Events or developments related to these and other risks associated with international operations could have a material negative effect on our business and results of operations.
Risks Related to Cybersecurity and Intellectual Property
We Face Continually Evolving Cybersecurity and Similar Risks, Which Could Result in Loss, Disclosure, Theft, Destruction or Misappropriation of, or Access to, Our Confidential Information and Cause Disruption of Our Business, Damage to Our Brands and Reputation, Legal Exposure and Financial Losses.
Through our operations, we collect and store, including by electronic means, certain personal, proprietary and other sensitive information, including payment card information, that is provided to us through purchases, registration on our websites, mobile applications, or otherwise in communication or interaction with us. These activities require the use of online services and centralized data storage, including through third-party service providers. Data maintained in electronic form is subject to the risk of security incidents, including breach, compromise, intrusion, tampering, theft, destruction, misappropriation or other malicious activity. Our ability to safeguard such personal and other sensitive information, including information regarding the Company and our customers, sponsors, partners, Distributors, advertisers and employees, independent contractors and vendors, is important to our business. We take these matters seriously and take significant steps to protect our stored information, including the implementation of systems and processes to thwart malicious activity. These protections are costly and require ongoing monitoring and updating as technologies change and efforts to overcome security measures become more sophisticated. See “—Economic and Operational Risks—We Are Subject to Extensive Governmental Regulation and Changes in These Regulations and Our Failure to Comply with Them May Have a Material Negative Effect on Our Business and Results of Operations.”
Despite our efforts, the risks of a security incident cannot be entirely eliminated and our information technology and other systems that maintain and transmit consumer, sponsor, partner, Distributor, advertiser, Company, employee and other confidential and proprietary information may be compromised due to employee error or other circumstances such as malware or ransomware, viruses, hacking and phishing attacks, denial-of-service attacks, business email compromises, or otherwise. A compromise of our or our vendors’ systems could affect the security of information on our network or that of a third-party service provider. Additionally, outside parties may attempt to fraudulently induce employees, vendors or users to disclose sensitive, proprietary or confidential information in order to gain access to data and systems. As a result, our or our customers’ or affiliates’ sensitive, proprietary and/or confidential information may be lost, disclosed, accessed or taken without consent.
We also continue to review and enhance our security measures in light of the constantly evolving techniques used to gain unauthorized access to networks, data, software and systems. We may be required to incur significant expenses in order to address any actual or potential security incidents that arise and we may not have insurance coverage for any or all of such expenses. If we experience an actual or perceived security incident, our ability to conduct business may be interrupted or impaired, we may incur damage to our systems, we may lose profitable opportunities or the value of those opportunities may be diminished and we may lose revenue as a result of unlicensed use of our intellectual property. Unauthorized access to or security breaches of our systems could result in the loss of data, loss of business, severe reputational damage adversely affecting customer or investor confidence, diversion of management’s attention, regulatory investigations and orders, litigation, indemnity obligations, damages for contract breach, penalties for violation of applicable laws or regulations and significant costs for remediation that may include liability for stolen or lost assets or information and repair of system damage that may have been caused, incentives offered to customers or other business partners in an effort to maintain business relationships after a breach and other liabilities. In addition, in the event of a security incident, changes in
29