Our business depends on our information technology ("IT") systems, which collect and process information of customers, Associates and other persons, as well as information of our business and of our suppliers, service providers and other third parties. We rely heavily on IT systems, including those operated and maintained by our suppliers, service providers and other third parties, to manage key aspects of our business, including: planning; purchasing; sales, including point-of-sale processing and e-commerce; supply chain management; inventory management; human resources; financial management; communications; information security; and legal and regulatory compliance. Our ongoing operations and successful growth are dependent on these systems and require us to accurately anticipate our current and future IT needs, including successfully developing, implementing, and maintaining appropriate systems and adopting new technologies appropriately and in a timely manner. This reliance requires us to accurately anticipate our current and future IT needs and successfully develop, implement, and maintain appropriate systems, as well as effective disaster recovery plans for such systems. Our ongoing operations and successful growth are dependent on our doing these things effectively. We also are dependent on the ongoing integrity, security and consistent operations of these systems, including related back-up systems.
As is common in the retail industry, our IT systems, as well as those of our suppliers, service providers and other third parties whose information technology systems we utilize directly or indirectly, are targeted by attempts to access or obtain personal or other sensitive information, attempts at monetary theft, and attempts to disrupt business. These attempts include use of malware, ransomware, phishing, social engineering, denial-of-service attacks, exploitation of system vulnerabilities or misconfigurations, Associate malfeasance, digital and physical payment card skimmers, account takeovers and other forms of cyber-attacks. These attempts continue to increase in sophistication, heightening the risk of compromise or disruption. While some of these attempts have resulted in cybersecurity incidents, the unauthorized intrusion into our network discovered late in 2006 is the only such cybersecurity incident to date that has been material to the results of our operations. Our IT systems and those of our suppliers, service providers and other third parties also may be damaged or disrupted, or personal or sensitive information compromised, from a number of other causes, including power outages, system failures, catastrophic events or Associate or contractor error. Such damage, disruption or compromise could materially impair our ability to operate our business or otherwise result in material impacts on our operating results.
Changes in the business landscape and the increase of remote working by our Associates, service providers and other third parties have the potential to increase the likelihood of system damage or disruption and increase the risk of a cybersecurity compromise. Additionally, there is a heightened risk of cybersecurity incidents as a result of geopolitical events outside of our control. These factors have led to the need for additional mitigation strategies and investments across our IT Security workforce, technologies and processes.
In addition, the global regulatory environment surrounding information security and privacy is increasingly demanding, and cybersecurity compromises and disruptions in our IT systems could result in regulatory enforcement actions, class actions, contract liability, or other forms of material legal liability. Any successful compromise or disruption of our IT systems, or other compromise of the information that we collect or is collected on our behalf from our customers, Associates or other persons, could result in material reputational harm and impact our customers' willingness to shop in our stores or online, and could affect our suppliers', service providers', or other third parties' willingness to do business with us.
We maintain policies, procedures and controls designed to reduce the risks of cybersecurity compromises and IT failures or disruptions, but these controls vary in maturity across the business and may fail to operate as intended or be circumvented. Additionally, the logging policies, procedures, and controls that we have implemented to facilitate the investigation of potential cybersecurity compromises or disruptions may be insufficient to fully investigate all such events. These policies, procedures and controls also require costly and ongoing investment in technologies, hiring, training and compliance.
There is also a risk of material business disruption, liability and reputational damage associated with ongoing actions intended to update, enhance, modify or replace our systems and infrastructure, including from not accurately capturing and maintaining data, efficiently testing and implementing changes, realizing the expected benefit of the change and managing the potential disruption of the actions and diversion of internal teams' attention as the changes are implemented.