Foreign customers affected by these and future U.S. government sanctions or threats of sanctions may respond by developing their own solutions to replace our products or by utilizing our foreign competitors’ products.
Tariff and trade policy discussions between the U.S., China and its other trading partners are ongoing and fluid. These tariffs and other policy changes are subject to a number of uncertainties as they are implemented. The ultimate reaction of other countries and the individuals in each of these countries may have an adverse impact on the U.S. and global economies, and our business, results of operations and financial condition.
Disruptions in our information technology systems or data security incidents could result in significant financial, legal, regulatory, business, and reputational harm to us.
We are increasingly dependent on information technology systems and infrastructure, including mobile technologies, to operate our business. In the ordinary course of our business, we collect, store, process and transmit significant amounts of sensitive information, including intellectual property, proprietary business information, personally-identifiable information of individuals, and other confidential information, including that of our customers and other business partners. It is critical that we do so in a secure manner to maintain the confidentiality, integrity, and availability of this sensitive information. We have also outsourced elements of our operations (including elements of our information technology infrastructure) to third parties, and as a result, we manage a number of third-party vendors who have access to our computer networks and our confidential information.
All information systems are subject to disruption, breach, or failure. Potential vulnerabilities can be exploited from inadvertent or intentional actions of our employees, third-party vendors, business partners, or by malicious third parties. Attacks of this nature are increasing in their frequency, levels of persistence, sophistication, and intensity, and are being conducted by sophisticated and organized groups and individuals with a wide range of expertise and motives (including industrial espionage), including organized criminal groups, nation states, and others. In addition to the extraction of sensitive information, attacks could include the deployment of harmful malware, ransomware, or other means which could affect service reliability and threaten the confidentiality, integrity, and availability of information. Significant disruptions in our, or our third-party vendors’, information technology systems or other data security incidents could adversely affect our business operations and result in the loss or misappropriation of, and unauthorized access to, sensitive information, which could result in financial, legal, regulatory, business, and reputational harm to us.
On November 1, 2018, we announced the discovery of an attack on our computer system by a highly-sophisticated actor. We notified law enforcement of the attack and retained forensic experts to assist with the investigation. It currently remains unclear whether we will be able to determine the extent of the breach or the potential impact on our operations. Also unclear is whether we will be able to identify who is responsible for the attack, or whether we will be able to pursue legal action or other remedies. The attack, including the expenses incurred to address it, may have an adverse effect on our results of operations and financial condition, may result in litigation, and may cause reputational harm.
While we are engaged in remediation and have implemented, and are continuing to implement, security measures intended to protect our information technology systems and infrastructure, there can be no assurance that such remediation and security measures will successfully prevent further security incidents. Additional information technology system disruptions, whether from attacks on our technology environment or from computer viruses, natural disasters, terrorism, war or other causes, could result in a material disruption in our business operations, force us to incur significant costs and engage in litigation, harm our reputation, and subject us to liability under laws, regulations, and contractual obligations.
We may be unable to effectively enforce and protect our intellectual property rights.
Our success as a company depends in part upon the protection of our intellectual property rights. We rely primarily on patent, copyright, trademark, and trade secret laws, as well as nondisclosure and confidentiality agreements and other methods, to protect our proprietary information, technologies, processes, and brand identity. We own various U.S. and international patents and have additional pending patent applications relating to certain of our products and technologies. The process of seeking patent protection is lengthy and expensive, and we cannot be certain that pending or future applications will actually result in issued patents or that issued patents will be of sufficient scope or strength to provide meaningful protection or commercial advantage. In addition, our intellectual property rights may be circumvented,