We rely on our information technology ("IT") infrastructure, including the Brink's Global Information Security ("GIS") Program, which is designed to reduce risk by ensuring that computer systems are secure through protecting networks, systems, hardware, and data to mitigate cybersecurity risk and efficiently run our business. If there were to be significant problems with our IT infrastructure, such as IT data center or system failures or unplanned system disruptions, failure to develop new technology platforms to support new initiatives and product and service offerings, or a failure of our GIS Program, it could halt or delay our ability to service our customers, hinder our ability to conduct and expand our business and require significant remediation costs. Remote work by our personnel and remote access to our systems have also increased significantly, which could increase our cybersecurity risk profile. We believe our cybersecurity risks will further increase as we expand services, complete mergers & acquisitions, and employ emerging technologies, mobile applications, third-party service providers and cloud-based services. Hacking, phishing attacks, ransomware, insider threats, physical breaches or other actions may cause confidential information belonging to Brink's, its employees or customers to be misused. Moreover, the techniques used to obtain unauthorized access to networks or to sabotage systems change frequently and generally are not recognized until launched against a target. We may be unable to anticipate these emerging techniques, react in a timely manner, or implement adequate preventative measures. We have experienced cybersecurity incidents and unplanned system disruptions in the past, but none of these incidents or disruptions, individually or in the aggregate, have had a material adverse effect on our business, financial condition or results of operations. A significant cybersecurity incident that impacts our system, application or data center that houses sensitive and confidential data, including, but not limited to, personally identifiable information and business sensitive information, could have a material adverse effect on our business, financial condition, results of operations and cash flows. Additionally, such an incident may result in significant challenges and costs related to coordination with third-party service providers in order to resolve related issues.
If our third-party providers do not respond in a timely manner to our needs, disaster recovery, business continuity and crisis management activities could be negatively impacted. We have programs in place that are intended to identify, protect, detect, respond, and recover from cybersecurity incidents and breaches and that provides employee awareness training regarding cyber risks; however, due to evolving and advanced sophisticated attackers, cyber attacks remain increasingly difficult to detect and we may need to allocate additional resources to continue to enhance our information security measures and/or to investigate and remediate any security vulnerabilities. Cyber attacks and security breaches may also persist undetected over extended periods of time and may not be mitigated in a timely manner to minimize the impact of a cyber attacks or security breach. Any significant cybersecurity incident, involving Brink's or its third-party service providers, could damage our reputation, expose us to the risks of litigation and liability, disrupt our business or otherwise have a material adverse effect on our business, financial condition, results of operations and cash flows. Although the Company maintains cybersecurity insurance, the Company's insurance may not be adequate to cover all losses that may be incurred in the event of a significant disruption or failure of its information technology systems.
As a global company we must adhere to applicable laws and regulations in numerous regions regarding data privacy, data protection, and data security. Privacy and data protection laws vary between countries and are subject to interpretation, which may create inconsistent or conflicting requirements. For example, the European Union's General Data Protection Regulation ("GDPR"), which became effective in May 2018, greatly increased the jurisdictional reach of European Union law. Since its inception, more geographies in which we operate have enacted laws similar to GDPR, including several countries in Asia and states in the U.S. For example, the California Consumer Privacy Act (the "CCPA"), which became effective on January 1, 2020, imposes stringent data privacy and data protection requirements regarding the personal information of California residents, and provides for penalties for noncompliance, as well as a private right of action from individuals for certain security breaches. Additionally, the California Privacy Rights Act, which became effective on January 1, 2023, significantly modified the CCPA and has resulted in further uncertainty. The GDPR and these other privacy and data protection laws impose requirements related to the handling of personal data, mandates public disclosure of certain data breaches, and provides for substantial penalties for non-compliance. Our efforts to comply with GDPR and other privacy and data protection laws may impose significant costs that are likely to increase over time. A breach of the GDPR or other such data protection regulations could result in regulatory investigations, reputational damages, fines and sanctions, orders to cease or change our processing of our data, enforcement notices, or assessment notices (for a compulsory audit). We could incur substantial penalties or be subject to litigation related to violation of existing or future data privacy laws, including representative actions and other class action-type litigation, which could amount to significant compensation or damages liabilities, as well as associated costs, diversion of internal resources, and reputational harm, all of which may have a material adverse effect on our business, financial condition, results of operations and cash flows.