We utilize information technology systems and networks to process, transmit and store electronic information in connection with our business activities. As the use of digital technologies has increased, cyber incidents, including deliberate attacks and attempts to gain unauthorized access to computer systems and networks, have increased in frequency and sophistication. These threats pose a risk to the security of our systems and networks and the confidentiality, availability and integrity of our data, all of which are vital to our operations and business strategy. There can be no assurance that we will be successful in preventing cyber-attacks or successfully mitigating their effects.
We estimate that approximately 80% of our sales are by credit or debit cards. Other restaurants and retailers have experienced security breaches in which credit and debit card information has been stolen. We may in the future become subject to claims for purportedly fraudulent transactions arising out of the actual or alleged theft of credit or debit card information, and we may also be subject to lawsuits or other proceedings relating to these types of incidents.
The scope and severity of risks posed to our systems from cyber threats has increased. Many of our information technology systems, including those used for our point-of-sale, delivery services and administrative functions, contain personal, financial or other information that is entrusted to us by our guests, vendors and employees. Many of our information technology systems also contain confidential information about our business, such as business strategies, development initiatives and designs. To date, these attacks have not had a material impact on our operations, but we cannot provide assurance that they will not have an impact in the future.
Our third-party providers' information technology systems and databases are likewise subject to such risks. We provide some guest and employee data, as well as confidential information important to our business, to third parties to conduct our business. Individuals performing work for us and these third parties also may access some of this data, including on personally owned digital devices. To the extent we, a third party or such an individual were to experience a breach of our or their information technology systems that results in the unauthorized access, theft, use, destruction or other compromises of customers' or employees' data or confidential information stored in or transmitted through such systems, it could result in a material loss of revenues from the potential adverse impact to our reputation and brand, a decrease in our ability to retain customers or attract new ones, the imposition of potentially significant costs (including loss of data or payment for recovery of data), loss of business, disruption to our supply chain, business and plans. Unauthorized access, theft, use, destruction or other compromises are becoming increasingly sophisticated and may occur through a variety of methods, including attacks using malicious code, vulnerabilities in software, hardware or other infrastructure (including systems used by our supply chain), system misconfigurations, phishing or social engineering. The rapid evolution and increased adoption of artificial intelligence technologies may intensify our cybersecurity risks. Our logging capabilities, or the logging capabilities of third parties, are not always complete or sufficiently granular, affecting our ability to fully understand the scope of security breaches.