successfully implement the tasks necessary to further develop and commercialize our product candidates and, accordingly, may not achieve our research, development and commercialization goals.
Our internal computer systems and networks, or those used by our third-party CROs, other contractors, consultants or collaborators, may fail or suffer security breaches or incidents, which could result in a material disruption of the development programs of our product candidates.
Despite the implementation of security measures, our internal computer systems and networks and those of our current and future CROs and other contractors and consultants are vulnerable to damage, breakdown, or interruption from computer viruses, ransomware, or other malware, phishing, social engineering, fraudulent inducement, electronic fraud, wire fraud, human error or malfeasance, unauthorized access, natural disasters, and telecommunication and electrical failures. For example, our employees have received and likely will continue to receive highly convincing phishing or “spoofed” emails to induce them to make payments to fraudulent accounts. These attacks are often personalized, targeting individuals directly to increase their effectiveness. While we have not to date experienced any such material system failure or material security breach or incident, any such event impacting ourselves or our current or future CROs or other contractors or consultants could result in a material disruption of our development programs and our business operations and could lead to the loss of confidential information, financial assets, trade secrets or other intellectual property, or could lead to unauthorized access to or use, modification, unavailability, disclosure, loss, acquisition, or other processing of, or the public exposure of, personal information (including sensitive personal information) of our employees, customers and others, or confidential information of ourselves or of third parties that we maintain, any of which could have a material adverse effect on our business, reputation, financial condition and results of operations. For example, the loss, corruption, or unavailability of clinical trial data from completed or future clinical trials could result in delays in our regulatory approval efforts and significantly increase our costs to recover or reproduce the data. Likewise, we currently rely on third parties to manufacture our product candidates and to conduct clinical trials, and similar events relating to their computer systems could also have a material adverse effect on our business.
Similarly, supply chain attacks have increased in frequency and severity, and we cannot guarantee that third parties and infrastructure in our supply chain or our third-party partners’ supply chains have not been compromised or that they do not contain exploitable defects or bugs that could result in a breach of or disruption to our information technology systems (including our products/services) or the third-party information technology systems that support us and our services.
Any disruption or security breach or incident could compromise our networks and systems, or those of our current or future CROs or other contractors or consultants, could result in a loss or unavailability of, or damage to, our data or applications, or unauthorized access to or use, modification, unavailability, disclosure, loss, acquisition, or other processing of, or the public exposure of, personal information (including sensitive personal information) of our employees, customers and others, or confidential information of ourselves or of third parties that we maintain, and could result in legal claims or proceedings, regulatory investigations or other proceedings, liability under laws that protect the privacy of personal information, mandatory notification and reporting obligations, additional regulatory oversight, significant regulatory penalties and remediation expenses.
In addition, these breaches and incidents and other inappropriate access can be difficult to detect, remediate, and otherwise address, and may remain undetected or not fully addressed for an extended period. Any delay in identifying them and responding to or otherwise remediating them may lead to increased harm of the type described above. Geopolitical tensions and conflicts (including the Russia and Ukraine conflict and the conflict in the Middle East) may increase the security risks we and our current or future CROs or other contractors or consultants may face. We expect to continue to expend significant resources to protect against security breaches and incidents and could be required to expend significant amounts to remediate and otherwise respond to security breaches and incidents, including in connection with making notifications to individuals or other persons or implementing additional security measures. With the increase in personnel working remotely during and after the COVID-19 pandemic, we and our vendors are at increased risk for security breaches and incidents.
Our contracts may not contain limitations of liability, and even where they do, there can be no assurance that limitations of liability in our contracts are sufficient to protect us from liabilities, damages, or claims related to privacy, data protection, or security. We cannot be sure that our insurance coverage will be adequate or sufficient to protect us from or to mitigate liabilities arising out of our privacy, data protection, or security practices, that such coverage will continue to be available on commercially reasonable terms or at all, or that such coverage will pay future claims.
Our employees, independent contractors, consultants, commercial partners and vendors may engage in misconduct or other improper activities, including noncompliance with regulatory standards and requirements.
Our business operations and current and future relationships with investigators, health care professionals, consultants, third-party payors and customers will be subject, directly or indirectly, to federal and state healthcare fraud and abuse laws, false claims