In the ordinary course of our business, we collect, store, transmit and otherwise process proprietary, confidential and sensitive data, including by using our internal systems, networks and servers, which may include intellectual property, our proprietary business information and that of our customers, suppliers and business partners and sales data, which may, on occasion, include personally identifiable information. Additionally, we design and sell products that allow our customers to store their data. We also rely on third-party service providers and technologies to operate our business and elements of our infrastructure and our business operations depend, in part, on the success of these third parties' own cybersecurity measures. The security of our networks and those of our third-party service providers, and the intrusion protection features of our products are critical to our operations and business strategy.
Cyberattacks, malicious internet-based activity and online and offline fraud are prevalent and continue to increase. We have been, and may in the future be, subject to attempts to gain unauthorized access to our systems. For example, in June 2024, we were the subject of a security incident involving a third party that temporarily gained unauthorized access to a single Snowflake data analytics workspace. The workspace did not include compromising information such as passwords for customer systems, or any of the data that is stored on the customer systems, but did contain telemetry information that we use to provide proactive customer support services. The threats to our information systems and information and those of third parties on whom we rely, include traditional computer "hackers," social engineering schemes (for example, attempts to induce fraudulent invoice payments or divert money from us), phishing attacks, faulty password management, software bugs, malicious code (such as viruses and worms), malware installation, personnel misconduct or error, theft, denial-of-service attacks (such as credential stuffing), advanced persistent threat intrusions, server malfunction, software or hardware failures, loss of data or other computer assets, adware, as well as attacks from nation-state and nation-state supported actors. These threats are also becoming increasingly difficult to detect. AI technologies may also be used in connection with certain attacks, resulting in heightened risks of security breaches and incidents. Additionally, ransomware attacks, including those from organized criminal threat actors, nation-states and nation-state supported actors, are becoming increasingly prevalent and severe and could lead to significant interruptions, delays, or outages in our operations, disruptions in our services, loss of data, loss of income, significant extra expense to restore data or systems, reputational loss and the diversion of funds. To alleviate the financial, operational and reputational impact of a ransomware attack, it may be preferable to make extortion payments, but we may be unwilling or unable to do so (including, for example, if applicable laws or regulations prohibit such payments). Similarly, supply chain attacks have increased in frequency and severity, and there have been high-profile incidents of third-party service providers causing widespread disruptions to their customers' infrastructure due to errors in their SaaS offerings. We cannot guarantee that third parties and infrastructure in our supply chain have not been compromised or that they do not contain exploitable defects or bugs that could result in a breach of or disruption to our Platform, systems and network or the systems and networks of third parties that support us and our business. Moreover, we may have limited remedies against third-party providers in the event of a service disruption.
We devote significant resources to network security, authentication technologies, data encryption, employee training and other security measures designed to protect our systems and data, including to secure the transmission and storage of data and prevent third-party access to our data or accounts, but there can be no assurance that our security measures or those of our service providers, partners and other third parties upon whom we rely will be effective in protecting against a security incident or the material adverse impacts that may arise from a security incident. Notwithstanding our efforts, we may fail to detect the existence of security breaches or incidents, Malicious third parties might use techniques that we are unable to defend against to compromise and infiltrate our systems. The techniques used by malicious actors change frequently and are often not recognized until launched against a target. Any destructive or intrusive breach of our internal systems could result in the information stored on our networks, including, without limitation, source code for our products and services or the networks and systems of third parties upon whom we rely being accessed, publicly disclosed, lost or stolen. Additionally, an effective attack on our Platform could disrupt the proper functioning of our Platform, allow unauthorized access to sensitive, proprietary or confidential information of ours or our customers, disrupt or temporarily interrupt our and our customers' operations or cause other destructive outcomes, including the theft of information sufficient to engage in fraudulent transactions.
The risk that these types of events could seriously harm our business is likely to increase as we expand our network of channel partners, resellers and authorized service providers and operate in more countries. The economic costs to us to eliminate or alleviate cybersecurity risks and vulnerabilities could be significant and may be difficult to anticipate or measure because the damage may differ based on the identity and motive of the programmer or hacker, which are often difficult to identify.
If any of these types of security incidents occurs and we are unable to protect our Platform, systems and data, or if we are perceived to have such a security incident, our relationships with our business partners and customers could be materially damaged, our reputation and brand could be materially harmed, use of our Platform could decrease and we could be exposed to a risk of loss or litigation, including, without limitation, class action litigation, and other possible liabilities. A security incident could also result in government enforcement actions that could include investigations, fines, penalties, audits and inspections, additional reporting requirements and/or oversight, temporary or permanent bans on all or some processing of personal information.
Moreover, applicable data protection laws, contracts, policies and other data protection obligations may require us to notify relevant stakeholders of security incidents, including affected individuals, customers, regulators, and credit reporting agencies. Such disclosures are costly and the disclosures or the failure to comply with such requirements could lead to material adverse impacts such as negative publicity, loss of customer confidence in our services or security measures, investigations and private or government claims. Security incidents that impact our information technology systems could also result in breaches of our contracts (some of which may not have liability limitations and/or require us to indemnify affected parties) and could lead to litigation with customers, partners or other relevant stakeholders. These proceedings could force us to spend money in defense or settlement, divert management's time and attention, increase our costs of doing business and adversely affect our reputation or otherwise adversely affect our business.