General Risks
Our business and operations would suffer in the event of computer system failures, including but not limited to our information technology systems, infrastructure and data, or those of our third-party vendors, contractors or consultants failing, becoming unavailable, or suffering security breaches, losses or leakages of data and other disruptions, which could result in disruption of our services, compromise sensitive information (including personal information) related to our business, or prevent us from accessing critical information, potentially exposing us to liability or otherwise adversely affecting our business.
We are increasingly dependent upon information technology systems, infrastructure and data to operate our business. In the ordinary course of business, we collect, store and transmit confidential information (including but not limited to intellectual property, proprietary business information and personal information). It is critical that we do so in a secure manner to maintain the confidentiality and integrity of such confidential information. We also have outsourced elements of our operations to third parties, and as a result we manage a number of third-party vendors and other contractors and consultants who have access to our confidential information.
Despite the implementation of security measures, our internal computer systems, and those of third parties on which we rely, are vulnerable to breakdown or other damage from service interruptions, computer viruses, malware, natural disasters, terrorism, war, telecommunication and electrical failures, cyber-attacks or cyber-intrusions, including ransomware attacks, over the internet, attachments to emails, persons inside our organization, or persons with access to systems inside our organization. The risk of a security breach or disruption, particularly through cyber-attacks or cyber-intrusions, including by computer hackers, foreign governments, and cyber-terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. If such an event were to occur and cause interruptions in our operations, it could result in a material disruption of our current or future product development programs. For example, the loss of clinical study data from completed or any future ongoing or planned clinical studies could result in delays in our regulatory approval efforts and significantly increase our costs to recover or reproduce the data. To the extent that any disruption or security breach was to result in a loss of or damage to our data or applications, or inappropriate disclosure of confidential or proprietary information, we could incur material legal claims and liability, damage to our reputation, and the further development of our product candidate could be delayed.
We cannot assure you that our data protection efforts and our investment in information technology will prevent breakdowns, data leakages, breaches in our systems, or those of our third-party vendors and other contractors and consultants, or other cyber incidents that could have a material adverse effect upon our reputation, business, operations, or financial condition. For example, if such an event were to occur and cause interruptions in our operations, or those of our third-party vendors and other contractors and consultants, it could result in a material disruption or delay of the development of ABP-450 and future product candidates. Furthermore, significant disruptions of our internal information technology systems or those of our third-party vendors and other contractors and consultants, or security breaches could result in the loss, misappropriation, or unauthorized access, use, or disclosure of, or the prevention of access to, confidential information, which could result in financial, legal, business and reputational harm to us. For example, any such event that leads to actual or perceived unauthorized access, use, or disclosure of personal information, including personal information regarding our customers or employees, could harm our reputation directly, compel us to comply with federal or state breach notification laws and foreign law equivalents, subject us to mandatory corrective action, and otherwise subject us to liability under laws and regulations that protect the privacy and security of personal information, which could result in significant legal and financial exposure and reputational damages that could potentially have a material adverse effect on our business, financial condition, results of operations and prospects.
We rely on third parties to provide services and technology necessary for the operation of our business. Any failure of one or more of our vendors, suppliers or licensors to provide these services or technology could have a material adverse effect on our business.
We rely on third-party vendors to provide critical services, including, among other things, services related to accounting, billing, human resources, and information technology that we cannot or do not provide ourselves. We depend on these vendors to ensure that our corporate infrastructure will consistently meet our business requirements. The ability of these third-party vendors to successfully provide reliable and high quality services is subject to technical and operational uncertainties that are beyond our control.
While we may be entitled to damages if our vendors fail to perform under their agreements with us, the amount of damages we receive may be limited. In addition, we do not know whether we will be able to collect on any award of damages or that these damages would be sufficient to cover the actual costs we would incur as a result of any vendor’s failure to perform under its