complex and changing foreign regulatory, tax, accounting and legal requirements and reduced protection of intellectual property rights in some foreign countries.
Our estimates of market opportunity and forecasts of market growth may prove to be inaccurate, and even if the markets in which we compete achieve the forecasted growth, our business may not grow at similar rates, or at all.
Our market opportunity estimates and growth forecasts are subject to significant uncertainty and are based on assumptions and estimates which may not prove to be accurate. Our estimates and forecasts relating to size and expected growth of our target market may prove to be inaccurate. Even if the markets in which we compete meet our size estimates and growth forecasts, our business may not grow at similar rates, or at all. Our growth is subject to many factors, including our success in implementing our business strategy, which is subject to many risks and uncertainties.
Our revenue will be dependent, in part, upon the size of the markets in the territories for which we gain regulatory approval, the accepted price for the product, the ability to obtain coverage and reimbursement and whether we own the commercial rights for that territory. If the number of our addressable patients is not as significant as we estimate, the indication approved by regulatory authorities is narrower than we expect or the treatment population is narrowed by competition, physician choice or treatment guidelines, we may not generate significant revenue from sales of such products, even if approved.
Our employees, independent contractors, consultants, commercial collaborators, principal investigators, CROs, CMOs, suppliers and vendors may engage in misconduct or other improper activities, including noncompliance with regulatory standards and requirements.
We are exposed to the risk that our employees, independent contractors, consultants, commercial collaborators, principal investigators, CROs, CMOs, suppliers and vendors acting for or on our behalf may engage in misconduct or other improper activities. We have adopted a code of conduct and ethics, but it is not always possible to identify and deter misconduct by these parties and the precautions we take to detect and prevent this activity may not be effective in controlling unknown or unmanaged risks or losses or in protecting us from governmental investigations or other actions or lawsuits stemming from a failure to comply with these laws or regulations.
Our internal information technology systems, or those of any of our CROs, manufacturers, other contractors or consultants, third party service providers, or potential future collaborators, may fail or suffer security or data privacy breaches or other unauthorized or improper access to, use of, or destruction of our proprietary or confidential data, employee data or personal data, which could result in additional costs, loss of revenue, significant liabilities, harm to our brand and material disruption of our operations.
In the ordinary course of our business, we and the third parties upon which we rely collect, receive, store, process, generate, use, transfer, disclose, make accessible, protect, secure, dispose of, transmit, and share (collectively, process) proprietary, confidential, and sensitive data, including personal data, intellectual property, trade secrets, and other sensitive data (collectively, sensitive information).
Despite the implementation of security measures in an effort to protect systems that store our information, given their size and complexity and the increasing amounts of information maintained on our internal information technology systems and those of our third-party CROs, other contractors (including sites performing our clinical trials), third party service providers and supply chain companies, and consultants, these systems are potentially vulnerable to breakdown or other damage or interruption from service interruptions, system malfunction, natural disasters, terrorism, war and telecommunication and electrical failures, as well as security breaches from inadvertent or intentional actions by our employees, contractors, consultants, business partners and/or other third parties, or from cyber-attacks by malicious third parties, which may compromise our system infrastructure or lead to the loss, destruction, alteration or dissemination of, or damage to, our data.
42