We rely on computer systems, hardware, software, technology infrastructure, and online sites and networks for both internal and external operations that are critical to our business (collectively, "IT Systems"). We own and manage some of these IT Systems but also rely on third parties for a range of IT Systems and related products and services. We and certain of our third-party providers collect, maintain, and process data about customers, associates, business partners, and others, including information about individuals-such as email addresses, mobile phone numbers, location information, delivery partners' license numbers, and Social Security numbers of delivery partners, consumer payment card information, and delivery partner bank account information-as well as proprietary information belonging to our business such as trade secrets (collectively, "Confidential Information").
Increased global cybersecurity vulnerabilities, threats, and sophisticated and targeted cyber-related attacks pose a risk to the security of our and our customers', partners', suppliers', and third-party service providers' respective products, IT Systems and the confidentiality, availability, and integrity of our Confidential Information. Although we attempt to mitigate these risks by employing a number of measures, we remain potentially vulnerable to additional known or unknown threats. For example, the recent global CrowdStrike outage resulted in interruptions to the availability and functionality of Microsoft applications throughout the Company, which we rely upon to perform a number of operations. Despite our efforts to protect our IT Systems and Confidential Information, we may be vulnerable to damage or interruption from (i) earthquakes, fires, floods, hurricanes, and other natural disasters; (ii) power loss, computer system failure, internet and telecommunications, or data network failure; (iii) diverse threat actors, such as state-sponsored organizations, opportunistic hackers, and hacktivists, as well as through diverse attack vectors, such as social engineering/ phishing, malware (including ransomware), computer viruses, misconfigurations, software "bugs," or glitches; or (iv) theft, misplaced or lost data, programming errors, associate errors, and/or malfeasance.
While we have procedures and technology in place to safeguard our Confidential Information, we may nevertheless be susceptible to electronic or physical computer break-ins, viruses, fraud, and other disruptions or security compromises involving the loss or unauthorized access of personal and proprietary information because technologies used to obtain unauthorized access to or sabotage systems are constantly evolving, change frequently, and generally are not recognized until they are launched against a target. Cyberattacks are expected to accelerate on a global basis in frequency and magnitude as threat actors are becoming increasingly sophisticated in using techniques and tools-including artificial intelligence-that circumvent security controls, evade detection, and remove forensic evidence. As a result, we may be unable to detect, investigate, remediate, or recover from future attacks or incidents, or to avoid a material adverse impact to our IT Systems, Confidential Information, or business.
Further, there can be no assurance that our cybersecurity risk management program and processes, including our policies, controls, or procedures, will be fully implemented, complied with or effective in protecting our IT Systems and Confidential Information. Remote and hybrid working arrangements at our Company (and at many third-party providers) also increase cybersecurity risks due to the challenges associated with managing remote computing assets and security vulnerabilities that are present in many non-corporate and home networks.
While historically not material to our operations or business (individually or in the aggregate), we have experienced cyber-attacks and other security incidents of varying degrees that have occurred from time to time. Further, we cannot guarantee that material incidents will not occur in the future. Any damage or significant disruption in the operation of our or our third-party providers' IT Systems to perform as expected, or any security breach of the IT Systems, could potentially lead to improper use of our IT Systems, unauthorized access, use, disclosure, loss, modification, or destruction of Confidential Information, information about our customers, associates, and other individuals, defective products, production downtimes, and operational disruptions. In addition, a cyber-related attack or other system disruption could result in other negative consequences, including damage to our reputation or competitiveness, a decrease in sales, costly and time-consuming remediation or increased protection actions, compliance and regulatory costs, fines, and penalties, litigation (including class actions), or regulatory action. Any or all of the foregoing could materially adversely affect our business, financial condition, and results of operations. Finally, we cannot guarantee that any costs and liabilities incurred in relation to an attack or incident will be covered by our existing insurance policies or that applicable insurance will be available to us in the future on economically reasonable terms or at all.
In addition, we and our third-party payment processing providers are subject to the Payment Card Industry Data Security Standard ("PCI-DSS"), issued by the Payment Card Industry Security Standards Council. PCI-DSS contains compliance guidelines and standards with regard to our security surrounding the physical administrative and technical storage, processing and transmission of individual cardholder data. By accepting debit cards for payment, we are also subject to compliance with American National Standards Institute data encryption standards and payment network security operating guidelines. If we or our service providers are unable to comply with PCI-DSS or to meet other payment card standards, this may result in the imposition of financial penalties, restrictions, or the allocation by the card brands of the costs of fraudulent charges to us, which could materially and adversely affect our business.