If our security measures are compromised, or the security, confidentiality, integrity, or availability of our information technology, software, services, communications or data is compromised, limited or fails, this could result in a material adverse impact.
If we or third parties related to us (such as our partners, CROs, and CMOs) have experienced or in the future experience any security incidents that result in any deletion or destruction of, unauthorized access to, loss of, unauthorized acquisition or disclosure of, or inadvertent exposure disclosure of, sensitive, confidential, or proprietary information (“Sensitive Information”), or a compromise related to the security, confidentiality, integrity or availability of our (or their) information technology, software, services, communications, or data, it may result in a material adverse impact, including without limitation, regulatory investigations or enforcement actions, litigation, indemnity obligations, delays to the development and commercialization of our product candidates, disruption of our programs, negative publicity, and financial loss.
Systems containing Sensitive Information are vulnerable to service interruptions, malfunction, natural disasters, terrorism, war, software and hardware failures, telecommunication and electrical failures, theft or loss from inadvertent or intentional actions by employees, contractors, consultants, business partners and/or other third parties, malware, malicious code (such as viruses and worms), software bugs, ransomware, denial-of-service attacks (including credential stuffing), social engineering and other means that affect service reliability and threaten the security, confidentiality, integrity and availability of information).
We cannot assure you that our security efforts and our investment in information technology, or the efforts or investments of CROs, consultants or other third parties related to us, will prevent breakdowns or breaches in systems or other cyber incidents that cause loss, destruction, unavailability, alteration or dissemination of, or damage to, Sensitive Information that could have a material adverse impact. For example, if such an event were to occur and cause interruptions in our operations, it could result in a material disruption of our programs and the development of our product candidates could be delayed. In addition, the loss of clinical trial data for our product candidates could result in delays in our marketing approval efforts and significantly increase our costs to recover or reproduce the data. Furthermore, significant disruptions of our internal information technology systems or security breaches could result in the loss, misappropriation and/or unauthorized access, use or disclosure of, or the prevention of access to, data (including trade secrets or other confidential information, intellectual property, proprietary business information and personal information), which could result in a material adverse impact including financial, legal, business and reputational harm. For example, any such event that leads to unauthorized access, use, or disclosure of personal information, including personal information regarding our clinical trial subjects or employees, could harm our reputation directly, compel us to comply with federal and/or state breach notification laws and foreign law equivalents, subject us to mandatory corrective action, and otherwise subject us to liability under privacy, data protection, and information security laws and regulations, which could result in significant legal and financial exposure and reputational damages that could potentially have a material adverse impact.
Notifications and follow-up actions related to a security incident could impact our reputation and cause us to incur significant costs, including legal expenses and remediation costs. For example, the loss of clinical trial data from completed or future clinical trials could result in delays in our regulatory approval efforts and significantly increase our costs to recover or reproduce the lost data. We expect to incur significant costs in an effort to detect and prevent security incidents, and we may face increased costs and requirements to expend substantial resources in the event of an actual or perceived security breach. We also rely on third parties to manufacture our product candidates, and similar events relating to their computer systems could also have a material adverse impact. To the extent that any disruption or security incident were to result in a loss, destruction or alteration of, or damage to, our data, or inappropriate disclosure of confidential or proprietary information, we could be exposed to litigation and governmental investigations, the further development and commercialization of our product candidates could be delayed, and we could be subject to significant fines or
80