We also may enter into a variety of other business arrangements, including strategic collaborations, joint ventures, restructurings, divestitures, business combinations and investments. Any future transactions could increase our near and long-term expenditures, result in potentially dilutive issuances of our equity securities, including our common stock, or the incurrence of debt, contingent liabilities, amortization expenses or acquired in-process research and development expenses, any of which could affect our business, financial condition, liquidity and results of operations.
Future acquisitions may require us to obtain additional financing, which may not be available on favorable terms or at all. These transactions may never be successful and may require significant time and attention of our management. In addition, the integration of any business or assets may be disruptive, complex, risky and costly and we may never realize the full benefits of the acquisition.
Recent and future changes to tax laws could adversely affect our company.
The tax regimes we are subject to or operate under, including with respect to income and non-income taxes, are unsettled and may be subject to significant change. Changes in tax laws, regulations, or rulings, or changes in interpretations of existing laws and regulations, could adversely affect our company. For example, the Tax Cuts and Jobs Act, the Coronavirus Aid, Relief, and Economic Security Act, and the Inflation Reduction Act of 2022 (the “IRA”) enacted many significant changes to the U.S. tax laws. Future guidance from the Internal Revenue Service and other tax authorities with respect to such legislation may affect us, and certain aspects thereof could be repealed or modified in future legislation. For example, the IRA includes provisions that will impact the U.S. federal income taxation of certain corporations, including imposing a 15% minimum tax on the book income of certain large corporations and a 1% excise tax on certain corporate stock repurchases that would be imposed on the corporation repurchasing such stock.
If our internal information technology systems, or those used by our CROs, CMOs, clinical sites or other contractors or consultants, are or were compromised, become unavailable or suffer security incidents, loss or leakage of data or other disruptions, we could suffer material adverse consequences, including operational or service interruption, harm to our reputation, litigation, fines, penalties, compromise of sensitive information related our business and other adverse consequences.
In the ordinary course of our business, we, and the third parties upon which we rely, process sensitive data and as a result, we and the third parties upon which we rely face a variety of evolving threats which could cause security incidents.
Our internal information technology systems and those of our CROs, CMOs, clinical sites and other contractors and consultants are vulnerable to cyberattacks, computer viruses, bugs, worms, or other malicious codes, malware (including as a result of advanced persistent threat intrusions) and other attacks by computer hackers, cracking, application security attacks, social engineering (including through phishing attacks), supply chain attacks and vulnerabilities through our third-party service providers, denial-of-service attacks (such as credential stuffing), credential harvesting, personnel misconduct or error, supply-chain attacks, software bugs, server malfunctions, software or hardware failures, loss of data or other information technology assets, adware, telecommunications failures, earthquakes, fires, floods and other similar threats.
Such threats are prevalent and continue to rise, are increasingly difficult to detect and come from a variety of sources, including traditional computer “hackers,” threat actors, “hacktivists,” organized criminal threat actors, personnel (such as through theft or misuse), sophisticated nation states and nation-state-supported actors. In particular, ransomware attacks, including those from organized criminal threat actors, nation-states and nation-state supported actors, are becoming increasingly prevalent and severe and can lead to significant interruptions, delays, or outages in our operations, loss of data (including sensitive customer information), loss of income, significant extra expenses to restore data or systems, reputational loss and the diversion of funds. To alleviate the negative impact of a ransomware attack, it may be preferable to make extortion payments, but we may be unwilling or unable to do so (including, for example, if applicable laws or regulations prohibit such payments, or our insurance carrier objects to payment).
Some actors, including nation-state actors, also engage in cyber-attacks for geopolitical reasons and in conjunction with military conflicts and defense activities. During times of war and other major conflicts, we and the third parties upon which we rely are vulnerable to a heightened risk of these attacks, including