high match confidence
Sentence-level differences:
- Reworded sentence: "We rely on information technology networks and systems and other operational technologies, including the internet and a number of internally-developed systems and applications, as well as certain technology systems from third-party vendors (collectively referred to as "IT") to operate our business."
- Reworded sentence: "IT and other systems (ours, as well as those of our franchisees, acquired businesses, and third-party service providers) have been and will continue in the future to be susceptible to damage, disruptions and shutdowns due to programming errors, defects or other vulnerabilities, power outages, hardware failures, misconfigurations, computer viruses, cyber-attacks, encryption caused by ransomware or malware attacks, exfiltration of data, attacks by foreign governments, state-sponsored actors, or criminal groups, theft, misconduct by employees or other insiders, telecommunications failures, misuse, human errors or other catastrophic events."
- Reworded sentence: "We utilize and interact with the IT networks and systems of third parties for many aspects of our business, including related to our customers, franchisees and service providers such as cloud service providers and third-party delivery services."
- Removed sentence: "The occurrence of any of the events described above could result in material disruptions in our business, the loss of existing or potential customers, damage to our brand and reputation, additional regulatory scrutiny, litigation and other potential material liability."
- Removed sentence: "Similarly, an actual or alleged failure to comply with increasingly challenging U.S."
Current (2024):
We rely on information technology networks and systems and other operational technologies, including the internet and a number of internally-developed systems and applications, as well as certain technology systems from third-party vendors (collectively referred to as "IT") to…
Read full text
We rely on information technology networks and systems and other operational technologies, including the internet and a number of internally-developed systems and applications, as well as certain technology systems from third-party vendors (collectively referred to as "IT") to operate our business. For example, we rely on these technologies to receive package level information in advance of the physical receipt of packages, to move and track packages through our operations, to efficiently plan deliveries, to execute billing processes, and to track and report financial and operational data. Our franchise locations and subsidiaries also rely on IT systems to manage their business processes and activities. IT and other systems (ours, as well as those of our franchisees, acquired businesses, and third-party service providers) have been and will continue in the future to be susceptible to damage, disruptions and shutdowns due to programming errors, defects or other vulnerabilities, power outages, hardware failures, misconfigurations, computer viruses, cyber-attacks, encryption caused by ransomware or malware attacks, exfiltration of data, attacks by foreign governments, state-sponsored actors, or criminal groups, theft, misconduct by employees or other insiders, telecommunications failures, misuse, human errors or other catastrophic events. In recent periods, the frequency and sophistication of cyber-attacks have increased and are expected to continue to increase, including as a result of state-sponsored cybersecurity attacks during periods of geopolitical conflict, such as the ongoing conflicts in Ukraine and the Middle East. In addition, the rapid evolution and increased adoption of artificial intelligence technologies may intensify our cybersecurity risks. Accordingly, we may be unable to anticipate these techniques or to implement adequate measures to recognize, detect or prevent the occurrence of any of the events described 11 11 11 above. In addition, our security processes, protocols and standards may not prove to be sufficient, effective or may not be complied with, either intentionally or inadvertently. To date, we have not experienced a material cybersecurity incident. However, cybersecurity incidents have in the past and may in the future expose us, our customers, franchisees, service providers or others, to loss, disclosure or misuse of proprietary information and sensitive or confidential data or result in disruptions to our operations or those of our customers, franchisees, service providers or others. For example, cyber criminals have in the past gained access, and are expected to continue to try to gain access to customer accounts. The type of activity includes fraudulently diverting and misappropriating items being transported in our network, fraudulently charging shipment fees to customer or franchisee accounts, and fraudulently sending text messages to recipients purporting to be from UPS. The occurrence of any of the events described above could result in material disruptions in our business, the loss of existing or potential customers, damage to our brand and reputation, additional regulatory scrutiny, litigation and other potential material liability. We also may not discover the occurrence of any of the events described above for a significant period of time after the event occurs. We utilize and interact with the IT networks and systems of third parties for many aspects of our business, including related to our customers, franchisees and service providers such as cloud service providers and third-party delivery services. These third parties have access to information we maintain about our company, operations, customers, employees and vendors, or operating systems that are critical to or can significantly impact our business operations. These third parties are subject to risks described above, and other risks, that could damage, disrupt or close down their networks or systems. Security processes, protocols and standards that we implement and contractual provisions requiring security measures that we impose on such third parties may not be sufficient or effective at preventing such events or may not be adhered to. These events have in the past and could in the future result in unauthorized access to, or disruptions or denials of access to, misuse or disclosure of, information or systems that are important to us, including proprietary information, sensitive or confidential data, and other information about our operations, customers, employees and suppliers, including personal information. We have invested and expect to continue to invest in IT security initiatives, IT risk management and disaster recovery capabilities. The costs and operational consequences of implementing, maintaining and enhancing further data or system protection measures could increase significantly to overcome increasingly frequent, complex and sophisticated cyber threats and regulatory requirements. In addition, our customers’ confidence in our ability to protect data and systems and to provide services consistent with their expectations could be impacted, further disrupting our operations. While we maintain cyber insurance, we cannot be certain that our coverage will be adequate for liabilities actually incurred, that insurance will continue to be available to us on economically reasonable terms, or at all, or that any insurer will not deny coverage as to any future claim. Although to date we are unaware of any material data breach or cybersecurity incident, including an information system disruption, we cannot provide any assurances that such material events and impacts will not occur in the future. Our efforts to deter, identify, mitigate and/or eliminate future breaches or cybersecurity incidents may require significant additional effort and expense and may not be successful. In addition, there has recently been heightened regulatory and enforcement focus relating to the collection, use, retention, transfer, and processing of personal data in the U.S. (at both the state and federal level) and internationally, including the EU’s General Data Protection Regulation, the California Privacy Rights Act, the Virginia Consumer Data Protection Act, and other similar laws that have been or are expected to be enacted by other jurisdictions. In addition, China and certain other jurisdictions have enacted more stringent data localization requirements. An actual or alleged failure to comply with applicable data protection laws, regulations, or other data protection standards has in the past and may in the future expose us to litigation, fines, sanctions, or other penalties, which could harm our reputation and adversely affect our business, results of operations, and financial condition. The regulatory environment is increasingly challenging, based on discretionary factors, and difficult to predict. Consequently, compliance with applicable regulations in the various jurisdictions in which we do business may present material obligations and risks to our business, including significantly expanded compliance burdens, costs, and enforcement risks which are expected to increase over time; require us to make extensive system or operational changes; or adversely affect the cost or attractiveness of the services we offer. 12 12 12
View prior text (2023)
We rely on information technology ("IT") networks and systems, including the internet and a number of internally-developed systems and applications, as well as certain technology systems from third-party vendors, to operate our business. For example, we rely on IT to receive package level information in advance of the physical receipt of packages, to move and track packages through our operations, to efficiently plan deliveries, to execute billing processes, and to track and report financial and operational data. Our franchise locations and subsidiaries also rely on IT systems to manage their business processes and activities. In addition, our services, and the operation of our networks and systems involve the collection, storage and transmission of significant amounts of proprietary information and sensitive or confidential data, including personal information of customers, employees and others. We regularly move data across national borders, and are subject to a variety of evolving laws and regulations in the U.S. and abroad regarding privacy, data protection and data security. The scope of these laws is often uncertain and may be conflicting, particularly with respect to foreign laws. For example, the E.U.'s General Data Protection Regulation greatly increases the jurisdictional reach of, and potential penalties under, E.U. law, and adds a broad array of requirements for handling personal data, including the public disclosure of significant data breaches. In addition, China and other countries have also enacted or proposed stringent data localization laws which could significantly increase our costs, require us to make extensive system or operational changes, or adversely affect the value of our services. IT systems (ours, as well as those of our franchisees, acquired businesses, and third-party service providers) are susceptible to damage, disruptions and shutdowns due to programming errors, defects or other vulnerabilities, power outages, hardware failures, computer viruses, cyber-attacks, ransomware or malware attacks, attacks by foreign governments and state-sponsored actors, theft, misconduct by employees or other insiders, telecommunications failures, misuse, human errors or other catastrophic events. These events, which have become more frequent and sophisticated, could, from time to time, cause material service outages, allow inappropriate or block legitimate access to systems or information, or result in other material interruptions in our business. In addition, the occurrence of any of these events could expose us, our customers, franchisees, service providers or others, to a risk of loss, disclosure or misuse of proprietary information and sensitive or confidential data, including personally identifiable information. 11 11 11 The techniques used to obtain unauthorized access, disable or degrade service or sabotage systems change frequently. In recent periods, the frequency and sophistication of cyber-attacks has increased, including as a result of state-sponsored cybersecurity attacks during periods of geopolitical conflict, such as the ongoing conflict in Ukraine. Accordingly, we may be unable to anticipate these techniques or to implement adequate measures to recognize, detect or prevent the occurrence of any of the events described above. We also may not discover the occurrence of any of the events described above for a significant period of time after the event occurs. Hybrid and remote working arrangements may heighten these risks. We also depend on and interact with the IT networks and systems of third-parties for many aspects of our operations, including our customers, franchisees and service providers such as cloud service providers and third-party delivery services. These third parties may have access to information we maintain about our company, operations, customers, employees and vendors, or operating systems that are critical to or can significantly impact our business operations. These third parties are subject to risks resulting from data breaches, cyberattacks, IT systems disruptions, and other events or actions described above that could damage, disrupt or close down their networks or systems. Security processes, protocols and standards that we implement and contractual provisions requiring security measures that we impose on such third-parties may not be sufficient or effective at preventing such events. Any of these events could result in unauthorized access to, or disruptions or denials of access to, misuse or disclosure of, information or systems that are important to us, including proprietary information, sensitive or confidential data, and other information about our operations, customers, employees and suppliers, including personal information. We have invested and expect to continue to invest in IT security initiatives, IT risk management and disaster recovery plans. The costs and operational consequences of implementing, maintaining and enhancing further data or system protection measures could increase significantly to overcome increasingly frequent, complex and sophisticated cyber threats and regulatory requirements. The occurrence of any of the events described above could result in material disruptions in our business, the loss of existing or potential customers, damage to our brand and reputation, additional regulatory scrutiny, litigation and other potential material liability. In addition, our customers’ confidence in our ability to protect data and systems and to provide services consistent with their expectations could be impacted, further disrupting our operations. Similarly, an actual or alleged failure to comply with increasingly challenging U.S. and foreign data protection regulations or other data protection standards may expose us to litigation, fines, sanctions or other penalties. While we maintain cyber insurance, we cannot be certain that our coverage will be adequate for liabilities actually incurred, that insurance will continue to be available to us on economically reasonable terms, or at all, or that any insurer will not deny coverage as to any future claim. Although to date we are unaware of any material data breach or system disruption, including a cyber-attack, we cannot provide any assurances that such events and impacts will not occur and be material in the future. Our efforts to deter, identify, mitigate and/or eliminate future breaches may require significant additional effort and expense and may not be successful.