In the ordinary course of our business, we may collect, store, use, transmit, disclose or otherwise process proprietary confidential and sensitive data, including personal information, intellectual property, and trade secrets, and we rely upon third parties (such as service providers) for data processing-related activities. We also rely on third parties for the operation of certain of our e-commerce websites, and do not control these service providers. As a result, we and the third parties upon which we rely face a variety of evolving threats, including but not limited to ransomware attacks, security breaches, cyber-attacks or other malicious activities by hackers, criminal groups, nation-states and nation-state-sponsored organizations and social-activist organizations, computer viruses or other malicious codes, unauthorized access, phishing attacks, or unauthorized uses, any of which may be irreversible and result in operational problems and security incidents. Given the nature of information collected and processed, the retail industry in particular has been the target of many cyber-attacks, and it is possible that an individual or group could defeat our security measures, or those of a third-party service provider. We have been and will continue to be a target of cyber-attacks, including phishing, and other attempts to breach, or gain unauthorized access to, our systems because of the visibility of our brand, making the secure maintenance of proprietary, confidential and sensitive data critical to our business and reputation. In the future, we may see an increase in the number of such attacks as we have shifted to a hybrid working model under which some employees will continue working remotely and accessing our technology infrastructure remotely.
Our work to integrate, secure and enhance these systems and related processes in our global operations is ongoing and we will continue to invest in these efforts. We may expend significant resources or modify our business activities to try to protect against security incidents. We cannot provide assurance, however, that the measures we take to secure and enhance these systems will be sufficient to prevent security incidents, cyber-attacks, system failures or data or information loss. Cyber-attacks, malicious internet-based activity and online and offline fraud are prevalent and continue to increase in frequency and magnitude. The techniques used to obtain unauthorized, improper or illegal access to our systems, our data or our customers' data, to disable or degrade service or to sabotage systems, including through the use of artificial intelligence, are constantly evolving, have become increasingly complex and sophisticated, may be difficult to detect quickly and often are not recognized until launched against a target, even if we take all reasonable precautions, including to the extent required by law. In addition to traditional computer "hackers," threat actors, personnel (such as through theft or misuse), sophisticated nation-states and nation-state supported actors and social-activist organizations now engage in attacks. Furthermore, our efforts to address undesirable activity on our platforms may also increase the risk of retaliatory attack.
We have and may continue to be subject to a variety of evolving threats, including but not limited to social engineering, such as phishing, malicious code (such as viruses and worms), malware (including as a result of advanced persistent threat intrusions), denial-of-service attacks, credential stuffing, personnel misconduct or error, supply-chain attacks, software bugs, server malfunctions and large-scale, complex automated attacks that can evade detection for long periods of time. Future or past business transactions (such as acquisitions or integrations) could expose us to additional cybersecurity risks and vulnerabilities, as our systems could be negatively affected by vulnerabilities present in acquired or integrated entities' systems and technologies. Ransomware attacks, including those perpetrated by organized criminal threat actors, nation-states and nation-state supported actors and social-activist organizations, are becoming increasingly prevalent and severe and can lead to significant interruptions in our operations, loss of data and income, reputational harm and diversion of funds. In addition, such incidents could result in unauthorized disclosure and misuse of material confidential information, including personal information. Extortion payments may alleviate the negative impact of a ransomware attack, but we may be unwilling or unable to make such payments due to, for example, applicable laws or regulations prohibiting such payments or beliefs that payment may not result in system restoration.
In addition to our own systems, we use third-party service providers to store, transmit and otherwise process information on our behalf, and our third-party service providers are subject to similar cybersecurity risks. Due to applicable laws and regulations or contractual obligations, we may be held responsible for any cybersecurity incident attributed to our service providers as they relate to the information we share with them or to which they are granted access. Although we generally contractually require these service providers to implement and maintain a standard of security (such as implementing reasonable measures) as well as incident response commitments, we cannot control third parties and cannot guarantee that a security breach will not occur in their systems or that we will receive timely information should an incident occur.
Our software or information technology systems, or that of third parties upon whom we rely to operate our business, may have material vulnerabilities and, despite our efforts to identify and remediate these vulnerabilities, our efforts may not be successful or we may experience delays in developing and deploying remedial measures designed to address any such identified vulnerabilities. Actual or perceived vulnerabilities or unauthorized access of our or our service providers' information technology systems or networks may result in the loss of confidential business and financial data, misappropriation of our consumers', users' or employees' personal information or a disruption of our business. Any of these outcomes could have a material adverse effect on our business, including unwanted media attention, impairment of our consumer and customer relationships, damage to our reputation, and the value of our brands, resulting in lost sales, fines, lawsuits (including class actions), government enforcement actions (for example, investigations, fines, penalties, audits and inspections) or significant legal and remediation expenses. We also may need to expend significant resources to protect against, respond to or redress problems caused by any unauthorized processing.