We rely on information technology networks and systems, including systems of third parties and the Internet, to process, transmit and store electronic information, and manage or support a variety of business processes, including operational and financial transactions and records, personal identifying information, payroll data and workforce scheduling information. We purchase some of our information technology from vendors, on whom our systems depend. We rely on commercially available systems, software, tools and monitoring to provide security for the processing, transmission and storage of Company and customer information. Although we have taken steps to protect the security of our information systems and the data maintained in those systems, no such measures can eliminate the possibility of the systems' improper functioning or the improper access or disclosure of confidential or personally identifiable information such as in the event of cyber-attacks. Security breaches, whether through physical or electronic break-ins, computer viruses, ransomware, impersonation of authorized users, attacks by hackers or other means, can create system disruptions or shutdowns or the unauthorized disclosure of confidential information. Additionally, outside parties frequently attempt to fraudulently induce employees, suppliers or customers to disclose sensitive information or take other actions, including making fraudulent payments or downloading malware, by using "spoofing" and "phishing" emails or other types of attacks. Our employees have been and likely will continue to be targeted by such fraudulent activities. Outside parties may also subject us to distributed denial of services attacks or introduce viruses or other malware through "trojan horse" programs to our users' computers in order to gain access to our systems and the data stored therein. Because the techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently and continuously become more sophisticated, often are not recognized until launched against a target and may be difficult to detect for a long time, we may be unable to anticipate these techniques or to implement adequate preventive or detective measures.
When Company, personal or otherwise protected information is improperly accessed, tampered with or distributed, we face significant financial exposure, including incurring significant costs to remediate possible injury to the affected parties. We may also be subject to sanctions and civil or criminal penalties if we are found to be in violation of the privacy or security rules under federal, state, or international laws protecting confidential information. Any failure to maintain proper functionality and security of our information systems could results in the loss of trade secrets or other proprietary or competitively sensitive information, compromise personally identifiable information regarding customers or employees, interrupt our operations, damage our reputation, subject us to liability claims or regulatory penalties. The costs associated with maintaining robust information security mechanisms and controls are also increasing and are likely to increase further in the future. We continuously seek to maintain a robust program of information security and controls, but the impact of a material information technology event could have a material adverse effect on our competitive position, reputation, results of operations, financial condition and cash flows.