The company’s products, services, systems and networks, including cloud-based systems and systems and technologies that the company maintains on behalf of its customers, are used in critical company, customer or third-party operations, and involve the storage, processing and transmission of sensitive data, including valuable intellectual property, other proprietary or confidential data, regulated data, and personal information of employees, customers and others.
The company’s products, services, systems and networks, including cloud-based systems and systems and technologies that the company maintains on behalf of its customers, are used in critical company, customer or third-party operations, and involve the storage, processing and transmission of sensitive data, including valuable intellectual property, other proprietary or confidential data, and regulated data including personal information of employees, customers and others.
We do not expect climate change or compliance with environmental laws and regulations focused on climate change to have a disproportionate effect on the company or its financial position, results of operations and competitive position.
We do not expect climate change or compliance with environmental laws and regulations focused on climate change or environmental protection to have a disproportionate effect on the company or its financial position, results of operations and competitive position.
The enactment and expansion of cybersecurity, AI, data protection and privacy laws, regulations and standards around the globe will continue to result in increased compliance costs, including due to an increased focus on international data transfer mechanisms and data location; increased cybersecurity requirements and reporting obligations; the lack of harmonization of such laws and regulations; the increase in associated litigation and enforcement activity by governments and private parties; the potential for damages, fines and penalties and debarment; and the potential regulation of new and emerging technologies.
The enactment and expansion of cybersecurity and data protection laws, regulations and standards around the globe will continue to result in increased compliance costs, including due to an increased focus on international data transfer mechanisms and data location; increased cybersecurity requirements and reporting obligations; the lack of harmonization of such laws and regulations; the increase in associated litigation and enforcement activity by governments and private parties; the potential for damages, fines and penalties and debarment; and the potential regulation of new and emerging technologies.
Cybersecurity attacks or other security incidents, including industry-wide incidents such as MOVEit, have or could result in, for example, one or more of the following: unauthorized access to, disclosure, modification, misuse, loss, or destruction of company, customer, or other third-party data or systems; theft or import or export of sensitive, regulated, or confidential data including personal information and intellectual property, including key innovations in AI, quantum, or other disruptive technologies; the loss of access to critical data or systems through ransomware, crypto mining, destructive attacks or other means; and business delays, service or system disruptions or denials of service.
Cybersecurity attacks or other security incidents, including industry-wide incidents, have or could result in, for example, one or more of the following: unauthorized access to, disclosure, modification, misuse, loss, or destruction of company, customer, or other third-party data or systems; theft or import or export of sensitive, regulated, or confidential data including personal information and intellectual property, including key innovations in AI, quantum, or other disruptive technologies; the loss of access to critical data or systems through ransomware, crypto mining, destructive attacks or other means; and business delays, service or system disruptions or denials of service.
Computer hackers and others routinely attack the security of technology products, services, systems and networks, like those we offer, using a wide variety of methods, including ransomware or other malicious software and attempts to exploit vulnerabilities in hardware, software, and infrastructure, and the increased use of generative AI may introduce novel methods of attack.
Computer hackers and others routinely attack the security of technology products, services, systems and networks, like those we offer, using a wide variety of methods, including ransomware or other malicious software and attempts to exploit vulnerabilities in hardware, software, and infrastructure, and the increased use of AI technologies may introduce novel methods of attack.
Premium increases could be significant due to the level of insolvencies of unrelated companies in the country at issue. IBM’s 2024 Annual Report to Stockholders includes information about potential impacts from pension funding and the use of certain assumptions regarding pension matters.
Premium increases could be significant due to the level of insolvencies of unrelated companies in the country at issue. IBM’s 2025 Annual Report to Stockholders includes information about potential impacts from pension funding and the use of certain assumptions regarding pension matters.
The risks associated with such legal proceedings are described in more detail in note Q, “Commitments & Contingencies,” in IBM’s 2024 Annual Report to Stockholders. The company believes it has adopted appropriate risk management and compliance programs.
The risks associated with such legal proceedings are described in more detail in note Q, “Commitments & Contingencies,” in IBM’s 2025 Annual Report to Stockholders. The company believes it has adopted appropriate risk management and compliance programs.
The company’s earnings and cash flows, as well as its access to funding, could be negatively impacted by changes in market liquidity conditions. IBM’s 2024 Annual Report to Stockholders includes information about the company’s liquidity position.
The company’s earnings and cash flows, as well as its access to funding, could be negatively impacted by changes in market liquidity conditions. IBM’s 2025 Annual Report to Stockholders includes information about the company’s liquidity position.
Since the market price of IBM’s common stock fluctuates significantly, stockholders may not be able to sell the company’s stock at attractive prices. In addition, changes by any rating agency to the company’s outlook or credit ratings can negatively impact the value and liquidity of both the company’s debt and equity securities.
Since the market price of IBM’s common stock fluctuates significantly, stockholders may not be able to sell the company’s stock at attractive prices. 9 Table of Contents In addition, changes by any rating agency to the company’s outlook or credit ratings can negatively impact the value and liquidity of both the company’s debt and equity securities.
As a global enterprise, the regulatory environment with regard to cybersecurity, privacy, AI and data protection issues is increasingly complex and will continue to impact the company’s business, including through increased risk, increased costs, and expanded or otherwise altered compliance obligations, including with respect to the increased regulatory activity around the security of critical infrastructure, IoT devices, customer industries (e.g., financial services) and various customer and government supply chain security programs.
As a global enterprise, the regulatory environment with regard to cybersecurity and data protection issues is increasingly complex and will continue to impact the company’s business, including through increased risk, increased costs, and expanded or otherwise altered compliance obligations, including with respect to the increased regulatory activity around the security of critical infrastructure, connected devices, customer industries (e.g., financial services) and various customer and government supply chain security programs.
The company does not make a market in either its debt or equity securities and cannot provide any assurances with respect to the liquidity or value of such securities. 9 Table of Contents Item 1B. Unresolved Staff Comments: Not applicable.
The company does not make a market in either its debt or equity securities and cannot provide any assurances with respect to the liquidity or value of such securities. Item 1B. Unresolved Staff Comments: Not applicable.
Attacks also include social engineering and cyber extortion to induce customers, contractors, business partners, vendors, employees and other third parties to disclose information, transfer funds, or unwittingly provide access to systems or data.
Attacks may also include social engineering and cyber extortion to induce customers, contractors, business partners, vendors, employees and other third parties to disclose information, transfer funds, or provide unauthorized access to systems or data.
In addition, the failure of ecosystem partners to comply with all applicable laws and regulations may prevent the company from working with them and could subject the company to losses and affect its ability to bring products to market. 6 Table of Contents Risks Related to Cybersecurity and Data Privacy Cybersecurity, Privacy, and AI Considerations Could Impact the Company’s Business: There are numerous and evolving risks to cybersecurity and privacy, including risks originating from intentional acts of individual and groups of criminal hackers, hacktivists, state-sponsored organizations, nation states and competitors; from intentional and unintentional acts or omissions of customers, contractors, business partners, vendors, employees and other third parties; and from errors in processes or technologies, as well as the risks associated with an increase in the number of customers, contractors, business partners, vendors, employees and other third parties working remotely.
In addition, the failure of ecosystem partners to comply with all applicable laws and regulations may prevent the company from working with them and could subject the company to losses and affect its ability to bring products to market. 6 Table of Contents Risks Related to Cybersecurity and Data Protection Cybersecurity and Data Protection Considerations Could Impact the Company’s Business: There are numerous and evolving risks to cybersecurity and data protection, including risks originating from intentional acts of individual and groups of criminal hackers, hacktivists, state-sponsored organizations, nation states and competitors; from intentional and unintentional acts or omissions, including the practices and investments, of customers, contractors, business partners, vendors, the open source community, the companies we acquire, employees and other third parties; and from errors in processes or technologies, as well as the risks associated with an increase in the number of customers, contractors, business partners, vendors, employees and other third parties working remotely.
IBM’s drive for greater agility, productivity, flexibility and cost savings by continuously transforming with the use of AI may not yield intended gains in speed, quality, productivity and enablement of rapid scaling, which may impact the company’s competitiveness.
Further, IBM’s drive for greater agility, productivity, flexibility and cost savings by continuously transforming with the use of AI may not yield intended gains in speed, quality, productivity and enablement of rapid scaling. The evolving global AI regulatory and legal environment may affect the company’s business and the company’s overall results of operations.
Item 1A., this increasing mix and application of AI-based technologies may impact IBM’s ongoing efforts to maintain and increase its market share and its profit margins or harm IBM’s reputation if the company does not continue to be recognized as an AI leader with strong governance processes.
Item 1A., if the company does not continue to be recognized as an AI leader with strong governance processes or if our AI technologies do not work as intended or produce unexpected outcomes, IBM’s ongoing efforts to maintain and increase its market share and its profit margins, its reputation, and its competitiveness could be harmed.
Cybersecurity attacks or other catastrophic events resulting in disruptions to or failures in power, information technology, communication systems or other critical infrastructure could result in interruptions or delays to company, customer, or other third-party operations or services, financial loss, injury or death to persons or property, potential liability, and damage to brand and reputation. 7 Table of Contents Although the company continuously takes significant steps to mitigate cybersecurity risk across a range of functions, such measures can never eliminate the risk entirely or provide absolute security.
Cybersecurity attacks or other catastrophic events resulting in disruptions to or failures in power, information technology, communication systems or other critical infrastructure could result in interruptions or delays to company, customer, or other third-party operations or services, financial loss, injury or death to persons or property, potential liability, and damage to brand and reputation.
The evolving global AI regulatory environment, including the enactment of the EU AI Act, may affect the company’s business and the company’s overall results of operations. Computer hackers and others routinely attack the security of technology products, services, systems and networks using a wide variety of methods, and the increased use of generative AI may introduce novel methods of attack.
Computer hackers and others routinely attack the security of technology products, services, systems and networks using a wide variety of methods, and the increased use of AI technologies may introduce novel methods of attack.