Cybersecurity
Our industry has become increasingly supported by and dependent on digital technologies. Our strategy of operating large, long-lived, geographically diverse assets has been increasingly dependent on our ability to become fully integrated and highly automated. Many of our business and operational processes are heavily dependent on traditional and emerging technology systems to conduct day-to-day operations, improve safety and efficiency, and lower costs.
As our dependence on information systems, including those of our third-party service providers and vendors, grows, we have become more vulnerable to an increasing threat of continually evolving cybersecurity risks. In recent years,cybersecurity events have increased in frequency and magnitude and the methods used to gain unauthorized access change frequently, making it increasingly difficult for us to prevent cybersecurity incidents or detect and remediate incidents in a timely and effective manner. Attacks have included and may include, but are not limited to, installation of malicious software, phishing, ransomware, social engineering tactics and credential attacks, insider threats, denial of service attacks, unauthorized access to data and other advanced and sophisticated cybersecurity breaches and threats, including those that increasingly target critical operational technologies and process control networks and those that are increasingly using artificial intelligence (AI) and quantum computing. Such attacks may be perpetrated by a variety of bad actors, some of which may reside in jurisdictions where law enforcement measures to address such attacks are ineffective.
We have experienced targeted and non-targeted cybersecurity events in the past and may experience them in the future. In August 2023, we determined that we were subject to a cybersecurity incident that affected certain of our information systems. We performed an investigation of the incident and its associated impact and incurred costs to remediate, which were not material. We cannot guarantee that events of a similar nature, with potentially greater exposure, will not occur in the future.
Cybersecurity threats could subject us to manipulation or improper use of our systems and networks, production downtimes, loss of sales, communication interruption or other disruptions and delays to our operations or to the transportation of products or infrastructure utilized by our operations, unauthorized release of proprietary, commercially sensitive, confidential or otherwise protected information, a misappropriation or loss of funds, the corruption of data, significant health and safety consequences, physical destruction of assets, environmental damage, loss of intellectual property, fines, penalties, litigation, regulatory or governmental investigation, liability under or termination of our contracts with third parties, damage to our reputation or financial losses from remedial actions, any of which could have a material adverse effect on our cash flows, results of operations and financial condition, and which in addition could adversely impact the effectiveness of our internal control over financial reporting. We do not maintain cyber risk insurance, and the lack of insurance coverage could adversely affect our cash flows and overall profitability in the event of a material cybersecurity incident.
While the August 2023 cybersecurity incident and other cybersecurity events have not had a material impact on us, we can provide no assurance that we will not experience any such impact or additional interruptions to our operations in the future. Given the unpredictability of the timing and the evolving nature and scope of information and operational technology system disruptions, the various procedures and controls we use to monitor and protect against cybersecurity threats and to mitigate potential risks arising from such threats have not been effective in some instances and may not be sufficient in preventing future cybersecurity incidents. Further, as cybersecurity threats continue to evolve, we may be required to expend significant additional resources to continue to modify or enhance our protective measures or to investigate and remediate vulnerabilities to cybersecurity threats.
We could also be adversely affected by system or network disruptions if new or upgraded information or operational technology systems are defective, not installed properly or not properly integrated into our operations. System modification failures could have a material adverse effect on our business, financial position and results of operations and could, if not successfully implemented, adversely impact the effectiveness of our internal control over financial reporting.
Further, we increasingly depend on our information technology infrastructure for electronic communications among our operations, personnel, customers and suppliers around the world, including as a result of remote working and flexible working arrangements. These information technology systems, some of which are managed by third parties that we do not control, may be susceptible to damage, disruptions or shutdowns because of failures during the process of upgrading or replacing software, databases or components thereof, cutover activities in our restructuring and simplification initiatives, power outages, hardware failures, telecommunication failures, human errors, catastrophic events or other problems. Refer to Item 1C. "Cybersecurity" for further information on our cybersecurity governance, risk management and strategy.
Artificial Intelligence and Other New Technologies
Information and operational technology systems continue to evolve and, in order to remain competitive, we must implement new technologies in a timely, cost-effective and efficient manner. For example, we may develop and apply AI in decision support systems, material characterization, equipment reliability, mineral extraction and remote/autonomous operation. These applications may become important in our operations over time. We also are advancing a series of initiatives to incorporate new applications, technologies and data analytics to our leaching processes. For additional information on our leaching innovation initiatives, see MD&A. Our failure to successfully implement new technologies, including AI, may adversely affect our competitiveness and, consequently, our results of operations. In addition, we may utilize AI and other new technologies in software provided by third parties to enhance our capabilities in producing copper, improving business processes and responding to threats to our technology platforms. The use of AI may increase our exposure to cybersecurity risks and additional risks relating to the protection of data, including increased exposure of confidential or otherwise protected information to unauthorized recipients, which could result in liability under or termination of our contracts with third parties, misuse of our intellectual property or other unintended consequences.