We use information technology and other computer resources to carry out important operational activities and to maintain our business records. Our computer systems, including our back-up systems, are subject to damage or interruption from power outages, computer and telecommunications failures, computer viruses, security breaches (through cyber-attacks from computer hackers and sophisticated organizations), catastrophic events such as fires, tornadoes and hurricanes, usage errors by our employees, or cyber-attacks or errors by third party vendors who have access to our confidential data or that of our customers. While to our knowledge we have not experienced a significant cyber-attack, we are continuously working to improve our information technology systems and provide employee awareness training around phishing, malware, and other cyber risks to enhance our levels of protection, to the extent possible, against cyber risks and security breaches, and monitor to prevent, detect, address and mitigate the risk of unauthorized access, misuse, computer viruses and other events that could have an impact on our business, there is no assurance that advances in computer capabilities, new technologies, methods or other developments will detect or prevent security breaches and safeguard access to proprietary or confidential information.
The frequency and sophistication of cyber-attacks on companies has increased in recent years, including significant ransomware attacks and foreign attacks on prominent companies and computer software programs. If our computer systems and our back-up systems are damaged, breached, or cease to function properly, or if there are intrusions or failures of critical infrastructure such as the power grid or communications systems, we could suffer extended interruptions in our operations. Any such disruption could damage our reputation, result in lost customers, lost revenue and market value declines, lead to legal proceedings against us by affected third parties resulting in penalties or fines and require us to incur significant costs to remediate or otherwise resolve these issues. In addition, the costs of maintaining adequate protection and insurance against such threats, as they develop in the future (or as legal requirements related to data security increase) could be material.
Breaches of our computer or data systems, including those operated by third parties on our behalf, could result in the unintended public disclosure or the misappropriation of our proprietary information or personal and confidential information, about our employees, customers and business partners, requiring us to incur significant expense to address and resolve. The misappropriation and/or release of confidential information may also lead to legal or regulatory proceedings against us by affected individuals and the outcome of such proceedings could include penalties or fines and require us to incur significant costs to remediate or otherwise resolve. Depending on its nature, a particular breach or series of breaches of our systems may result in the unauthorized use, appropriation or loss of confidential or proprietary information on a one-time or continuing basis, which may not be detected for a period of time.