Cybersecurity threats and incidents have been occurring globally at a more frequent and severe level and will likely continue to increase in frequency and severity in the future. As technological advances develop and our reliance on technology increases, our business is subject to risk from cybersecurity threats and incidents, including attempts to gain unauthorized access to our systems and networks, or those of our third-party vendors and service providers, the disruption of operations, the corruption of data or theft of confidential or personal information, and other cybersecurity incidents.
We use many information technology systems, some of which are managed or hosted by third parties, and manufacture connected products (including connected vehicles), some of which are managed by third parties, in operating our business. Those systems and products process potentially sensitive information, including intellectual property; proprietary business information of Polaris and our dealers, suppliers, and other business partners; and personal information of consumers and employees. Our information technology systems and connected products, including those managed or hosted by third parties, have been, and could be in the future vulnerable to breach, damage, disruption, or breakdown from various sources, including power loss, viruses, malware, ransomware, phishing, denial of service, and other cyber-attacks that may be random, targeted, or the result of misconduct or error by individuals with access to our systems. Although we monitor continually evolving cybersecurity threats, have implemented various measures designed to manage risks relating to these types of threats, and have invested in layers of data and information technology protection, these measures and the systems supporting them could prove to be inadequate and there can be no assurance that our efforts will prevent disruptions or breaches of our information technology systems, connected products, data and/or operations.
We have experienced cyber-attacks, as have third-parties who manage our information technology systems and other third-party suppliers and service providers, but to our knowledge, we have not experienced any material disruptions or breaches of our information technology systems, connected products, data or operations as a result of such cyber-attacks. We could, however, experience material disruptions or breaches in the future. Such disruptions or breaches of our information technology systems, connected products, data, or operations could adversely affect our business by resulting in, among other things: (i) disruption to our business operations; (ii) compromise or loss of the information processed by our information technology systems and connected products, such as intellectual property, confidential or proprietary information, or personal information; (iii) impact to the performance and/or safety of our connected products; (iv) damage to our reputation; (v) requirements to notify government authorities or affected individuals; and (vi) government enforcement, litigation or regulatory proceedings.
We could be required to make a significant investment to remedy, mitigate or remediate the effects of any failures, including, but not limited to, harm to our reputation, legal claims that we and/or our business partners (including third-party vendors and service providers) may be subjected to, regulatory or enforcement action arising out of applicable privacy and other laws, adverse publicity, or other events that may affect our business and financial performance.