Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

please determine if this risk can impact the Budgeting and Standard Cost Systems and/or the Capital Investment Analysis, please describe what management could do to

please determine if this risk can impact the Budgeting and Standard Cost Systems and/or the Capital Investment Analysis, please describe what management could do to minimize the stated risk.

1. Breaches or failures of our information technology systems or other cybersecurity or data security-related incidents may have an adverse impact on our business, financial condition, and results of operations. Efforts to hack or breach security measures, failures of systems or software to operate as designed or intended, viruses, operator error or inadvertent releases of data all threaten our and our franchisees information systems and records. An actual or perceived breach in the security of our information technology systems or those of our franchisees and third-party service providers could lead to an interruption in the operation of our systems, resulting in material adverse impacts on our business, financial condition, and results of operations, and could result in adverse publicity and significant damage to our brand and reputation with consumers and third parties with whom we do business. Additionally, a significant theft, loss, disclosure, modification or misappropriation of, or access to, guests, employees, third parties or other proprietary data or other breach of our information technology systems could result in fines, legal claims or proceedings, including regulatory investigations and actions, or liability for failure to comply with privacy and information security laws, which could disrupt our operations, damage our reputation and expose us to claims from guests and employees, any of which could have a material adverse effect on our financial condition and results of operations. The techniques and sophistication used to conduct cyber-attacks and breaches of information technology systems, as well as the sources and targets of these attacks, may take many forms (including phishing, social engineering, denial, or degradation of service attacks, malware, or ransomware), change frequently and are often not recognized until such attacks are launched or have been in place for a period of time. In addition, our employees, franchisees, contractors, or third parties with whom we do business or to whom we outsource business operations may attempt to circumvent our security measures to misappropriate regulated, protected, or personally identifiable information, and may purposefully or inadvertently cause a breach involving or compromise of such information. Third parties may have the technology or know-how to breach the security of the information collected, stored, or transmitted by us or our franchisees, and our respective security measures, as well as those of our technology vendors, may not effectively prohibit others from obtaining improper access to this information. There is no assurance that any security procedures or controls that we or our third-party providers have implemented will be sufficient to prevent data-security related incidents from occurring. We could be forced to expend significant financial and operational resources in responding to a security breach, including investigating and remediating any information security vulnerabilities, defending against and resolving legal and regulatory claims and complying with notification obligations, all of which could divert resources and the attention of our management and key personnel away from our business operations and adversely affect our business, financial condition and results of operations. In addition, our remediation efforts may not be successful, and we could be unable to implement, maintain and upgrade adequate safeguards. While we currently maintain cybersecurity insurance, such insurance may not be sufficient in type or amount to cover us against claims related to breaches, failures, or other data security-related incidents, and we cannot be certain that cyber insurance will continue to be available to us on economically reasonable terms, or at all, or that any insurer will not deny coverage as to any future claim. Any of the foregoing could have an adverse effect on our business, financial condition, results of operations and prospects.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Internal Control A Managers Journey

Authors: K. H. Spencer Pickett

1st Edition

0471402508, 978-0471402503

More Books

Students also viewed these Accounting questions