We are becoming increasingly dependent on our technology infrastructure and certain critical information systems which process, transmit and store electronic information, including information we use to safely and effectively operate our respective assets and businesses. These information systems include data network and telecommunications, internet access, our websites, and various computer hardware equipment and software applications, including those that are critical to the safe operation of our refineries and logistics assets. We have invested, and expect to continue to invest, significant time, manpower and capital in our technology infrastructure and information systems. These information systems are subject to damage or interruption from a number of potential sources including natural disasters, software viruses or other malware, power failures, cybersecurity threats to gain unauthorized access to sensitive information, cyber-attacks, which may render data systems unusable, and physical threats to the security of our facilities and infrastructure. Additionally, our business is highly dependent on financial, accounting and other data processing systems and other communications and information systems, including our enterprise resource planning tools. We process a large number of transactions on a daily basis and rely upon the proper functioning of computer systems. Furthermore, we rely on information systems across our respective operations, including the management of supply chain and various other processes and transactions. As a result, a disruption on any information systems at our refineries or logistics assets, may cause disruptions to our collective operations.
The potential for such security threats or system failures has subjected our operations to increased risks that could have a material adverse effect on our business. To the extent that these information systems are under our control, we have implemented measures such as virus protection software, emergency recovery processes and a formal disaster recovery plan to address the outlined risks. However, security measures for information systems cannot be guaranteed to be failsafe, and our formal disaster recovery plan and other implemented measures may not prevent delays or other complications that could arise from an information systems failure. If a key system were hacked or otherwise interfered with by an unauthorized user, or were to fail or experience unscheduled downtime for any reason, even if only for a short period, or any compromise of our data security or our inability to use or access these information systems at critical points in time, it could unfavorably impact the timely and efficient operation of our business, damage our reputation and subject us to additional costs and liabilities. The increase in companies and individuals working remotely has increased the frequency and scope of cyber-attacks and the risk of potential cybersecurity incidents, both deliberate attacks and unintentional events. While, to date, we have not had a significant cybersecurity breach or attack that had a material impact on our business or results of operations, if we were to be subject to a material successful cyber intrusion, it could result in remediation or service restoration costs, increased cyber protection costs, lost revenues, litigation or regulatory actions by governmental authorities, increased insurance premiums, reputational damage and damage to our competitiveness, financial condition, results of operations and cash flows.
Cyber-attacks against us or others in our industry could result in additional regulations, and U.S. government warnings have indicated that infrastructure assets, including pipelines, may be specifically targeted by certain groups. These attacks include, without limitation, malicious software, ransomware, attempts to gain unauthorized access to data, and other electronic security breaches. These attacks may be perpetrated by state-sponsored groups, "hacktivists", criminal organizations or private individuals (including employee malfeasance). Efforts by the federal government, including the Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure executive order, the issuance of new cybersecurity requirements for critical pipeline owners and operators issued by the Department of Homeland Security's Transportation Security Administration following a cyber-attack on a major petroleum pipeline in 2021, and other existing or future regulations could lead to increased regulatory compliance costs, insurance coverage cost or capital expenditures. We cannot predict the potential impact to our business or the energy industry resulting from additional regulations.
Further, our business interruption insurance may not compensate us adequately for losses that may occur. We do not carry insurance specifically for cybersecurity events; however, certain of our insurance policies may allow for coverage for a cyber-event resulting in ensuing property damage from an otherwise insured peril. If we were to incur a significant liability for which we were not fully insured, it could have a material adverse effect on our financial position, results of operations and cash flows. In addition, the proceeds of any such insurance may not be paid in a timely manner and may be insufficient if such an event were to occur.