Cybersecurity attacks, threats, and breaches and other disruptions to our information technology infrastructure and/or the information technology infrastructure of our third-party suppliers or business partners could interfere with our operations; compromise information belonging to us, our employees, customers, and suppliers; and expose us to liabilities or penalties which could adversely impact our business and reputation. In the normal course of business, we rely on information technology networks and systems, some of which are managed by third parties, to process, transmit, and store electronic information, and to manage or support a variety of business processes and activities. Additionally, we collect and store certain data, including proprietary business information and customer and employee data, and may have access to confidential or personal information in certain of our businesses that is subject to privacy and security laws, regulations, and customer-imposed controls. Specifically, we are subject to the laws of various states and countries where we operate or do business related to solicitation, collection, processing, transferring, storing, or use of consumer, customer, supplier, or employee information or related data, including the EU's General Data Protection Regulation, the California Consumer Privacy Act, and China's Personal Information Protection Law. In addition, certain countries in which we operate or do business have enacted or are considering enacting laws that impose additional data transfer restrictions. If countries in which we operate or do business were to adopt data localization or data residency laws, we could be required to implement new or expand existing data storage protocols, build new storage facilities, and/or devote additional resources to comply with the requirements of such laws, any of which could have significant implications to business operations and costs.
In addition to our own systems, we have outsourced, and expect to continue to outsource, certain information technology services-including cloud computing services and storage systems, system development, and information technology support services-which have in the past, and in the future may, subject our information technology and other sensitive information to additional risk.
Our information technology networks and infrastructure, and the technology networks and infrastructure of our third-party suppliers and business partners, are vulnerable to damage, disruptions or shutdowns due to attack by malicious actors with significant financial and technological resources, breaches, employee error or malfeasance, power outages, malware (such as computer viruses and ransomware), social engineering (i.e., phishing attacks), theft of system credentials, other increasingly sophisticated attacks, telecommunication or utility failures, systems failures, natural disasters, or other catastrophic events, which may require us to notify regulators, customers, or employees, and enlist identity theft protection in the event of a privacy breach. We continue to monitor and develop our systems to protect the integrity and functionality of our information technology infrastructure and access to and the security of our intellectual property and our employees', customers', and suppliers' data. Cybersecurity breaches and other disruptions to our information technology infrastructure or the information technology infrastructure of our third-party suppliers and business partners, or violations of applicable laws, could result in legal claims or proceedings, liability or penalties, disruption in operations, and damage to our reputation, which could materially adversely affect our business. While we have experienced, and expect to continue to experience, attacks and threats to our information technology networks and infrastructure, including attempted cyber intrusions, to date none of these attacks and threats have had a material impact on our business or operations. Further, some of our employees have fully-remote or hybrid work arrangements, which may increase our vulnerability to cyber and other information technology risks.