Because our business requires the storage, transmission and utilization of consumer and customer information, we will continue to routinely be the target of attempted cybersecurity and other security threats by technically sophisticated and well-resourced outside third parties, among others, attempting to access or steal the data we store. We operate in an environment of significant risk of cybersecurity incidents resulting from unintentional events or deliberate attacks by third parties or insiders, which may involve exploiting security vulnerabilities or sophisticated attack methods. These threats include social engineering attacks, phishing attacks and other cyber-attacks, including state-sponsored cyber-attacks, industrial espionage, insider threats, denial-of-service attacks, computer viruses, ransomware and other malware, payment fraud or other cyber incidents. In addition, increased attention on and use of artificial intelligence increases the risk of cyber-attacks and data breaches, which can occur more quickly and evolve more rapidly when artificial intelligence is used. Further, use of artificial intelligence by our employees, whether authorized or unauthorized, increases the risk that our intellectual property and other proprietary information will be unintentionally disclosed.
Cybersecurity breaches could expose us to a risk of loss, the unauthorized disclosure of consumer or customer information, significant litigation, regulatory fines, penalties, loss of customers or reputational damage, indemnity obligations and other liability. There is no assurance that the programs, technologies and processes that we have put in place in an effort to maintain the security and protection of our non-public information and that of our customers will be fully implemented, complied with or effective. If our cybersecurity measures are breached as a result of third-party action, employee error, malfeasance or otherwise, and as a result, someone obtains unauthorized access to our systems or to consumer or customer information, sensitive data may be accessed, stolen, disclosed or lost, our reputation may be damaged, our business may suffer and we could incur significant liability. Because the techniques used to obtain unauthorized access, disable or degrade service or to sabotage systems change frequently and generally are not recognized until launched against a target, or even for some time after, we may be unable to anticipate these techniques, implement adequate preventative measures or remediate any intrusion on a timely or effective basis. Because a successful breach of our computer systems, software, networks or other technology asset could occur and persist for an extended period of time before being detected, we may not be able to immediately address the consequences of a cybersecurity incident.