high match confidence
Sentence-level differences:
- Reworded sentence: "Like most retailers, we process in our information systems personal information and/or payment information about our customers and members, and we also process information concerning our associates and vendors."
- Reworded sentence: "We utilize third-party service providers for a variety of reasons, including, without limitation, for digital storage technology, compute capacity, content delivery to customers and members, back-office support and other functions."
- Reworded sentence: "Cyber threats are rapidly evolving and those threats and the means for disrupting or obtaining access to information systems or information stored in digital and other storage media are becoming increasingly sophisticated and frequent, and in some cases, they may lead to successful attacks."
- Reworded sentence: "Our compliance programs, information technology and enterprise risk management efforts cannot eliminate all systemic risk."
- Reworded sentence: "Security-related events could be widely publicized and could materially adversely affect our reputation with our customers, members, associates, vendors and shareholders, could harm our competitive position particularly with respect to our eCommerce operations, and could result in a material reduction in our net sales in our eCommerce operations, as well as in our stores thereby materially adversely affecting our operations, net sales, growth rates, operating income, results of operations, financial position, cash flows and liquidity."
Current (2024):
Like most retailers, we process in our information systems personal information and/or payment information about our customers and members, and we also process information concerning our associates and vendors. In addition, our health and wellness business operations, the…
Read full text
Like most retailers, we process in our information systems personal information and/or payment information about our customers and members, and we also process information concerning our associates and vendors. In addition, our health and wellness business operations, the Walmart Health locations, and third-party service providers who handle information on our behalf, store and maintain personal health information. Some of this information is stored digitally in connection with the digital platforms and technologies that we use to conduct and facilitate our various businesses. We utilize third-party service providers for a variety of reasons, including, without limitation, for digital storage technology, compute capacity, content delivery to customers and members, back-office support and other functions. Such providers may have access to information we hold about our customers, members, associates, business partners or vendors. In addition, our eCommerce operations depend upon the secure transmission of confidential information over public networks, including information permitting cashless payments. Cyber threats are rapidly evolving and those threats and the means for disrupting or obtaining access to information systems or information stored in digital and other storage media are becoming increasingly sophisticated and frequent, and in some cases, they may lead to successful attacks. Unauthorized activities directed against information systems and devices, whether our own or those of our third-party service providers and vendors, have resulted in cybersecurity incidents, including malware, ransomware, denial of service attacks or phishing incidents. We expect that our information systems and those of our third-party service providers, vendors and suppliers will continue to experience such attempted attacks in the future, which could include disruptions to our supply chain system. Cyberattacks and threat actors can be sponsored by particular nation-states, or be the work of sophisticated criminal organizations, insiders (including our associates or contractors) or third parties, each with a wide-range of motives and expertise. We and the businesses with which we interact have experienced and continue to experience incidents and threats to data and information systems. These incidents and threats have included and are likely to continue to include both random and targeted cyberattacks, computer viruses, phishing incidents, worms, bot attacks, ransomware or other destructive or disruptive software and attempts to misappropriate customer information, including credit card and payment information, and cause system failures and disruptions. The increased use of remote work infrastructure in recent years has also increased the possible attack surfaces to be exploited. Our logging capabilities, or the logging capabilities of third parties, are also not always complete or sufficiently detailed, affecting our ability to fully investigate and understand the scope of security events. As noted above, some of our information systems and those of our third-party service providers have experienced cybersecurity incidents or breaches and, although to date they have not had a material adverse effect on our operating results, there can be no assurance of a similar result in the future. Our digital platforms, which are increasingly important to our business and continue to grow in complexity and scope, and the systems on which they run, including those applications and systems used in legacy operations and acquired eCommerce, technology or other businesses, are regularly subject to cyberattacks. Those attacks involve attempts to impede the operations of our system or gain unauthorized access to our eCommerce websites (including marketplace platforms) or mobile commerce applications to obtain and misuse customers' or members' information including personal information and/or payment information and related risks discussed in this Item 1A. Such attacks, if successful, may result in potential data misuse and/or loss and may create denials of service or otherwise disable, degrade or sabotage the information systems that enable or support one or more of our digital platforms or otherwise significantly disrupt our customers' and members' shopping experience, our supply chain integrity and continuity and our ability to efficiently operate our business. If we are unable to maintain the security of the information systems that enable or support our digital platforms and keep them operating within acceptable parameters, we could suffer loss of sales, reductions in transactions, reputational damage and deterioration of our competitive 20 20 20 position and incur liability for any damage to customers, members or others whose personal or confidential information is unlawfully obtained and misused, any of which events could have a material adverse impact on our business and results of operations and impede the execution of our strategy for the growth of our business. Associate error or malfeasance, faulty password management, social engineering or other vulnerabilities and irregularities may also result in a defeat of our security measures or those of our third-party service providers and a compromise or breach of our or their information systems. Moreover, the hardware, software or applications that comprise our information system and networked environment may have vulnerabilities or defects of design, coding, manufacture or operations that could be intentionally exploited or inadvertently used in a manner that could compromise information security. Given the age, size and complexity of these information systems and our networked environment, patches for certain vulnerabilities may not exist and, even where patches or other risk-mitigating activities are available, the deployment of patches or execution of risk-mitigating actions may not occur before an underlying vulnerability is exploited by threat actors or inadvertently results in the compromise of our information systems or data. Any compromise of our information systems or of those of businesses with which we interact, which results in regulated data or confidential information being accessed, obtained, damaged, disclosed, destroyed, modified, lost or used by unauthorized persons could harm our reputation and expose us to regulatory actions (including, with respect to health information, liability under the Health Insurance Portability and Accountability Act of 1996, or "HIPAA"), customer attrition, remediation expenses and claims from customers, members, associates, vendors, financial institutions, payment card networks and other persons, any of which could materially and adversely affect our business operations, financial position and results of operations. Because the techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems or data change frequently and may not immediately produce signs of a compromise, we may be unable to anticipate these techniques or to implement adequate preventative measures, or detect the activities of a threat actor. Even if we detect a cybersecurity incident, the nature and extent of that cybersecurity incident may not be immediately clear. Based on the sophistication of the threat actors and the size and complexity of our information systems and networked environment, among other factors, an investigation into a cybersecurity incident could take a significant amount of time to complete. We may not understand or appreciate that what is detected and treated as multiple individual cybersecurity incidents or events may be associated with the coordinated actions of a single threat actor. In addition, while our investigation of a cybersecurity incident is ongoing, we may not know the full extent of the harm caused by a threat actor, and such harm may spread both internally and to certain customers, vendors, or other third parties. These factors may inhibit our ability to provide rapid, complete and reliable information about the cybersecurity incident to customers, counterparties and regulators, as well as the public. It may also not be clear how best to contain and remediate any harm caused by the cybersecurity incident, and certain errors or actions could be repeated or compounded before they are discovered and remediated. Any or all of these factors could further increase the costs and consequences of a cybersecurity incident on our business operations, financial position and results of operations. To the extent that any cyberattack, ransomware or incursion in our or one of our third-party service provider's information systems results in the loss, damage, misappropriation or other compromise of information, we may be materially adversely affected by claims from customers, members, financial institutions, regulatory authorities, payment card networks and others. Our compliance programs, information technology and enterprise risk management efforts cannot eliminate all systemic risk. Disruptions in our systems caused by associate error or malfeasance, security incidents, breaches or cyberattacks – including attacks on those parties we do business with (such as strategic partners, suppliers, banks or utility companies) – could harm our ability to conduct our operations, which may have a material effect on us, may result in losses that could have a material adverse effect on our financial position or results of operations, or may have a cascading effect that adversely impacts our partners, third-party service providers, customers, members, financial services firms and other third parties that we interact with on a regular basis. Our reputation with our customers and members is important to the success of our enterprise strategy, which combines traditional retail, membership models, marketplaces, financial services, healthcare, and other customer and business services into a series of interconnected assets to make it seamless for customers to interact with us. Security-related events could be widely publicized and could materially adversely affect our reputation with our customers, members, associates, vendors and shareholders, could harm our competitive position particularly with respect to our eCommerce operations, and could result in a material reduction in our net sales in our eCommerce operations, as well as in our stores thereby materially adversely affecting our operations, net sales, growth rates, operating income, results of operations, financial position, cash flows and liquidity. Such events could also result in the release to the public of confidential information about our operations and financial position and performance and could result in litigation or other legal actions against us or the imposition of penalties, fines, fees or liabilities, which may not be covered by our insurance policies. Moreover, a security compromise or operationally impactful malware event, such as ransomware, could require us to devote significant management resources to address the problems created by the issue and to expend significant additional resources to upgrade further the security measures we employ to guard personal and confidential information against cyberattacks and other attempts to access or otherwise compromise such information and could result in a disruption of our operations, particularly our digital operations. 21 21 21 We accept payments using a variety of methods, including cash, checks, credit and debit cards, electronic benefits transfer (EBT) cards, mobile payments and our private label credit cards and gift cards, and we may offer new payment options over time, which may have information security risk implications. As a retailer accepting debit and credit cards for payment, we are subject to various industry data protection standards and protocols, such as payment network security operating guidelines and the Payment Card Industry Data Security Standard. We cannot be certain that the security measures we or our third-party suppliers maintain are able to detect, prevent or contain cyberattacks, cyberterrorism, security incidents, breaches or other compromises from malware, ransomware or other threats that are known or may be developed in the future. In certain circumstances, our contracts with payment card processors and payment card networks (such as Visa, Mastercard, American Express and Discover) generally require us to adhere to payment card network rules which could make us liable to payment card issuers and others if information in connection with payment cards and payment card transactions that we process is compromised, which liabilities could be substantial. Additionally, through various financial service partners and our ONE fintech venture, we offer various services such as money transfers, digital payment platforms, bill payment, money orders, check cashing, prepaid access, co-branded credits cards, installment lending and earned wage access. These products and services require us to comply with legal and regulatory requirements, including those related to privacy, information security, anti-money laundering and sanctions regimes and consumer protection, under both U.S. state and federal laws and regulations, as well as those of certain other countries. Failure to comply with these laws and regulations could result in fines, sanctions, penalties and harm to our reputation. We also have compliance obligations associated with privacy laws enacted to protect and regulate the collection, use, retention, disclosure and transfer of personal information, which include liability for security and privacy breaches. Among other obligations, breaches may trigger obligations under U.S. federal and state laws and those in certain other countries to notify affected individuals, government agencies and the media. Consequently, cybersecurity incidents that result in a data breach could subject us to fines, sanctions and other legal liability and harm our reputation.
View prior text (2023)
Like most retailers, we receive and store in our information systems personal information and/or payment information about our customers and members, and we also receive and store information concerning our associates and vendors. In addition, our health and wellness business operations, the Walmart Health locations, and third-party service providers who handle information on our behalf, store and maintain personal health information. Some of this information is stored digitally in connection with the digital platforms and technologies that we use to conduct and facilitate our various businesses. We utilize third-party service providers for a variety of reasons, including, without limitation, for digital storage technology, content delivery to customers and members, back-office support, and other functions. Such providers may have access to information we hold about our customers, members, associates, business partners or vendors. In addition, our eCommerce operations depend upon the secure transmission of confidential information over public networks, including information permitting cashless payments. Cyber threats are rapidly evolving and those threats and the means for obtaining access to information in digital and other storage media are becoming increasingly sophisticated and frequent. Attacks against information systems and devices, whether our own or those of our third-party service providers, create risk of cybersecurity incidents, including ransomware, malware, or phishing incidents. We expect to continue to experience such attempted attacks in the future. Cyberattacks and threat actors can be sponsored by particular countries or sophisticated criminal organizations or be the work of hackers with a wide range of motives and expertise. We and the businesses with which we interact have experienced and continue to experience threats to data and systems, including by perpetrators of random or targeted malicious cyberattacks, computer viruses, phishing incidents, worms, bot attacks, ransomware or other destructive or disruptive software and attempts to misappropriate customer information, including credit card and payment information, and cause system failures and disruptions. Mitigation and remediation recommendations continue to evolve, and addressing vulnerabilities is a priority for us. The increased use of remote work infrastructure in recent years has also increased the possible attack surfaces. Some of our systems and third-party service providers' systems have experienced security incidents or breaches and although they have not had a material adverse effect on our operating results, there can be no assurance of a similar result in the future. Associate error or malfeasance, faulty password management, social engineering or other vulnerabilities and irregularities may also result in a defeat of our or our third-party service providers' security measures and a compromise or breach of our or their information systems. Moreover, hardware, software or applications we use may have inherent vulnerabilities or defects of design, manufacture or operations or could be inadvertently or intentionally implemented or used in a manner that could compromise information security. Any compromise of our data security systems or of those of businesses with which we interact, which results in confidential information being accessed, obtained, damaged, disclosed, destroyed, modified, lost or used by unauthorized persons could harm our reputation and expose us to regulatory actions (including, with respect to health information, liability under the Health Insurance Portability and Accountability Act of 1996, or "HIPAA"), customer attrition, remediation expenses, and claims from customers, members, associates, vendors, financial institutions, payment card networks and other persons, any of which could materially and adversely affect our business operations, financial position and results of operations. Because the techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently and may not immediately produce signs of a compromise, we may be unable to anticipate these techniques or to implement adequate preventative measures and we or our third-party service providers may not discover any security event, breach, vulnerability or compromise of information for a significant period of time after the security incident occurs. To the extent that any cyberattack, ransomware or incursion in our or one of our third-party service provider's information systems results in the loss, damage, misappropriation or other compromise of information, we may be materially adversely affected by claims from customers, members, financial institutions, regulatory authorities, payment card networks and others. Our compliance programs, information technology, and enterprise risk management efforts cannot eliminate all systemic risk. Disruptions in our systems caused by security incidents, breaches or cyberattacks – including attacks on those parties we do business with (such as strategic partners, suppliers, banks, or utility companies) – could harm our ability to conduct our operations, which may have a material effect on us, may result in losses that could have a material adverse effect on our financial position or results of operations, or may have a cascading effect that adversely impacts our partners, third-party service providers, customers, members, financial services firms, and other third parties that we interact with on a regular basis. Our reputation with our customers and members is important to the success of our enterprise strategy, which combines traditional retail, membership models, marketplaces, financial services, healthcare, and other customer and business services into a series of interconnected assets to make it seamless for customers to interact with us. Security-related events could be widely publicized and could materially adversely affect our reputation with our customers, members, associates, vendors and shareholders, could harm our competitive position particularly with respect to our eCommerce operations, and could result in a material reduction in our net sales in our eCommerce operations, as well as in our stores thereby materially adversely affecting 20 20 20 our operations, net sales, results of operations, financial position, cash flows and liquidity. Such events could also result in the release to the public of confidential information about our operations and financial position and performance and could result in litigation or other legal actions against us or the imposition of penalties, fines, fees or liabilities, which may not be covered by our insurance policies. Moreover, a security compromise or ransomware event could require us to devote significant management resources to address the problems created by the issue and to expend significant additional resources to upgrade further the security measures we employ to guard personal and confidential information against cyberattacks and other attempts to access or otherwise compromise such information and could result in a disruption of our operations, particularly our digital operations. We accept payments using a variety of methods, including cash, checks, credit and debit cards, electronic benefits transfer (EBT) cards, mobile payments, and our private label credit cards and gift cards, and we may offer new payment options over time, which may have information security risk implications. As a retailer accepting debit and credit cards for payment, we are subject to various industry data protection standards and protocols, such as payment network security operating guidelines and the Payment Card Industry Data Security Standard. We cannot be certain that the security measures we maintain to protect all of our information technology systems are able to prevent, contain or detect cyberattacks, cyberterrorism, security incidents, breaches, or other compromises from known malware or ransomware or other threats that may be developed in the future. In certain circumstances, our contracts with payment card processors and payment card networks (such as Visa, Mastercard, American Express and Discover) generally require us to adhere to payment card network rules which could make us liable to payment card issuers and others if information in connection with payment cards and payment card transactions that we process is compromised, which liabilities could be substantial. Additionally, through various financial service partners and our ONE fintech joint venture, we offer various services such as money transfers, digital payment platforms, bill payment, money orders, check cashing, prepaid access, co-branded credits cards, installment lending, and earned wage access. These products and services require us to comply with legal and regulatory requirements, including privacy, authentication and tokenization, global anti-money laundering and sanctions laws and regulations as well as international, federal and state consumer financial laws and regulations. Failure to comply with these laws and regulations could result in fines, sanctions, penalties and harm to our reputation. The Company also has compliance obligations associated with privacy laws enacted to protect and regulate the collection, use, retention, disclosure and transfer of personal information, which include liability for security and privacy breaches. Among other obligations, breaches may trigger obligations under international, federal and state laws to notify affected individuals, government agencies and the media. Consequently, cybersecurity attacks that cause a data breach could subject us to fines, sanctions and other legal liability and harm our reputation.