, such litigation against our suppliers and vendors might impact their ability to continue to provide the relevant products, equipment, and services to us.

🟢 New in Current Filing

We cannot guarantee that our 2023-2024 Stockholder Return Program will be fully utilized or that it will enhance long-term stockholder value.

On September 6, 2023, our Board of Directors authorized a stockholder return program of up to $19.0 billion through December 31, 2024 (the “2023-2024 Stockholder Return Program”). The 2023-2024 Stockholder Return Program consists of repurchases of shares of our common stock and…

Read full text

On September 6, 2023, our Board of Directors authorized a stockholder return program of up to $19.0 billion through December 31, 2024 (the “2023-2024 Stockholder Return Program”). The 2023-2024 Stockholder Return Program consists of repurchases of shares of our common stock and the payment of cash dividends, with the amount available under the 2023-2024 Stockholder Return Program for share repurchases reduced by the amount of any cash dividends declared by us. As of December 31, 2023, we had used $2.2 billion to repurchase shares and paid $747 million in dividends, leaving up to $16.0 billion available for repurchases and dividends through December 31, 2024. We expect to pay quarterly dividends totaling approximately $3.0 billion in 2024 and to repurchase up to approximately $13.0 billion of additional shares. The specific timing and amount of any share repurchases, and the specific timing and amount of any dividend payments, under the 2023-2024 Stockholder Return Program will depend on prevailing share prices, general economic and market conditions, Company performance and other considerations, such as whether the Company determines that there are other uses for the funds currently authorized for the program that would be more advantageous for our business. In addition, the specific timing 23 23 23 Table of Contents Table of Contents and amount of any dividend payments are subject to declaration on future dates by the Board in its sole discretion. The 2023-2024 Stockholder Return Program could impact our cash flows and affect the trading price of our common stock and increase volatility. We cannot guarantee that the 2023-2024 Stockholder Return Program will be fully consummated or that it will enhance long-term stockholder value. The 2023-2024 Stockholder Return Program does not obligate the Company to acquire any particular amount of common stock or to declare and pay any particular amount of dividends, and the 2023-2024 Stockholder Return Program may be suspended or discontinued at any time at the Company’s discretion. Any announcement of termination of the 2023-2024 Stockholder Return Program may result in a decrease in the price of our common stock.

🔴 No Match in Current Filing

Competition, industry consolidation, and changes in the market for wireless communications services and other forms of connectivity could negatively affect our ability to attract and retain customers and adversely affect our business, financial condition and operating results.

This section from the 2023 filing does not have a high-confidence textual match in the 2024 filing. It may have been removed, merged, or substantially reworded.

We have multiple competitors that possess either more or different access to wireless assets, and yet we compete for customers based principally on service/device offerings, price, network coverage, speed and quality, and customer service. We expect the wireless industry’s…

View 2023 text

We have multiple competitors that possess either more or different access to wireless assets, and yet we compete for customers based principally on service/device offerings, price, network coverage, speed and quality, and customer service. We expect the wireless industry’s customer growth rate to moderate over time in comparison with historical growth rates, leading to ongoing competition for customers. We also expect that our customers’ appetite for data services will place increasing demands on wireless service providers. This competition and increasing demands for data services will continue to put pressure on pricing and margins as companies, including us, compete for a relatively fixed pool of customers with an ever-expanding variety of 11 11 11 Table of Contents Table of Contents products and services. Our ability to compete will depend upon, among other things, continued absolute and relative improvement in network quality, capacity and customer service, effective marketing and selling of products and services, innovation, and attractive pricing, all of which will involve significant expenses. We face increased competition from other service providers in the connectivity sector from within and outside of the wireless industry, including from cable, fiber and satellite providers, as industry sectors converge. Cable companies such as Comcast, Charter, and Altice are diversifying outside cable, voice and broadband services to also offer wireless services. Fiber companies such as Lumen Technologies and Windstream have announced plans for fiber buildouts, often supported by government funding. We expect DISH, which has already acquired several MVNOs, to build a wireless network and offer competitive postpaid and prepaid wireless service plans. Verizon and AT&T have refocused on connectivity services, including fiber builds and deployment of next generation wireless technology, and we expect both companies to increase competitive pressure, including by expanding partnerships and offerings. These factors could make it more difficult for us to continue to attract and retain customers, by adversely affecting our competitive position and ability to grow, including affecting our fixed wireless High Speed Internet growth plans, which could have a material adverse effect on our business, financial condition, and operating results. We have seen, and continue to expect, additional joint ventures, mergers, acquisitions, and strategic alliances in the converged connectivity sector, which could result in larger competitors competing for a limited number of customers. Further consolidation could negatively impact our businesses, including wholesale. For example, we have experienced and will continue to experience declining revenues from our wholesale business as Verizon migrates legacy TracFone customers off the T-Mobile network and DISH services more of its Boost Mobile customers with their standalone network. Our competitors may also enter into exclusive handset, device, or content arrangements, execute pervasive advertising and marketing campaigns, or otherwise improve their cost position relative to ours, making it more difficult for us to compete and negatively impacting our business. In addition, refusal of our competitors and partners to provide critical access to resources and inputs, such as roaming and/or backhaul services to us, on reasonable terms could negatively impact our business.

🔴 No Match in Current Filing

We are modernizing our billing system architecture for our customers. As part of this strategy, we are converting Sprint’s legacy customers onto T-Mobile’s billing platforms. As a result, we will operate and maintain multiple billing systems until such conversion is completed. Any unanticipated difficulties, disruption, or significant delays in either of these efforts could have adverse operational, financial, and reputational effects on our business.

This section from the 2023 filing does not have a high-confidence textual match in the 2024 filing. It may have been removed, merged, or substantially reworded.

We are currently operating and maintaining multiple billing systems and supporting platforms. We expect to continue to do so until successful conversion of Sprint’s legacy customers to T-Mobile’s existing billing platforms. We may encounter unanticipated difficulties or…

View 2023 text

We are currently operating and maintaining multiple billing systems and supporting platforms. We expect to continue to do so until successful conversion of Sprint’s legacy customers to T-Mobile’s existing billing platforms. We may encounter unanticipated difficulties or experience delays in the ongoing integration efforts with respect to billing, causing major system or business disruptions. In addition, we or our supporting vendors may experience errors, cyber-attacks or other operational disruptions that could negatively impact us and over which we may have limited control. Interruptions and/or failure of these billing systems could disrupt our operations and impact our ability to provide or bill for our services, retain customers, attract new customers, or negatively impact overall customer experience. Any occurrence of the foregoing could cause material adverse effects on our operations and financial condition, and/or material weaknesses in our internal control over financial reporting and reputational damage.

🔴 No Match in Current Filing

We may not fully realize the synergy benefits from the Transactions in the expected time frame.

This section from the 2023 filing does not have a high-confidence textual match in the 2024 filing. It may have been removed, merged, or substantially reworded.

Our ability to realize the expected benefits from the Merger will depend on our ability to integrate the two businesses in a manner that facilitates growth opportunities and achieves the projected cost savings. Although we have completed a number of integration activities, we…

View 2023 text

Our ability to realize the expected benefits from the Merger will depend on our ability to integrate the two businesses in a manner that facilitates growth opportunities and achieves the projected cost savings. Although we have completed a number of integration activities, we continue the process and may incur additional expenses as a result of challenges in combining operations such as: 17 17 17 Table of Contents Table of Contents •difficulties in integrating operations and systems, including intellectual property and communications systems, administrative and information technology infrastructure, and supplier and vendor arrangements; •difficulties in operating and maintaining multiple billing and related support systems until conversion is completed; •difficulties in managing the expanded operations of a significantly larger and more complex company; •compliance with Government Commitments relating to national security; and •other potential adverse consequences and unforeseen increased expenses or liabilities associated with the Transactions.

🔴 No Match in Current Filing

flexibility.

This section from the 2023 filing does not have a high-confidence textual match in the 2024 filing. It may have been removed, merged, or substantially reworded.

The agreements governing our indebtedness and other financings impose operating and financial restrictions. These restrictions, subject in certain cases to customary baskets, exceptions and maintenance and incurrence-based financial tests, together with our debt service…

View 2023 text

The agreements governing our indebtedness and other financings impose operating and financial restrictions. These restrictions, subject in certain cases to customary baskets, exceptions and maintenance and incurrence-based financial tests, together with our debt service obligations, may limit our ability to engage in transactions and pursue strategic business opportunities. These restrictions could limit our ability to obtain debt financing, refinance or pay principal on our outstanding indebtedness, complete acquisitions for cash or indebtedness or react to business, economic, market and industry conditions and other changes in our operating environment or the economy. Any future indebtedness that we incur may contain similar or more restrictive covenants. Any failure to comply with the restrictions of our debt agreements may result in an event of default under these agreements, which in turn may result in defaults or acceleration of obligations under these and other agreements, giving our lenders the right to terminate the commitments they had made or the right to require us to repay all amounts then 18 18 18 Table of Contents Table of Contents outstanding plus any interest, fees, penalties, or premiums. An event of default may also compel us to sell certain assets securing indebtedness under certain of these agreements.

🔴 No Match in Current Filing

Credit rating downgrades and/or inability to access debt markets could adversely affect our business, cash flows, financial condition, and operating results.

This section from the 2023 filing does not have a high-confidence textual match in the 2024 filing. It may have been removed, merged, or substantially reworded.

Credit ratings impact the cost and availability of future borrowings and, as a result, cost of capital. Our current ratings reflect each rating agency’s opinion of our financial strength, operating performance, and ability to meet our debt obligations. Our capital structure and…

View 2023 text

Credit ratings impact the cost and availability of future borrowings and, as a result, cost of capital. Our current ratings reflect each rating agency’s opinion of our financial strength, operating performance, and ability to meet our debt obligations. Our capital structure and business model are reliant on continued access to debt markets. Each rating agency reviews our ratings periodically, and there can be no assurance that such ratings will be maintained in the future. A downgrade in our corporate rating and/or our issued debt ratings could impact our ability to access debt markets and adversely affect our business, cash flows, financial condition, and operating results.

🔴 No Match in Current Filing

We cannot guarantee that our 2022 Stock Repurchase Program will be fully consummated or that our 2022 Stock Repurchase Program will enhance long-term stockholder value.

This section from the 2023 filing does not have a high-confidence textual match in the 2024 filing. It may have been removed, merged, or substantially reworded.

Our Board of Directors has authorized our 2022 Stock Repurchase Program for up to $14.0 billion of the Company’s common stock through September 30, 2023, with $3.0 billion spent by the Company on share repurchases as of December 31, 2022, and an additional $2.1 billion spent by…

View 2023 text

Our Board of Directors has authorized our 2022 Stock Repurchase Program for up to $14.0 billion of the Company’s common stock through September 30, 2023, with $3.0 billion spent by the Company on share repurchases as of December 31, 2022, and an additional $2.1 billion spent by the Company from January 1, 2023 through February 10, 2023. Any additional share repurchases will depend upon, among other factors, our cash balances and potential future capital requirements, our results of operations and financial condition, our ability to access capital markets, our priorities for the use of cash for other purposes, the price of our common stock, and other factors that we may deem relevant. The existence of the 2022 Stock Repurchase Program could cause our stock price, in certain cases, to be higher or lower than it otherwise would be and could potentially reduce the market liquidity or have other unintended consequences for our stock. We can provide no assurance that we will repurchase shares of our common stock at favorable prices, if at all. Although the program is intended to enhance long-term stockholder value, there is no assurance it will do so. In addition, the 2022 Stock Repurchase Program does not obligate the Company to acquire any particular amount of common stock. The 2022 Stock Repurchase Program may be suspended or discontinued, or the amount to be spent by the Company to repurchase shares could be reduced, at any time at the Company’s discretion. Any decision to reduce or discontinue repurchasing shares of our common stock pursuant to our 2022 Stock Repurchase Program could cause the market price for our common stock to decline and may negatively impact our reputation and investor confidence in us. 24 24 24 Table of Contents Table of Contents

🟡 Modified

Changes in regulations or in the regulatory framework under which we operate could adversely affect our business, financial condition, and operating results.

high match confidence

Sentence-level differences:

  • Reworded sentence: "We are subject to regulatory oversight by various federal, state, and local agencies, as well as judicial review and actions, on issues related to the wireless industry that include, but are not limited to, roaming, interconnection, spectrum allocation and licensing, facilities siting, pole attachments, intercarrier compensation, Universal Service Fund (“USF”), 911 services, robocalling/robotexting, consumer protection, consumer privacy, and cybersecurity."
  • Removed sentence: "As an example, we recently won spectrum licenses in the so-called “C band” to support our continued rollout of 5G technology and services."
  • Removed sentence: "There have been concerns raised that use of this spectrum by wireless carriers for 5G deployment could interfere with the altimeters in certain aircraft, and there is an ongoing discussion between the industry, the FCC, and the FAA as to whether and how 5G operations should be limited around airports."
  • Reworded sentence: "We cannot assure that the FCC or any other federal, state, or local agencies will not adopt regulations, change or discontinue existing programs, implement new programs, or take enforcement or other actions that would adversely affect our business, impose new costs, or require changes in current or planned operations, including timing of the shutdown of legacy technologies."
  • Added sentence: "Further, government funded programs, such as the Affordable Connectivity Program (ACP) and the Emergency Connectivity Fund (ECF) or Lifeline program, may discontinue due to the exhaustion of funding, which could result in the reduction in low-income customers and the associated revenue."

Current (2024):

We are subject to regulatory oversight by various federal, state, and local agencies, as well as judicial review and actions, on issues related to the wireless industry that include, but are not limited to, roaming, interconnection, spectrum allocation and licensing, facilities…

Read full text

We are subject to regulatory oversight by various federal, state, and local agencies, as well as judicial review and actions, on issues related to the wireless industry that include, but are not limited to, roaming, interconnection, spectrum allocation and licensing, facilities siting, pole attachments, intercarrier compensation, Universal Service Fund (“USF”), 911 services, robocalling/robotexting, consumer protection, consumer privacy, and cybersecurity. We are also subject to regulations in connection with other aspects of our business, including device financing and insurance activities. The FCC regulates the licensing, construction, modification, operation, ownership, sale, and interconnection of wireless communications systems, as do some state and local regulatory agencies. In particular, the FCC imposes significant regulation on licensees of wireless spectrum with respect to how radio spectrum is used by licensees, the nature of the services that licensees may offer and how the services may be offered, and the resolution of issues of interference between operators in the same or adjacent spectrum bands. Changes necessary to resolve interference issues or concerns may have a significant impact on our ability to fully utilize our spectrum. Additionally, the FTC and other federal and state agencies have asserted that they have jurisdiction over some consumer protection matters, and the elimination and prevention of anticompetitive business practices with respect to the provision of wireless products and services. We cannot assure that the FCC or any other federal, state, or local agencies will not adopt regulations, change or discontinue existing programs, implement new programs, or take enforcement or other actions that would adversely affect our business, impose new costs, or require changes in current or planned operations, including timing of the shutdown of legacy technologies. For example, in 2015 and 2016, the FCC established net neutrality and privacy regimes that applied to our operations. Both sets of rules potentially subjected some of our initiatives and practices to more burdensome requirements and heightened scrutiny by federal and state regulators, the public, edge providers, and private litigants regarding whether such initiatives or practices are compliant. While the FCC rules were largely rolled back in 2017, the FCC recently initiated a rulemaking proceeding proposing to reinstate the net neutrality rules, to reassert authority in the broadband privacy arena, and to subject broadband offerings to other forms of regulatory oversight. In addition, the current FCC updated transparency obligations to require nutrition-style broadband label disclosures in 2024 that could prompt regulatory inquiries. In addition, some states and other jurisdictions have enacted laws in these areas (including, for example, California and other states’ net neutrality laws, the CCPA and CPRA as discussed below) and others are considering enacting similar laws. It also is uncertain what rules may be promulgated under the current administration (e.g., the FTC has discussed promulgating privacy rules), perpetuating the risk and uncertainty regarding the regulatory environment and compliance around these issues. In addition, states are increasingly focused on the quality of service and support that wireless communications service providers provide to their customers and several states have proposed or enacted new and potentially burdensome regulations in this area. We also face potential investigations by, and inquiries from or actions by state public utility commissions. We also cannot assure that Congress will not amend the Communications Act, from which the FCC obtains its authority, and which serves to limit state authority, or enact other legislation in a manner that could be adverse to our business. Further, government funded programs, such as the Affordable Connectivity Program (ACP) and the Emergency Connectivity Fund (ECF) or Lifeline program, may discontinue due to the exhaustion of funding, which could result in the reduction in low-income customers and the associated revenue. Failure to comply with applicable regulations could have a material adverse effect on our business, financial condition, and operating results. We could be subject to fines, forfeitures, and other penalties (including, in extreme cases, revocation of our spectrum licenses) for failure to comply with the FCC or other governmental regulations, even if any such noncompliance was unintentional. The loss of any licenses, or any related fines or forfeitures, could adversely affect our business, financial condition, and operating results.

View prior text (2023)

We are subject to regulatory oversight by various federal, state, and local agencies, as well as judicial review and actions, on issues related to the wireless industry that include, but are not limited to, roaming, interconnection, spectrum allocation and licensing, facilities siting, pole attachments, intercarrier compensation, Universal Service Fund, 911 services, consumer protection, consumer privacy, and cybersecurity. We are also subject to regulations in connection with other aspects of our business, including device financing and insurance activities. The FCC regulates the licensing, construction, modification, operation, ownership, sale, and interconnection of wireless communications systems, as do some state and local regulatory agencies. In particular, the FCC imposes significant regulation on licensees of wireless spectrum with respect to how radio spectrum is used by licensees, the nature of the services that licensees may offer and how the services may be offered, and the resolution of issues of interference between operators in the same or adjacent spectrum bands. Changes necessary to resolve interference issues or concerns may have a significant impact on our ability to fully utilize our spectrum. As an example, we recently won spectrum licenses in the so-called “C band” to support our continued rollout of 5G technology and services. There have been concerns raised that use of this spectrum by wireless carriers for 5G deployment could interfere with the altimeters in certain aircraft, and there is an ongoing discussion between the industry, the FCC, and the FAA as to whether and how 5G operations should be limited around airports. Additionally, the FTC and other federal and state agencies have asserted that they have jurisdiction over some consumer protection matters, and the elimination and prevention of anticompetitive business practices with respect to the provision of wireless products and services. We cannot assure that the FCC or any other federal, state, or local agencies will not adopt regulations, implement new programs, or take enforcement or other actions that would adversely affect our business, impose new costs, or require changes in current or planned operations, including timing of the shutdown of legacy technologies. For example, in response to the Pandemic, the California Public Utilities Commission adopted a resolution providing a moratorium on customer disconnects and late fees for certain California customers facing financial hardship. Additionally, in 2015 and 2016, the FCC established net neutrality and privacy regimes that applied to our operations. Both sets of rules potentially subjected some of our initiatives and practices to more burdensome requirements and heightened scrutiny by federal and state regulators, the public, edge providers, 19 19 19 Table of Contents Table of Contents and private litigants regarding whether such initiatives or practices are compliant. While the FCC rules were largely rolled back in December 2017, the current FCC updated transparency obligations to require nutrition-style broadband label disclosures effective potentially in 2023 that could prompt regulatory inquiries, and the FCC could decide to establish new net neutrality requirements. In addition, some states and other jurisdictions have enacted laws in these areas (including, for example, California and other states’ net neutrality laws, the CCPA and CPRA as discussed below) and others are considering enacting similar laws. It also is uncertain what rules may be promulgated under the current administration (e.g., the FTC has discussed promulgating privacy rules), perpetuating the risk and uncertainty regarding the regulatory environment and compliance around these issues. In addition, states are increasingly focused on the quality of service and support that wireless communications service providers provide to their customers and several states have proposed or enacted new and potentially burdensome regulations in this area. We also face potential investigations by, and inquiries from or actions by state public utility commissions. We also cannot assure that Congress will not amend the Communications Act, from which the FCC obtains its authority, and which serves to limit state authority, or enact other legislation in a manner that could be adverse to our business. Failure to comply with applicable regulations could have a material adverse effect on our business, financial condition, and operating results. We could be subject to fines, forfeitures, and other penalties (including, in extreme cases, revocation of our spectrum licenses) for failure to comply with the FCC or other governmental regulations, even if any such noncompliance was unintentional. The loss of any licenses, or any related fines or forfeitures, could adversely affect our business, financial condition, and operating results.

🟡 Modified

We have experienced criminal cyberattacks and are vulnerable to disruption, data loss and other security breaches, whether directly or indirectly through third parties whose products and services we rely on in operating our business.

high match confidence

Sentence-level differences:

  • Reworded sentence: "Additionally, to offer services to our customers and operate our business, we utilize a number of applications and systems, including those we own and operate as well as others provided by third-party providers, such as cloud services (collectively, “Systems”)."
  • Reworded sentence: "12 12 12 Table of Contents Table of Contents In addition, we routinely rely upon third-party providers whose products and services are used in our business."
  • Removed sentence: "With the assistance of outside cybersecurity experts, we located and closed the unauthorized access to our systems and identified current, former, and prospective customers whose information was impacted and notified them, consistent with state and federal requirements."
  • Removed sentence: "We have incurred certain cyberattack-related expenses, including costs to remediate the attack, provide additional customer support and enhance 12 12 12 Table of Contents Table of Contents customer protection, and expect to incur additional expense in future periods resulting from the attack."
  • Removed sentence: "For more information, see “Recent Cyberattacks” in the Overview section of our Management’s Discussion and Analysis of Financial Condition and Results of Operations."

Current (2024):

Our business involves the receipt, storage, and transmission of confidential information about our customers, such as sensitive personal, account and payment card information, confidential information about our employees and suppliers, and other sensitive information about our…

Read full text

Our business involves the receipt, storage, and transmission of confidential information about our customers, such as sensitive personal, account and payment card information, confidential information about our employees and suppliers, and other sensitive information about our Company, such as our business plans, transactions, financial information, and intellectual property (collectively, “Confidential Information”). Additionally, to offer services to our customers and operate our business, we utilize a number of applications and systems, including those we own and operate as well as others provided by third-party providers, such as cloud services (collectively, “Systems”). We are subject to persistent cyberattacks and threats to our business from a variety of bad actors, many of whom attempt to gain unauthorized access to and compromise Confidential Information and Systems. In some cases, the bad actors exploit bugs, errors, misconfigurations or other vulnerabilities in our Systems to obtain Confidential Information. In other cases, these bad actors may obtain unauthorized access to Confidential Information by exploiting insider access or utilizing log in credentials taken from our customers, employees, or third-party providers through credential harvesting, social engineering or other means. Other bad actors aim to cause serious operational disruptions to our business and Systems through ransomware or distributed denial of services attacks. Cyberattacks against companies like ours have increased in frequency and scope of potential harm over time, and the methods used to gain unauthorized access constantly evolve, making it increasingly difficult to anticipate, prevent, and detect incidents successfully in every instance. They are perpetrated by a variety of groups and persons, including state-sponsored parties, malicious actors, employees, contractors, or other unrelated third parties. Some of these persons reside in jurisdictions where law enforcement measures to address such attacks are ineffective or unavailable, and such attacks may even be perpetrated by or at the behest of foreign governments. 12 12 12 Table of Contents Table of Contents In addition, we routinely rely upon third-party providers whose products and services are used in our business. These third-party providers have experienced in the past, and will continue to experience in the future, cyberattacks that involve attempts to obtain unauthorized access to our Confidential Information and/or to create operational disruptions that could adversely affect our business, and these providers also face other security challenges common to all parties that collect and process information. In August 2021, we disclosed that our systems were subject to a criminal cyberattack that compromised certain data of millions of our current customers, former customers, and prospective customers, including, in some instances, social security numbers, names, addresses, dates of birth and driver’s license/identification numbers. As a result of the August 2021 cyberattack, we are subject to numerous claims, lawsuits and regulatory inquiries, the ongoing costs of which may be material, and we may be subject to further regulatory inquiries and private litigation. For more information, see “– Contingencies and Litigation – Litigation and Regulatory Matters” in Note 17 – Commitments and Contingencies of the Notes to the Consolidated Financial Statements. In January 2023, we disclosed that a bad actor was obtaining data through a single Application Programming Interface (“API”) without authorization that was only able to provide a limited set of customer account data, including name, billing address, email, phone number, date of birth, T-Mobile account number and information such as the number of lines on the account and plan features. Our investigation indicated that the bad actor(s) obtained data from this API for approximately 37 million current postpaid and prepaid customer accounts, though many of these accounts did not include the full data set. As a result of the August 2021 cyberattack and the January 2023 cyberattack, we have incurred and may continue to incur significant costs or experience other material financial impacts, which may not be covered by, or may exceed the coverage limits of, our cyber liability insurance, and such costs and impacts may have a material adverse effect on our business, reputation, financial condition, cash flows and operating results. In addition to the August 2021 cyberattack and the January 2023 cyberattack, we have experienced other unrelated non-material incidents involving unauthorized access to certain Confidential Information and Systems. Typically, these incidents have involved attempts to commit fraud by taking control of a customer’s phone line, often by exploiting insider access or using compromised credentials. In other cases, the incidents have involved unauthorized access to certain of our customers’ private information, including credit card information, financial data, social security numbers or passwords, and to certain of our intellectual property. Some of these incidents have occurred at third-party providers, including third parties who provide us with various Systems and others who sell our products and services through retail locations or take care of our customers. Our procedures and safeguards to prevent unauthorized access to Confidential Information and to defend against cyberattacks seeking to disrupt our operations must be continually evaluated and enhanced to address the ever-evolving threat landscape and changing cybersecurity regulations. These preventative actions require the investment of significant resources and management time and attention. Additionally, we do not have control of the cybersecurity systems, breach prevention, and response protocols of our third-party providers, including through our cybersecurity programs or policies. While T-Mobile may have contractual rights to assess the effectiveness of many of our providers’ systems and protocols, we do not have the means to know or assess the effectiveness of all of our providers’ systems and controls at all times. We cannot provide any assurances that actions taken by us, or our third-party providers, including through our cybersecurity programs or policies, will adequately repel a significant cyberattack or prevent or substantially mitigate the impacts of cybersecurity breaches or misuses of Confidential Information, unauthorized access to our networks or systems or exploits against third-party environments, or that we, or our third-party providers, will be able to effectively identify, investigate, and remediate such incidents in a timely manner or at all. We expect to continue to be the target of cyberattacks, given the nature of our business, and we expect the same with respect to our third-party providers. We also expect that threat actors will continue to gain sophistication including in the use of tools and techniques (such as artificial intelligence) that are specifically designed to circumvent security controls, evade detection, and obfuscate forensic evidence, making it more challenging for us to identify, investigate and recover from future cyberattacks in a timely and effective manner. In addition, we have acquired and continue to acquire companies with cybersecurity vulnerabilities or unsophisticated security measures, which exposes us to significant cybersecurity, operational, and financial risks. If we fail to protect Confidential Information or to prevent operational disruptions from future cyberattacks, there may be a material adverse effect on our business, reputation, financial condition, cash flows, and operating results.

View prior text (2023)

Our business involves the receipt, storage, and transmission of confidential information about our customers, such as sensitive personal, account and payment card information, confidential information about our employees and suppliers, and other sensitive information about our Company, such as our business plans, transactions, financial information, and intellectual property (collectively, “Confidential Information”). We are subject to persistent cyberattacks and threats to our networks, systems, and supply chain from a variety of bad actors, many of whom attempt to gain access to and compromise Confidential Information by exploiting bugs, errors, misconfigurations or other vulnerabilities in our networks and other systems (including purchased and third-party systems) or by engaging in credential harvesting or social engineering. In some cases, these bad actors may obtain unauthorized access to Confidential Information utilizing credentials taken from our customers, employees, or third parties. Other bad actors aim to cause serious operational disruptions to our business or networks through other means, such as through ransomware or distributed denial of services attacks. Cyberattacks against companies like ours have increased in frequency and potential harm over time, and the methods used to gain unauthorized access constantly evolve, making it increasingly difficult to anticipate, prevent, and/or detect incidents successfully in every instance. They are perpetrated by a variety of groups and persons, including state-sponsored parties, malicious actors, employees, contractors, or other unrelated third parties. Some of these persons reside in jurisdictions where law enforcement measures to address such attacks are ineffective or unavailable, and such attacks may even be perpetrated by or at the behest of foreign governments. In addition, we routinely provide certain Confidential Information to third-party providers whose products and services are used in our business operations, including as part of our IT systems, such as cloud services. These third-party providers have experienced in the past, and will continue to experience in the future, cyberattacks that involve attempts to obtain unauthorized access to our Confidential Information and/or to create operational disruptions that could adversely affect our business, and these providers also face other security challenges common to all parties that collect and process information. In August 2021, we disclosed that our systems were subject to a criminal cyberattack that compromised certain data of millions of our current customers, former customers, and prospective customers, including, in some instances, social security numbers, names, addresses, dates of birth and driver’s license/identification numbers. With the assistance of outside cybersecurity experts, we located and closed the unauthorized access to our systems and identified current, former, and prospective customers whose information was impacted and notified them, consistent with state and federal requirements. We have incurred certain cyberattack-related expenses, including costs to remediate the attack, provide additional customer support and enhance 12 12 12 Table of Contents Table of Contents customer protection, and expect to incur additional expense in future periods resulting from the attack. For more information, see “Recent Cyberattacks” in the Overview section of our Management’s Discussion and Analysis of Financial Condition and Results of Operations. As a result of the August 2021 cyberattack, we are subject to numerous claims, lawsuits and regulatory inquiries, the ongoing costs of which may be material, and we may be subject to further regulatory inquiries and private litigation. For more information, see “– Contingencies and Litigation – Litigation and Regulatory Matters” in Note 19 – Commitments and Contingencies of the Notes to the Consolidated Financial Statements. In January 2023, we disclosed that a bad actor was obtaining data through a single Application Programming Interface (“API”) without authorization. Based on our investigation to date, the impacted API is only able to provide a limited set of customer account data, including name, billing address, email, phone number, date of birth, T-Mobile account number and information such as the number of lines on the account and plan features. The result from our investigation to date indicates that the bad actor(s) obtained data from this API for approximately 37 million current postpaid and prepaid customer accounts, though many of these accounts did not include the full data set. We believe that the bad actor first retrieved data through the impacted API starting on or around November 25, 2022. We continue to investigate the incident and have notified individuals whose information was impacted consistent with state and federal requirements. As a result of the August 2021 cyberattack and the January 2023 cyberattack, we may incur significant costs or experience other material financial impacts, which may not be covered by, or may exceed the coverage limits of, our cyber liability insurance, and such costs and impacts may have a material adverse effect on our business, reputation, financial condition, cash flows and operating results. In addition to the recent cyberattacks, we have experienced other unrelated immaterial incidents involving unauthorized access to certain Confidential Information. Typically, these incidents have involved attempts to commit fraud by taking control of a customer’s phone line, often by using compromised credentials. In other cases, the incidents have involved unauthorized access to certain of our customers’ private information, including credit card information, financial data, social security numbers or passwords, and to certain of our intellectual property. Our procedures and safeguards to prevent unauthorized access to Confidential Information and to defend against cyberattacks seeking to disrupt our operations must be continually evaluated and enhanced to address the ever-evolving threat landscape and changing cybersecurity regulations. These preventative actions require the investment of significant resources and management time and attention. Additionally, we do not have control of the cybersecurity systems, breach prevention, and response protocols of our third-party providers. While T-Mobile may have contractual rights to assess the effectiveness of many of our providers’ systems and protocols, we do not have the means to know or assess the effectiveness of all of our providers’ systems and controls at all times. We cannot provide any assurances that actions taken by us, or our third-party providers, will adequately repel a significant cyberattack or prevent or substantially mitigate the impacts of cybersecurity breaches or misuses of Confidential Information, unauthorized access to our networks or systems or exploits against third-party environments, or that we, or our third-party providers, will be able to effectively identify, investigate, and remediate such incidents in a timely manner or at all. We expect to continue to be the target of cyberattacks, given the nature of our business, and we expect the same with respect to our third-party providers. If we fail to protect Confidential Information or to prevent operational disruptions from future cyberattacks, there may be a material adverse effect on our business, reputation, financial condition, cash flows, and operating results.

🟡 Modified

Laws and regulations relating to the handling of privacy and data protection may result in increased costs, legal claims, fines against us, or reputational damage.

high match confidence

Sentence-level differences:

  • Reworded sentence: "Since 2020, a number of states have enacted new, comprehensive privacy laws that create new data privacy rights for residents of those states and new compliance obligations for us and the industry in general, in addition to private rights of action for certain types of data breaches."

Current (2024):

Since 2020, a number of states have enacted new, comprehensive privacy laws that create new data privacy rights for residents of those states and new compliance obligations for us and the industry in general, in addition to private rights of action for certain types of data…

Read full text

Since 2020, a number of states have enacted new, comprehensive privacy laws that create new data privacy rights for residents of those states and new compliance obligations for us and the industry in general, in addition to private rights of action for certain types of data breaches. These include the California Consumer Privacy Act (“CCPA”), recently modified by the California Privacy Rights Act (“CPRA”), similar laws in Colorado, Connecticut, Utah, and Virginia that went into effect in 2023, and similar laws in Delaware, Indiana, Iowa, Montana, Oregon, Tennessee, and Texas that will go into effect in the next few years. Pending legislation in several other states would create similar laws elsewhere. All of these new privacy laws and others that we expect to be developed and enacted going forward will impose additional data protection obligations and 19 19 19 Table of Contents Table of Contents potential liability on companies such as ours doing business in those states. Further, privacy laws also limit our ability to collect and use personal information. We have incurred and will continue to incur significant implementation costs to ensure compliance with the CCPA, the CPRA, new privacy laws in other states, and their related regulations, including managing the complexity of laws that vary from state to state. Both federal and state governments are considering additional privacy laws and regulations which, if passed, could further impact our business, strategies, offerings, and initiatives and cause us to incur further costs. Any actual or perceived failure to comply with the CCPA, CPRA, other data privacy laws or regulations, or related contractual or other obligations, or any perceived privacy rights violation, could lead to investigations, claims, and proceedings by governmental entities and private parties, damages for contract breaches, and other significant costs, penalties, and other liabilities, as well as harm to our reputation and market position.

View prior text (2023)

In January 2020, the California Consumer Privacy Act (the “CCPA”) became effective, creating new data privacy rights for California residents and new compliance obligations for us and industry in general, in addition to private rights of action for certain types of data breaches. Moreover, new privacy laws are being developed and/or enacted in many jurisdictions, for example, in Colorado, Utah, Connecticut, Virginia, and in California, where the California Privacy Rights Act (“CPRA”) (which modifies the CCPA) recently became effective. All of these new privacy laws and others that we expect to be developed and enacted going forward will impose additional data protection obligations and potential liability on companies such as ours doing business in those states. We have incurred and will continue to incur significant implementation costs to ensure compliance with the CCPA, the CPRA, new privacy laws in other states, and their related regulations, including managing the complexity of laws that vary from state to state. Both federal and state governments are considering additional privacy laws and regulations which, if passed, could further impact our business, strategies, offerings, and initiatives and cause us to incur further costs. Any actual or perceived failure to comply with the CCPA, CPRA, other data privacy laws or regulations, or related contractual or other obligations, or any perceived privacy rights violation, could lead to investigations, claims, and proceedings by governmental entities and private parties, damages for contract breaches, and other significant costs, penalties, and other liabilities, as well as harm to our reputation and market position.

🟡 Modified

Our business may be adversely impacted if we are not able to successfully manage the ongoing arrangements entered into in connection with the Prepaid Transaction and known or unknown liabilities arising in connection therewith.

high match confidence

Sentence-level differences:

  • Reworded sentence: "In connection with the closing of the Prepaid Transaction, we and DISH entered into certain arrangements, including a Master Network Services Agreement (the “MNSA”) and a License Purchase Agreement (as amended, the “DISH License Purchase Agreement”)."
  • Reworded sentence: "As set forth in the MNSA, the Company provides DISH, among other things, (a) legacy network services for certain Boost Mobile prepaid end users on the Sprint network, (b) T-Mobile network services for certain end users that have been migrated to the T-Mobile network or provisioned on the T-Mobile network by or on behalf of DISH and (c) infrastructure mobile network operator services to assist in the access and integration of the DISH network."
  • Added sentence: "16 16 16 Table of Contents Table of Contents"

Current (2024):

In connection with the closing of the Prepaid Transaction, we and DISH entered into certain arrangements, including a Master Network Services Agreement (the “MNSA”) and a License Purchase Agreement (as amended, the “DISH License Purchase Agreement”). Pursuant to the MNSA, DISH…

Read full text

In connection with the closing of the Prepaid Transaction, we and DISH entered into certain arrangements, including a Master Network Services Agreement (the “MNSA”) and a License Purchase Agreement (as amended, the “DISH License Purchase Agreement”). Pursuant to the MNSA, DISH will receive network services from the Company for a period of seven years. As set forth in the MNSA, the Company provides DISH, among other things, (a) legacy network services for certain Boost Mobile prepaid end users on the Sprint network, (b) T-Mobile network services for certain end users that have been migrated to the T-Mobile network or provisioned on the T-Mobile network by or on behalf of DISH and (c) infrastructure mobile network operator services to assist in the access and integration of the DISH network. Pursuant to the DISH License Purchase Agreement, DISH has agreed to purchase all of Sprint’s 800 MHz spectrum (approximately 13.5 MHz of nationwide spectrum) for a total of $3.6 billion. Pursuant to an amendment to the DISH License Purchase Agreement (the “LPS Amendment”) executed by us and DISH and approved by the Court along with a proposed amendment to the Final Judgment on October 23, 2023, if DISH fails to purchase such spectrum on or prior to April 1, 2024, then DISH’s sole liability will be that the Company can retain a non-refundable extension fee of $100 million. In such instance, absent prior approval from the U.S. Department of Justice, T-Mobile is required to conduct an auction sale of all of Sprint’s 800 MHz spectrum under the terms set forth in the Final Judgment, but would not be required to divest such spectrum for an amount less than $3.6 billion. Failure to successfully manage these ongoing arrangements entered into in connection with the Prepaid Transaction and liabilities arising in connection therewith may result in material unanticipated problems, including diversion of management time and energy, significant expenses and liabilities. There may also be other potential adverse consequences and unforeseen increased expenses or liabilities associated with the Prepaid Transaction, the occurrence of which could materially impact our business, financial condition, liquidity and operating results. In addition, there may be an increase in competition from DISH and other third parties that DISH may enter into commercial agreements with, who are significantly larger and have greater resources and scale advantages as compared to us. Such increased competition may result in our loss of customers and other business relationships. 16 16 16 Table of Contents Table of Contents

View prior text (2023)

In connection with the closing of the Prepaid Transaction, we and DISH entered into certain commercial and transition services arrangements, including a Master Network Services Agreement (the “MNSA”) and a license purchase agreement (the “DISH License Purchase Agreement”). Pursuant to the MNSA, DISH will receive network services from the Company for a period of seven years. As set forth in the MNSA, the Company will provide DISH, among other things, (a) legacy network services for certain Boost Mobile prepaid end users on the Sprint network, (b) T-Mobile network services for certain end users that have been migrated to the T-Mobile network or provisioned on the T-Mobile network by or on behalf of DISH and (c) infrastructure mobile network operator services to assist in the access and integration of the DISH network. Pursuant to the DISH License Purchase Agreement, DISH has agreed to purchase all of Sprint’s 800 MHz spectrum (approximately 13.5 MHz of nationwide spectrum) for a total of approximately $3.6 billion in a transaction to be completed, subject to certain additional closing conditions, following an application for FCC approval to be filed three years following the closing of the Merger; provided, however, that if DISH breaches the DISH License Purchase agreement prior to the closing or fails to deliver the purchase price following the satisfaction or waiver of all closing conditions, DISH’s sole liability will be to pay us a fee of approximately $72 million. In such instance, T-Mobile is required, unless otherwise approved under the Consent Decree, to conduct an auction of all of Sprint’s 800 MHz spectrum under the terms set forth in the Consent Decree, but would not be required to divest such spectrum for an amount less than $3.6 billion. The parties are required to file an application for the transfer by April 1, 2023. The covered spectrum sale must occur within the later of three years after the closing of the Prepaid Transaction and five days after receipt of the approval from the FCC of the application. Failure to successfully manage these ongoing commercial and transition services arrangements entered into in connection with the Prepaid Transaction and liabilities arising in connection therewith may result in material unanticipated problems, including diversion of management time and energy, significant expenses and liabilities. There may also be other potential adverse consequences and unforeseen increased expenses, or liabilities associated with the Prepaid Transaction, the occurrence of which could materially impact our business, financial condition, liquidity, and operating results. In addition, there may be an increase in competition from DISH and other third parties that DISH may enter into commercial agreements with, who are significantly larger and with greater resources and scale advantages as compared to us. Such increased competition may result in our loss of customers and other business relationships.

🟡 Modified

We rely on highly skilled personnel throughout all levels of our business. Our business could be harmed if we are unable to retain or motivate key personnel, hire qualified personnel, or maintain our corporate culture.

high match confidence

Sentence-level differences:

  • Reworded sentence: "Our future success depends in substantial part on our ability to recruit, hire, motivate, develop, and retain talented personnel for all areas of our organization, including our CEO and members of our senior leadership team."

Current (2024):

Our future success depends in substantial part on our ability to recruit, hire, motivate, develop, and retain talented personnel for all areas of our organization, including our CEO and members of our senior leadership team. Both external factors, such as fluctuations in…

Read full text

Our future success depends in substantial part on our ability to recruit, hire, motivate, develop, and retain talented personnel for all areas of our organization, including our CEO and members of our senior leadership team. Both external factors, such as fluctuations in economic and industry conditions, changes in U.S. immigration policies, and the competitive landscape, and internal factors, such as employee tolerance for changes in our corporate culture, organizational changes, limited remote working opportunities, and our compensation programs, may impact our ability to effectively manage our workforce. Further, employee compensation and benefit costs may increase due to inflationary pressures, and if our compensation does not keep up with inflation or that of our competitors’, we may see increased employee dissatisfaction and departures or difficulty in recruiting new employees. If key employees depart or we are unable to recruit and integrate new employees successfully, our business could be negatively impacted.

View prior text (2023)

The market for highly skilled workers and leaders is extremely competitive. We believe our future success depends in substantial part on our ability to recruit, hire, motivate, develop, and retain talented personnel for all areas of our organization, including our CEO and the other members of our senior leadership team. Doing so may be difficult due to many factors, including fluctuations in economic and industry conditions, changes to U.S. immigration policy, competitors’ hiring and remote working policies and practices, employee intolerance for the significant changes within, and demands on, our Company and our industry, and the effectiveness of our compensation programs. If key employees depart or we are unable to recruit successfully, our business could be negatively impacted. Further, inflationary cost pressures may increase our costs, including employee compensation, and lead to increased employee attrition to the extent our compensation does not keep up with inflation, particularly if our competitors’ compensation does. In addition, certain members of our senior leadership team, including our CEO have term employment agreements with us. Our inability to extend the terms of these employment agreements or to replace these members of our senior leadership team at the end of their terms with qualified and capable successors could hinder our strategic planning and execution. In addition, the new hybrid work model introduced during the global COVID-19 pandemic (the “Pandemic”) required T-Mobile to change and evolve our company culture. As our culture continues to evolve, we may experience adverse impacts on our ability to attract, retain and motivate key personnel, as existing and prospective employees may experience uncertainty about their future roles with us. If key employees depart, our business could be negatively impacted. We may incur significant costs in identifying, hiring and replacing employees, and we may lose significant expertise and talent. As a result, we may not be able to meet our business plan, and our business, financial condition and operating results may be materially adversely affected.