circumstances. In the event of unauthorized use or disclosure of this information, these agreements, even if obtained, may not provide meaningful protection for our trade secrets or other confidential information. In addition, adequate remedies may not exist in the event of unauthorized use or disclosure of this information. The loss or exposure of our trade secrets and other proprietary information would impair our competitive advantages and could have a material adverse effect on our operating results, financial condition and future growth prospects. Furthermore, others may have, or may in the future independently develop, substantially similar or superior know-how and technology.
We may be involved in lawsuits to protect or enforce our patents that are brought by us which could be expensive and time consuming and, if determined adversely, could adversely affect our patent position.
In order to protect or enforce our patent rights, we may initiate patent litigation against third parties, and we may be similarly sued by others. We may also become subject to interference proceedings conducted in the patent and trademark offices of various countries to determine the priority of inventions. The defense and prosecution, if necessary, of intellectual property suits, interference proceedings and related legal and administrative proceedings is costly and diverts our technical and management personnel from their normal responsibilities. We may not prevail in any of these suits. An adverse determination of any litigation or defense proceedings could put our patents at risk of being invalidated or interpreted narrowly and could put our patent applications at risk of not issuing.
Furthermore, because of the substantial amount of discovery required in connection with intellectual property litigation, there is a risk that some of our confidential information could be compromised by disclosure during this type of litigation. In addition, during the course of this kind of litigation, there could be public announcements of the results of hearings, motions or other interim proceedings or developments in the litigation. If securities analysts or investors perceive these results to be negative, it could have a substantial negative effect on the trading price of our common stock.
On September 25, 2019, in a complaint filed in the Düsseldorf, Germany, District Court, Carl Zeiss Microscopy GmbH, a subsidiary of Carl Zeiss AG (Zeiss), sued Luxendo GmbH (Luxendo), a subsidiary of Bruker Corporation, for infringement of a recently registered German utility model patent licensed to Zeiss pertaining to one specific Luxendo product category. We intend to vigorously defend against this claim.
On September 23, 2019, in a complaint filed in the Düsseldorf, Germany, District Court, Micromass UK Limited, a subsidiary of Waters Corporation, sued Bruker Corporation, as well as its affiliate, Bruker Daltonik GmbH, for infringement of a European patent pertaining to our timsTOF product line. On March 6, 2020, Bruker was notified that Micromass has expanded its complaint in Düsseldorf and now asserts another recently granted European patent in Germany. We intend to vigorously defend against these claims.
We rely on information technology to support our operations and reporting environments. A security failure of that technology, including with respect to cybersecurity, could impact our ability to operate our businesses effectively, adversely affect our financial results, damage our reputation and expose us to potential liability or litigation.
We use information systems to carry out our operations and maintain our business records. Some systems are internally managed and some are maintained by third-party service providers. Our ability to conduct business could be materially and adversely affected if these systems or resources are compromised, damaged or fail. This could be a result of a cyber-incident, social engineering scam, hacking, natural disaster, hardware or software corruption, failure or error, telecommunications system failure, service provider error or failure, intentional or unintentional personnel actions or other disruption.
In the ordinary course of business, we collect and store sensitive data, including intellectual property, other proprietary information and personally identifiable information. Despite our security measures, our information technology and infrastructure may be vulnerable to cyber-attacks by hackers or breached due to employee error, malfeasance, or other disruptions. If this data is compromised, destroyed or inappropriately disclosed, it could