Global information technology security threats and targeted computer crime (e.g., computer hacking, malware, phishing and spamming attacks against online networking platforms) are increasing in frequency and sophistication and pose a risk to the security of our systems and networks and the confidentiality, availability and integrity of our data and communications. While we attempt to mitigate these risks through numerous measures, including implementation of standard cybersecurity controls, employee training and testing, comprehensive monitoring of our networks and systems, and maintenance of backup and protective systems, we cannot guarantee that these efforts will always be successful. Further, although we do not believe we have experienced a material information security breach in the last three years, and we have incurred no material fines, settlement costs or other material expenses related to information security breaches, if we were to experience such a breach it could adversely affect our reputation and result in litigation, regulatory action, liability for fines, penalties and related expenses, and costs of implementing additional data protection procedures. In addition, even though we generally do not conduct business directly with retail or individual customers or consumers we must comply with increasingly complex and rigorous regulatory standards enacted to protect business and personal data in the U.S. and elsewhere. Compliance with data privacy laws and regulations increases operational complexity, and failure to comply with legal or regulatory standards could subject us to fines and penalties, as well as legal and reputational risks, including proceedings against us by governmental entities or others. Although we maintain insurance coverage for data privacy risks, we cannot guarantee that our coverage will be adequate for all costs or losses incurred.
We have many information technology systems that are important to the operation of our businesses, some of which are managed by third parties. These systems are used to obtain, process, transmit and store electronic information and to manage or support a variety of integral business processes and activities. Our primary and backup computer systems are vulnerable to damage, disruptions or shutdowns during the process of upgrading or replacing software, databases or components and from power outages, computer and telecommunication failures, security breaches, natural disasters and errors by employees. Any failure in the operation of our information technology systems could adversely affect our businesses or operating results. Although losses arising from some of these issues may be covered by information security insurance, we cannot guarantee that our coverage will be adequate for all costs or losses incurred.
See Item 1C, Cybersecurity, for information on our cybersecurity risk management, strategy and governance.