Our business involves the storage and transmission of numerous classes of sensitive and/or confidential information and intellectual property, including guests' personal information, private information about employees and financial and strategic information about the Company and our business.
We have experienced and continue to experience cybersecurity threats and vulnerabilities in our systems and those of our third party providers, including cyber-attacks targeting our information technology systems and networks, which could result in a loss of sensitive business or customer information, systems interruption or the disruption of our operations.
Further, implementing our strategy to pursue new initiatives that improve our operations and cost structure will result in a larger technological presence and corresponding exposure to cybersecurity risk. Failure to adequately assess and identify cybersecurity risks associated with new initiatives would increase our vulnerability to such risks.
Due to the increased remote workforce, we must increasingly rely on information technology systems that are outside our direct control. These systems are potentially vulnerable to cyber-based attacks and security breaches. In addition, cyber criminals are increasing their attacks on individual employees, utilizing interest in pandemic-related information to increase business email compromise scams designed to trick victims into transferring sensitive data or funds, or steal credentials that compromise information systems.
Even if we are fully compliant with legal standards and contractual or other requirements, we still may not be able to prevent security breaches involving sensitive data. We have, and require, certain of our third party service providers to have, programs in place to detect, contain and respond to data security incidents. However, the actions and controls we have implemented and continue to implement, or which we seek to cause or have caused third party service providers to implement, may be insufficient to protect our systems, information or other intellectual property. In addition, the techniques used to obtain unauthorized access or interfere with systems change frequently and may be difficult to detect for long periods of time, and we may be unable to anticipate these techniques or implement adequate preventive measures. The sophistication of efforts by hackers to gain unauthorized access to information technology systems has continued to increase in recent years. Breaches, thefts, losses or fraudulent uses of customer, employee or company data could cause customers to lose confidence in the security of our websites, mobile applications, point of sale systems and other information technology systems and choose not to purchase from us. Such security breaches also could expose us to risks of data loss, business disruption, litigation and other costs or liabilities, any of which could adversely affect our business.
To date, these cybersecurity threats have not had a material impact on our business, financial condition or results of operations. However, the potential consequences of a future material cybersecurity attack on us or our third party service providers include business disruption; disruption to systems; theft, destruction, loss, corruption, misappropriation or unauthorized release of sensitive and/or confidential information or intellectual property (including personal information in violation of one or more privacy laws); reputational and brand damage; and potential liability, including litigation or other legal actions against us or the imposition by governmental authorities of penalties, fines, fees or liabilities, which, in turn, could cause us to incur significantly increased cybersecurity protection and remediation costs and the loss of customers.