Evolve and become more difficult to detect and

This preview shows page 24 - 26 out of 138 pages.

evolve and become more difficult to detect and successfully defend against, one or more cyber threats might defeat our security measures or those of our third-party service providers in the future and obtain the personal information of customers, associates and vendors that we hold or to which our third-party service providers have access, and we or our third-party service providers may not discover any security breach and loss of information for a significant period of time after the security breach occurs. Moreover, associate error or malfeasance, faulty password management or other irregularities may result in a defeat of our or our third-party service providers’ security measures and breach our or our third-party service providers information systems (whether digital or otherwise). Any breach of our security measures or those of our third-party service providers and loss of our confidential information, which could be undetected for a period of time, or any failure by us to comply with applicable privacy and information security laws and regulations could cause us to incur significant costs to protect any customers whose personal data was compromised and to restore customer confidence in us and to make changes to our information systems and administrative processes to address security issues and compliance with applicable laws and regulations. In addition, such events could materially adversely affect our reputation with our customers, associates, vendors and shareholders, as well as our operations, results of operations, financial condition and liquidity, could result in the release to the public of confidential information about our operations and financial condition and performance and could result in litigation against us or the imposition of penalties or liabilities, which may not be covered by our insurance policies. Moreover, a security breach could require us to devote significant management resources to address the problems created by the security breach and to expend significant additional resources to upgrade further the security measures that we employ to guard such important personal information against cyberattacks and other attempts to access such information and could result in a disruption of our operations, particularly our digital retail operations. 23
Image of page 24

Subscribe to view the full document.

As a retailer who accepts debit and credit cards for payment, we are subject to the Payment Card Industry Data Security Standard ("PCI DSS"), issued by the Payment Card Industry Security Standards Council. PCI DSS contains compliance guidelines and standards with regard to our security surrounding the physical and electronic storage, processing and transmission of individual cardholder data. By accepting debit cards for payment, we are also subject to compliance with the American National Standards Institute encryption standards and payment network security operating guidelines. Even though we comply with these guidelines and standards and other information security measures, we cannot
Image of page 25
Image of page 26

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern