We and our third-party managers and franchisors rely on information technology networks and systems, including the internet, to access, process, transmit and store electronic customer and financial information. The systems operated by our third-party managers and franchisors require the collection and retention of large volumes of our hotel guests' personally identifiable information, including credit card numbers. Our third-party managers and franchisors may store and process such proprietary and customer information on systems located at our hotels and other hotels that they operate and manage, their corporate locations and at third-party owned facilities, including, for example, in a third-party hosted cloud environment. In addition to the systems operated by our third-party managers and franchisors, we have our own corporate technologies and systems to support our corporate business.
Certain of our third-party managers and their service providers have been subject to, and previously publicly released statements disclosing, cyber-attacks and/or unauthorized access to their guest reservation, point-of-sale systems and other sensitive databases, some of which have or may have impacted our hotels and guests who have used our hotels' services or amenities. The risk of a security breach or disruption, particularly through cyber-attack or cyber intrusion, including by computer hackers, nation-state affiliated actors and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world has increased. Our information network and systems and the information networks and systems used by our third-party managers and franchisors can be vulnerable to threats such as: system, network or internet failures; computer hacking or business disruption, including through network- and email-based attacks; cyber-terrorism; viruses, worms, ransomware or other malicious software programs; social engineering; and employee error, negligence or fraud. Any compromise of the function, security and availability of our network and systems or the networks and systems of our third-party managers and franchisors could result in disruptions to operations, misappropriated or compromised confidential hotel or hotel guest information, systems disruptions, the shutdown of our hotels, exploited security vulnerability of our respective networks, delayed sales or bookings, lost guest reservations, damage to our reputation or the reputations of our third-party managers and franchisors, increased costs and lower margins. The costs to us to eliminate or alleviate cyber or other security problems could be significant, and our efforts to address these problems may not be successful and could result in interruptions, delays, cessation of service and loss of existing or potential business at our hotels. Any of these events could adversely affect our financial results, common stock price and reputation, lead to unauthorized disclosure of confidential information, result in delayed or misstated financial reports, monetary losses or regulatory penalties and subject us to potential litigation and liability.
Portions of our information technology infrastructure or that of our third-party managers and franchisors also may experience interruptions, delays or cessations of service or produce errors in connection with systems installation, integration or migration work that takes place from time to time. We or our third-party managers and franchisors may not be successful in implementing new systems and transitioning data, or may procure hardware or operating system software and applications from third-party suppliers that may contain defects in design or manufacture, which could cause business disruptions and be more expensive, time consuming and resource-intensive. Such disruptions could adversely impact the ability of our third-party managers and franchisors to fulfill reservations for guestrooms and other services offered at our hotels or to deliver to us timely and accurate financial information.
Although we have taken steps to protect the security of our information systems and the data maintained in these systems, there can be no assurance that the security measures we have taken will prevent failures, inadequacies, or interruptions in system services, or that system security will not be breached through physical or electronic break-ins, spoofed emails, phishing attacks, computer viruses, cyber extortionists or attacks by hackers. In addition, we rely on the security systems of our third-party managers and franchisors to protect proprietary and customer information from these threats. We and our third-party managers and operators may be unable to identify, investigate or remediate cyber events or incidents because attackers are increasingly using techniques and tools designed to avoid detection, to circumvent security controls, and to remove or obfuscate forensic evidence.
Our third-party managers and franchisors carry cyber insurance policies to protect and offset a portion of the potential costs that may be incurred from a security breach. Additionally, we have a cyber insurance policy to cover breaches of our corporate infrastructure and systems and to provide supplemental coverage above the coverage carried by our third-party managers and franchisors. We cannot guarantee that such coverage will continue to be available at reasonable coverage levels, at reasonable rates or at reasonable deductible levels. Our policy is subject to limits and sub-limits for certain types of claims, and we do not expect that this policy will cover all of the losses that we could experience from these exposures. Despite various precautionary steps to protect our hotels from losses resulting from cyber-attacks, however, any occurrence of a cyber-attack could still result in losses at our properties, which could affect our results of operations.