We depend on information technology to enable us to operate safely and efficiently and interface with our customers as well as to maintain our internal control environment and financial reporting accuracy and efficiency. Our information technology capabilities are delivered through a combination of internal and external services and service providers. If we do not allocate and effectively manage the resources necessary to build and sustain the proper technology infrastructure, we could be subject to transaction errors, processing inefficiencies, the loss of customers, business disruptions, property damage, or the loss of or damage to our confidential business information due to a security breach. In addition, our information technology systems may be damaged, disrupted or shut down due to attacks by computer hackers, computer viruses, employee error or malfeasance, power outages, hardware failures, telecommunication or utility failures, catastrophes or other unforeseen events, and in any such circumstances our system redundancy and other disaster recovery planning may be ineffective or inadequate. Security breaches of our systems (or the systems of our customers, suppliers or other business partners) could result in the misappropriation, destruction or unauthorized access or disclosure of confidential information or personal data belonging to us or to our employees, partners, customers or suppliers, and may subject us to legal liability.
As with most large systems, our information technology systems have in the past been, and in the future likely will be subject to computer viruses, malicious codes, unauthorized access and other cyber-attacks, and we expect the sophistication and frequency of such attacks to continue to increase. In addition, advancements in, and the deployment of, intelligent automation, including artificial intelligence tooling and "bots", may increase our and our vendors' vulnerability to such attacks. To date, we are not aware of any significant impact on our operations or financial results from such attempts; however, unauthorized access could disrupt our business operations, result in the loss of assets, and have a material adverse effect on our business, financial condition, or results of operations. Any of the attacks, breaches or other disruptions or damage described above could: interrupt our operations at one or more sites; delay production and shipments; result in the theft of our and our customers' intellectual property and trade secrets; damage customer and business partner relationships and our reputation; result in defective products or services, physical damage to facilities, pipelines or delivery systems, including those we own or operate for third parties, legal claims and proceedings, liability and penalties under privacy laws, or increased costs for security and remediation; or raise concerns regarding our internal control environment and internal control over financial reporting. Each of these consequences could adversely affect our business, reputation and our financial statements.
Our business involves the use, storage, and transmission of information about our employees, vendors, and customers. The protection of such information, as well as our proprietary information, is critical to us. The regulatory environment surrounding information security and privacy is increasingly demanding, with the frequent imposition of new and constantly changing requirements. We have established policies and procedures to help protect the security and privacy of this information. We also, from time to time, export sensitive customer data and technical information to recipients outside the United States. Breaches of our security measures or the accidental loss, inadvertent disclosure, or unapproved dissemination of proprietary information or sensitive or confidential data about us or our customers, including the potential loss or disclosure of such information or data as a result of fraud, trickery, or other forms of deception, could expose us, our customers, or the individuals affected to a risk of loss or misuse of this information, which could ultimately result in litigation and potential legal and financial liability. These events could also damage our reputation or otherwise harm our business.