Our business, like that of most retailers, involves the collection, use, retention, management, transmission, and deletion of personal information (including identifiers, localization, internet activity, preferences, and payment information) from our customers, associates, job applicants, and business partners, as well as confidential Company information. We also work with third-party service providers that provide technology, systems and services that we use in connection with the handling of information. Our information systems, and those of our third-party service providers, are vulnerable to continually evolving data protection and cybersecurity risks. Unauthorized parties have in the past gained access, and will continue to attempt to gain access, to these systems and data through fraud or other means of deceiving or coercing our associates or third-party service providers, which could jeopardize the confidentiality, integrity, or availability of such information systems or our information. Hardware, software or applications we develop or obtain from third parties may contain exploitable vulnerabilities, bugs, or defects in design, maintenance or manufacture or other problems that could unexpectedly compromise information security. We have experienced and continue to face the ongoing risk of exploitation of our software providers and our software development and implementation process, including from coding and process vulnerabilities and the installation of so-called back doors that provide unauthorized access to systems and data. The increased use of a remote workforce has also expanded the possible attack surface areas. In addition, the risk of cyber-attacks has increased in connection with geopolitical conflicts and ongoing trade and diplomatic tensions. In light of the conflicts in Europe and the Middle East and other geopolitical events, nation-state actors or their supporters may launch retaliatory cyber-attacks, and may attempt to cause supply chain and other third-party service provider disruptions, or take other geopolitically-motivated retaliatory actions that may disrupt our business operations, result in data compromise, or both. Nation-state actors have in the past carried out, and may in the future carry out, cyber-attacks to achieve their aims and goals, which may include espionage, monetary gain, disruption, and destruction. To achieve their objectives, nation-state actors and other cyber criminals have used and may continue to use numerous attack vectors and methods, including use of stolen passwords, social engineering, phishing, smishing, vishing, identity spoofing, ransomware or other disruptive and destructive malware, supply chain compromises, and man-in-the-middle and denial of service attacks. The methods used to obtain unauthorized access, disable or degrade service, or sabotage systems are constantly changing and evolving, increasing in frequency and sophistication, and may be difficult to anticipate or detect for long periods of time.
The ever-evolving cybersecurity threat landscape means that we and our third-party service providers and business partners must continually evaluate and adapt our respective systems and processes and overall security environment, as well as those of companies we or they acquire. There is no guarantee that the measures we take will be adequate to safeguard against all threats, including vulnerabilities, data security breaches, system compromises or misuses of data. As we have experienced in the past, any significant compromise or breach of our data security, whether external or internal, or misuse of customer, associate, job applicant, business partner, or Company data, could result in significant costs, including costs to investigate and remediate, as well as lost sales, fines, lawsuits, regulatory investigations, and damage to our reputation. Because the techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently and may not immediately produce signs of anomalous activity or compromise, we may be unable to anticipate these techniques or to implement adequate preventative measures. Additionally, as we have experienced in the past, we or our third-party service providers may not discover any security breach, vulnerability or compromise of information for a significant period of time after the occurrence of a security incident. Furthermore, our cyber insurance coverage may not be adequate for liabilities or costs actually incurred, and we cannot be certain that insurance will continue to be available to us on economically reasonable terms, or at all, or that any insurer will not deny coverage of a future claim.
Data governance failures can also adversely affect our reputation and business. Our business depends on our customers', associates', job applicants' and business partners' willingness to entrust us with their personal information. Events that adversely affect that trust, including inadequate disclosure to our customers, associates, job applicants, or business partners of our uses of their information or failing to keep our information technology systems and our customers', associates', job applicants' and business partners' personal information secure from significant attack, theft, damage, loss or unauthorized disclosure or access, whether as a result of our action or inaction (including human error or malfeasance) or that of our service providers or other third parties, could adversely affect our brand and harm our reputation.
The regulatory environment related to data privacy and cybersecurity is constantly changing, with new and increasingly rigorous requirements applicable to our business. The implementation of these requirements has also become more complex. Maintaining our adherence to evolving data privacy and cybersecurity regulatory requirements, including state privacy laws, requires significant effort and cost, requires changes to our business practices, and may limit our ability to collect and use certain data to support the customer experience. In addition, many regulators have indicated an intention to take more aggressive enforcement actions regarding data privacy and cybersecurity matters, and private litigation resulting from such matters is increasing and resulting in progressively larger judgments and settlements. Failure to comply with applicable requirements could subject us to fines, sanctions, governmental investigations, or lawsuits, which could lead to negative publicity and reputational harm, and may cause customers to lose confidence in the effectiveness of our cybersecurity measures, data privacy practices, or our business more generally.