We, Hyatt, Hilton, Wyndham, our third-party resort manager and other third-party service providers collect, use and retain large volumes of guest data, including credit card numbers and other personally identifiable information, for business, marketing and other purposes in our, Hyatt's, Hilton's, Wyndham's, our third-party resort manager's and other third-party service providers' various information technology systems, which enter, process, summarize and report such data. We also maintain personally identifiable information about our employees. We, Hyatt, Hilton, Wyndham, our third-party resort manager and other third-party service providers store and process such internal and guest data both at on-site facilities and at third-party owned facilities including, for example, in a third-party hosted cloud environment. The integrity and protection of our guest, employee and company data, as well as the continuous operation of our, Hyatt's, Hilton's, Wyndham's, our third-party resort manager's and other third-party service providers' systems, is critical to our business. Our guests and employees expect that we will adequately protect their personal information. The regulations and contractual obligations applicable to security and privacy are increasingly demanding, both in the United States and in other jurisdictions where we operate, and cyber-criminals have been recently targeting the lodging industry. We continue to develop and enhance controls and security measures to protect against the risk of theft, loss or fraudulent or unlawful use of guest, employee or company data, and we maintain an ongoing process to re-evaluate the adequacy of our controls and measures.
We employ a variety of measures to prevent, detect, and mitigate these threats, which include password protection, frequent mandatory password change events, multi-factor authentication, mandatory employee trainings, internal phishing testing, firewall detection systems, frequent backups, a redundant data system for core applications, vulnerability scanning and penetration testing. However, notwithstanding these efforts to protect against unauthorized access of our systems and sensitive information, because of the scope and complexity of their information technology structure, our reliance on third parties to support and protect our structure and data, and the constantly evolving cyber-threat landscape, our systems and those of third parties on which we rely are vulnerable to disruptions, failures, unauthorized access, cyber-terrorism, employee error, negligence, fraud or other misuse, and given the sophistication of hackers to gain unauthorized access to our sensitive information, we may not be able to detect the breach for long periods of time or at all. These or similar occurrences, whether accidental or intentional, could result in theft, unauthorized access or disclosure, loss, fraudulent or unlawful use of guest, employee or company data which could harm our reputation, result in an interruption or disruption of our services or result in a loss of business, as well as remedial and other costs, fines, investigations, enforcement actions, or lawsuits. As a result, future incidents could have a material adverse impact on us, including our business, our financial condition, liquidity and results of operations and prospects. As of December 31, 2022, we have not had any material incidences involving cybersecurity attacks.