resources to understanding and complying with this changing landscape and such changes may require ongoing modifications to our policies, procedures and systems.
Risks Related to Employee and Operations Matters and Information Technology
Our future success depends on our ability to retain our Chief Executive Officer and other key executives and to attract, retain, and motivate qualified personnel.
We are highly dependent on Dr. Rogerio Vivaldi Coelho, our Chief Executive Officer, as well as the other principal members of our management and scientific teams. Dr. Vivaldi and such other principal members are employed “at will,” meaning we or they may terminate the employment at any time. We do not maintain “key person” insurance for any of our executives or other employees. The loss of the services of any of these persons could impede the achievement of our research, development, and commercialization objectives.
Recruiting and retaining qualified scientific, clinical, manufacturing, business development, general and administrative and sales and marketing personnel will also be critical to our success. We may not be able to attract and retain personnel on acceptable terms given the competition among numerous pharmaceutical and biotechnology companies for similar personnel and recently observed increases in employee attrition and turnover in our industry. We also experience competition for the hiring of scientific and clinical personnel from universities and research institutions. In addition, challenges or the failure to succeed in preclinical or clinical trials or applications for marketing approval, may make it more challenging to recruit and retain qualified personnel. In addition, we rely on consultants and advisors, including scientific and clinical advisors, to assist us in formulating our research and development and commercialization strategy. Our consultants and advisors, including our scientific co-founders, may be employed by employers other than us and may have commitments under consulting or advisory contracts with other entities that may limit their availability to us. The inability to recruit, or loss of services of certain executives, key employees, consultants, or advisors, may impede the progress of our research, development, and commercialization objectives and have a material adverse effect on our business, financial condition, results of operations, and prospects.
Our internal computer systems, or those of our third-party vendors, collaborators or other contractors or consultants, may fail or suffer security breaches, which could result in a material disruption of our product development programs, compromise sensitive information related to our business or prevent us from accessing critical information, potentially exposing us to liability or otherwise adversely affecting our business.
Our internal computer systems and those of our current and any future third-party vendors, collaborators and other contractors or consultants are vulnerable to damage, interruption or data theft from computer viruses, computer hackers, malicious code, employee theft or misuse, ransomware, social engineering (including phishing attacks), denial-of-service attacks, sophisticated nation-state and nation-state-supported actors, unauthorized access, natural disasters, terrorism, war and telecommunication and electrical failures. Cybersecurity incidents, which may not be immediately or ever detected, are increasing in frequency and evolving in nature.
System failure, accident and security breach, could cause interruptions in our operations, or result in a disruption of our development programs and our business operations, whether due to a loss of our trade secrets or other proprietary information or other disruptions. For example, the loss of clinical trial data from future clinical trials could result in delays in our regulatory approval efforts and significantly increase our costs to recover or reproduce the data. If we were to experience a significant cybersecurity breach of our information systems or data, the costs associated with the investigation, remediation and potential notification of the breach to counter-parties and data subjects could be material. In addition, our remediation efforts may not be successful. If we do not allocate and effectively manage the resources necessary to build and sustain the proper technology and cybersecurity infrastructure, we could suffer significant business disruption, including transaction errors, supply chain or manufacturing interruptions, processing inefficiencies, data loss or the loss of or damage to intellectual property or other proprietary information.
To the extent that any disruption or security breach were to result in a loss of, or damage to, our or our third-party vendors’, collaborators’ or other contractors’ or consultants’ data or applications, or inappropriate disclosure of confidential or proprietary information, we could incur liability including litigation exposure, penalties and fines, we could