We, like most companies, have experienced and may in the future be subject to information technology system failures and network disruptions caused by delays or disruptions due to system updates, natural disasters, malicious attacks, accidents, power disruptions, telecommunications failures, acts of terrorism or war, computer viruses, physical or electronic break-ins, or similar events or disruptions. We rely upon information technology systems and infrastructure, including support provided by third parties, to support our business, our products and our customers.
For example, we routinely rely on systems for manufacturing, customer and supplier orders, shipping, regulatory compliance, finance, company operations, research and development and various other matters, as well as information technology systems and infrastructure to aid us in the collection, use, storage and transfer and other processing of data including confidential, business, financial, and personal information. Security threats, including cyber attacks, security breaches, power outages, system failures, malware, ransomware, worms, Trojan horses, spyware, adware, rogue software and other attacks, are becoming increasingly sophisticated, frequent and adaptive, which increases the difficulty of detecting and successfully defending against them. In addition, a greater number of our employees are working remotely, which (among other things) could expose us to greater risks related to cybersecurity and our information technology systems. Third-party systems that we rely upon could also become vulnerable to the same security threats and may contain defects in design or manufacture or other problems that could result in system disruption or compromise the information security of our own systems. Such security threats, depending on their nature and scope, could potentially result in the misappropriation, destruction, corruption or unavailability of critical data and confidential or proprietary information (ours or that of third parties) and the disruption of our business operations or the business operations of third parties on which we rely. The potential consequences of a material cybersecurity incident and its effects include financial loss, business disruption, reputational damage, litigation or regulatory action, theft of intellectual property, fines levied by government agencies, diminution in the value of our investments in research, development and engineering, and increased cybersecurity protection and remediation costs due to the increasing sophistication and proliferation of threats, which in turn could adversely affect our competitiveness and results of operations. While we carry cyber insurance, it cannot be certain that coverage will be adequate for liabilities actually incurred, that insurance will continue to be available to us on economically reasonable terms, or at all, or that any insurer will not deny coverage as to any future claim.
We continue to pursue additional investment, engagement of third-party experts and consultants, improvements in the security of our facilities and systems (including through upgrades to our security and information technology systems), and training for employees. We also regularly assess the continued appropriateness of relevant insurance coverage and the strength of our controls and procedures to monitor, mitigate and respond appropriately to these threats. Our businesses may implement digital systems and technologies, enterprise resource planning systems or new applications to replace outdated systems and to operate more efficiently, but we may not be able to successfully implement these projects without experiencing difficulties, expected benefits might not be realized or the costs of implementation might outweigh the benefits realized. We believe we devote appropriate resources to network security, data encryption, and other security measures to protect our systems and data, but these security measures cannot provide absolute security. Actual or perceived breaches and breakdowns affecting our information technology systems or protected data, including as a result of external actors or employee error or malfeasance, could have an adverse effect on our business strategy, results of operations, cash flows, financial condition, reputation and consumer relationships.
In addition, the domestic and international regulatory environment related to solicitation, information security, collection and data privacy is increasingly rigorous and complex, with new and rapidly changing requirements applicable to our business, which are sometimes contradictory, and which may require changes to our business practices. Compliance with these requirements, including the European Union's General Data Protection Regulation, the California Consumer Privacy Act, the California Privacy Rights Act and other international and domestic regulations, has resulted and could continue to result in additional costs and complexity to our business operations. Any significant liabilities associated with violations of any related laws or regulations could also have an adverse effect on our business, results of operations, cash flows, financial condition, reputation and consumer relationships.