Our business may be affected by litigation and government investigations.
We may from time to time receive inquiries and subpoenas and other types of information requests from government authorities and others and we may become subject to claims and other actions related to our business activities. While the ultimate outcome of investigations, inquiries, information requests and legal proceedings is difficult to predict, defense of litigation claims can be expensive, time-consuming, and distracting, and adverse resolutions or settlements of those matters may result in, among other things, modification of our business practices, costs and significant payments, any of which could have a material adverse effect on our business, financial condition, results of operations and prospects.
Security breaches, computer malware, computer hacking attacks and other security incidents could harm our business, reputation, brand and operating results.
Security incidents have become more prevalent across industries and may occur on our systems. Security incidents may be caused by, or result in but are not limited to, security breaches, computer malware or malicious software, computer hacking, unauthorized access to confidential information, denial of service attacks, security system control failures in our own systems or from vendors we use, email phishing, software vulnerabilities, social engineering, sabotage and drive-by downloads. Such security incidents, whether intentional or otherwise, may result from actions of hackers, criminals, nation states, vendors, employees or customers.
We rely on our internal technology systems for development, marketing, operational, support and sales activities. A disruption or failure of these systems or in those of our external service providers, in the event of a major storm, earthquake, fire, telecommunications failure, cyber-attack, terrorist attack or other catastrophic event could cause system interruptions, reputational harm, delays in our product development and loss of critical data and could materially and adversely affect our ability to operate our business.
We may experience disruptions, data loss, outages and other performance problems on our systems due to service attacks, unauthorized access or other security related incidents. Any security breach or loss of system control caused by hacking, which involves efforts to gain unauthorized access to information or systems, or to cause intentional malfunctions or loss, modification or corruption of data, software, hardware or other computer equipment and the inadvertent transmission of computer malware could harm our business.
In addition, our software stores and transmits customers’ confidential business information in our facilities and on our equipment, networks, corporate systems and in the cloud. Security incidents could expose us to litigation, remediation costs, increased costs for security measures, loss of revenue, damage to our reputation and potential liability. Our customer data and corporate systems and security measures may be compromised due to the actions of outside parties, employee error, malfeasance, capacity constraints, a combination of these or otherwise and, as a result, an unauthorized party may obtain access to our data or our customers’ data. Outside parties may attempt to fraudulently induce our employees to disclose sensitive information in order to gain access to our customers’ data or our information. We must continuously examine and modify our security controls and business policies to address new threats, the use of new devices and technologies, and these efforts may be costly or distracting.
Because the techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently or may be designed to remain dormant until a predetermined event and often are not recognized until launched against a target, we may be unable to anticipate these techniques or implement sufficient control measures to defend against these techniques. Though it is difficult to determine what harm may directly result from any specific incident or breach, any failure to maintain confidentiality, availability, integrity, performance and reliability of our systems and infrastructure may harm our reputation and our ability to retain existing customers and attract new customers. If an actual or perceived security incident occurs, the market perception of the effectiveness of our security controls could be harmed, our brand and reputation could be damaged, we could lose customers, and we could suffer financial exposure due to such events or in connection with remediation efforts, investigation costs, regulatory fines and changed security control, system architecture and system protection measures.