We and our business partners maintain significant amounts of electronic data in locations around the world. This data relates to all aspects of our business, including current and future offerings, features and services under development, and customer, supplier, partner and personnel data. The secure maintenance and transmission of such data is critical to our operations. Our information technology and other systems that maintain and transmit this information may be compromised by cyberattacks or malicious third-party penetration of our network security or impacted by intentional or unintentional actions (such as tampering) or inaction by our personnel or others. As a result, our customers', suppliers', partners' and/or personnel's data and funds may be lost, disclosed, corrupted, accessed or taken without such individuals' consent. We provide confidential and proprietary data to our third-party partners and service providers when it is reasonably necessary to conduct our business. While we obtain assurances from those parties that they have systems and processes in place to protect such data, and where applicable, that they will take steps to assure the protections of such data by third parties, nonetheless those partners and service providers and their technology and systems are also subject to the same risks noted above. To help protect customer accounts, we offer, and in some jurisdictions we require, multi-factor authentication and strong authentication. Given the data intensive nature of our business, we have experienced attempts to breach our systems and other similar incidents in the past and expect to experience additional attempts in the future. We have been and will likely continue to be subject to attempts to gain unauthorized access to customer accounts through our information systems or those we develop for our business partners, including through phishing attacks, exploiting software vulnerabilities or credential stuffing by malicious actors who may try to deploy viruses, worms or other malicious programs. To date, these attacks have not had a material impact on our operations or financial results, but we cannot assure you that they will not have a material impact in the future, including by overloading our systems and network and preventing our legitimate customers from accessing our offerings.
We rely on third-party encryption and authentication technology in an effort to securely store, limit access to, and transmit confidential and sensitive information. Advances in computer capabilities, new technological discoveries or other developments such as artificial intelligence may result in failures of this technology to protect transaction data or other confidential and sensitive information from being compromised. In addition, websites are often attacked through compromised credentials, including those obtained through phishing and credential stuffing. Our security measures, and those of our third-party providers, may not detect, prevent or hinder all attempts to breach our systems, denial-of-service attacks, viruses, malicious software, break-ins, phishing attacks, social engineering, security breaches or other attacks and similar disruptions that may jeopardize the security of information stored in or transmitted by our websites, apps, networks and systems or that we or such third parties otherwise maintain, including payment card systems, which may subject us to fines or higher transaction fees, or limit or terminate our access to certain payment methods. We and such third parties may not anticipate, detect or prevent all types of attacks until after they have already been launched. Further, techniques used to obtain unauthorized access to, or sabotage, systems change frequently and may not be known until launched against us or our third-party service providers.
Security breaches can also occur as a result of non-technical issues, including intentional or inadvertent breaches by our personnel or by third parties or failures to detect or adequately respond to breaches of our security measures. These risks increase over time as the complexity and number of technical systems and applications we use increases. Breaches of our security measures or those of our third-party providers, or cybersecurity incidents could result in: unauthorized access to our sites, apps, networks and systems; unauthorized access to and misappropriation of customer or personnel data, including personally identifiable information, or our or third parties' other confidential or proprietary information; viruses, worms, spyware or other malware being served from our sites, apps, networks or systems; deletion or modification of content or the display of unauthorized content on our sites or apps; interruption, disruption or malfunction of operations; costs relating to breach remediation, deployment of additional personnel and protection technologies, response to governmental investigations and media inquiries and coverage; engagement of third-party experts and consultants; or litigation, regulatory action and other potential liabilities. The online gaming industry continuously experiences social engineering, phishing, malware, ransomware and similar attacks and threats of denial-of-service attacks, none of which to date have been material to our business; however, such attacks could in the future have a material adverse effect on our operations. For instance, although we were unaffected, in late 2022, some of our competitors disclosed that their systems were subject to successful attempts by one or more individuals who ultimately gained unauthorized access to customer accounts and withdrew funds from the customers' accounts, and in 2023 several land-based casinos experienced ransomware attacks, some of which significantly impacted their ability to operate effectively. If a material security breach were to occur, our reputation and brands could be damaged, our business may suffer, we may have to expend significant capital and other resources to alleviate problems caused by such breaches, and we could be exposed to a risk of loss, litigation or regulatory action and possible liability. We cannot guarantee that recovery protocols and backup systems will be sufficient to prevent data loss. Actual or anticipated attacks may cause us to incur increased costs, including costs to deploy additional personnel and protection technologies, implement policies, procedures and response plans, train employees and engage third-party experts and consultants.
Users may experience password or other compromises, whether related to our system or third-party systems, that enable an unauthorized party to obtain a customer's password to access or obtain that customer's transaction data or personal information, resulting in the perception that our systems are insecure. Any compromise or breach of our security measures, or those of our third-party providers, could violate applicable privacy, data protection, data security, network and information systems security and other laws and cause significant legal and financial exposure, adverse publicity and a loss of confidence in our security measures, which could have a material adverse effect on our business, financial condition, results of operations and prospects. We continue to devote significant resources to protect against security breaches, and we may need to in the future to address problems caused by breaches, including notifying affected customers, authorities and regulatory bodies, investigating the matter, and responding to any resulting litigation or regulatory investigations or action, which in turn, diverts resources from growing and expanding our business.
Damage and claims arising from a breach may not be completely covered by our applicable insurance, if at all, or may exceed the amount of any insurance available.