We rely on computer systems, telecommunications services, hardware, software, technology infrastructure and online sites and networks for both internal and external operations (collectively, "IT Systems") that are important to the operation of our business, some of which are managed by third parties. These third parties are typically under no obligation to renew agreements and there is no guarantee that we will be able to renew these agreements on commercially reasonable terms, or at all. These IT Systems are used to process, transmit and store electronic information related to our business operations, including confidential information such as trade secrets as well as Personal Information and other data about customers, employees, business partners and others (collectively, "Confidential Information").
We face numerous and evolving cybersecurity risks that threaten the confidentiality, integrity and availability of our IT Systems and Confidential Information. Any security incident, including those resulting from a cybersecurity attack, phishing attack or any unauthorized access, unauthorized usage, virus or similar breach or disruption could result in the loss or destruction of or unauthorized access to, or use, alteration, disclosure, or acquisition of, Confidential Information, damage to our reputation, litigation, regulatory investigations or other liabilities. Cybersecurity attacks are expected to accelerate on a global basis in frequency and magnitude, and the techniques and tools (including artificial intelligence) used to breach security safeguards, circumvent security controls, evade detection and remove forensic evidence are evolving rapidly. Additionally such attacks are of ever-increasing levels of sophistication and are made by groups and individuals with a wide range of motives and expertise, including organized criminal groups, hackers and "hacktivists," state-sponsored organizations, as well as through diverse attack vectors, such as social engineering/phishing, malware (including ransomware), malfeasance by insiders, human or technological error, malicious file attacks, viruses, worms, cross-site scripting, credential abuse, network penetration, denial of service attacks, and as a result of bugs, misconfigurations or exploited vulnerabilities in software or hardware. In particular, ransomware attacks, including those from organized criminal threat actors, nation-states, and nation-state supported actors, are becoming increasingly sophisticated, prevalent and severe, and can lead to significant interruptions in our operations, loss of data and income, reputational loss, diversion of funds, and may result in fines, litigation and unwanted media attention. Extortion payments may alleviate the negative impact of a ransomware attack, but we may be unwilling or unable to make such payments due to, for example, applicable laws or regulations prohibiting payments. Moreover, any failures in our IT Systems could affect our ability to operate our aircraft or otherwise conduct business.
In addition, we engage third party service providers to store and otherwise process some of our data, including Confidential Information. Our service providers may also be the targets of cybersecurity attacks, malicious software, phishing schemes, and fraud. Our ability to monitor our vendors and service providers' data security is limited, and, in any event, third parties may be able to circumvent those security measures, resulting in the unauthorized access to, misuse, acquisition, disclosure, loss, alteration, or destruction of our data, including our Confidential Information. Moreover, because we make extensive use of third party suppliers and service providers, successful cybersecurity attacks that disrupt or result in unauthorized access to third party IT Systems can materially impact our operations and financial results. As a result, we may not be able to address these threats proactively or implement adequate preventative measures, and we may be unable to promptly detect and address any such disruption and/or security incident, if at all. Additionally, remote and hybrid working arrangements at our company (and at many third party providers) also increase cybersecurity risks due to the challenges associated with managing remote computing assets and security vulnerabilities that are present in many non-corporate and home networks. Further, any integration of artificial intelligence in our or any third party's operations, products or services is expected to pose new or unknown cybersecurity risks and challenges. As a result, as threats related to cybersecurity develop and grow, we may also find it necessary to make further investments to protect our data and infrastructure, which may impact our results of operations.
Further, the costs to eliminate or address the foregoing security threats and vulnerabilities before or after a cybersecurity incident could be significant. Our remediation efforts may not be successful and could result in interruptions, delays or cessation of service, and loss of existing or potential suppliers or players. We maintain cybersecurity policies and procedures designed to manage risk to our IT Systems, and we continuously adapt our systems and processes to mitigate such threats, and plan to enhance our protections against such attacks. Nevertheless, in light of the complex and evolving nature of such incidents, there can also be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our IT Systems and Confidential Information, including where acquired entities are involved or being integrated. While to date no incidents have had a material impact on our operations or financial results, we cannot guarantee that material incidents will not occur in the future. We also do not maintain insurance policies covering losses relating to cybersecurity incidents, which may increase any potential harms that the business may suffer from a cybersecurity attack. As a result, we may be unable to cover all possible claims stemming from security incidents, cybersecurity attacks and other types of unlawful activity, or any resulting disruptions from such events, and we may suffer losses that could have a material adverse effect on our business.