incident affecting their infrastructure that may be caused by fire, flood, severe storm, earthquake or other natural disasters, power loss, telecommunications failures, cyber-attacks, terrorist or other attacks, and other similar events beyond our control, could adversely affect our cloud-native platform. Any disruption of or interference with our use of AWS could impair our ability to deliver our platform reliably to our developers, creators, and users.
Additionally, threats or attacks from computer malware, ransomware, viruses, social engineering (including phishing attacks), denial of service or other attacks, employee theft or misuse and general hacking have occurred and are becoming more prevalent in our industry, particularly against cloud-native services and vendors of security solutions. If AWS were to experience any of these security incidents, it could result in unauthorized access to, damage to, disablement or encryption of, use or misuse of, disclosure of, modification of, destruction of, or loss of our data or our developers’, creators’, and users’ data or disrupt our ability to provide our platform or service. A prolonged AWS service disruption affecting our cloud-native platform for any of the foregoing reasons would adversely impact our ability to serve our users, developers, and creators and could damage our reputation with current and potential users, developers, and creators, expose us to liability, result in substantial costs for remediation, cause us to lose users, developers, and creators, or otherwise harm our business, financial condition, or results of operations. and users. We may also incur significant costs for using alternative hosting cloud infrastructure services or taking other actions in preparation for, or in reaction to, events that damage or interfere with the AWS services we use.
Our commercial agreement with AWS will remain in effect until November 2021. Neither party may terminate the commercial agreement for convenience during its term. In the event that our AWS service agreements are terminated, or there is a lapse of service, elimination of AWS services or features that we utilize, we could experience interruptions in access to our platform as well as significant delays and additional expense in arranging for or creating new facilities or re-architecting our platform for deployment on a different cloud infrastructure service provider, which would adversely affect our business, financial condition, and results of operations.
If the security of our platform is compromised, it could compromise our and our developers’, creators’, and users’ proprietary information, disrupt our internal operations and harm public perception of our platform, which could cause our business and reputation to suffer.
We collect and store personal data and certain other sensitive and proprietary information in the operation of our business, including developer, creator and user information, and other confidential data. While we have implemented measures designed to prevent unauthorized access to or loss of our confidential data, mobile malware, viruses, hacking, social engineering, spam and phishing attacks have occurred and may occur on our systems in the future. Because of the popularity of our platform, we believe that we are an attractive target for these sorts of attacks.
Further, the techniques used to obtain unauthorized access to, or to sabotage, systems or networks, are constantly evolving and generally are not recognized until launched against a target. Consequently, we may be unable to anticipate these techniques, react in a timely manner, or implement preventive measures, which could result in delays in our detection or remediation of, or other responses to, security breaches and other security-related incidents. The wide availability of open source software used in our solutions could also expose us to security vulnerabilities.
If any unauthorized access to our network, systems or data, including our sensitive and proprietary information, personal data from our users, developers or creators, or other data, or any other security breach occurs, or is believed to have occurred, whether as a result of third-party action, employee negligence, error or malfeasance, defects, social engineering techniques, or otherwise, our reputation, brand and competitive position could be damaged, our and our users’, developers’, and
38