We are at risk for interruptions, outages and breaches of our: (a) operational systems, including business, financial, accounting, product development, data processing or production processes, owned by us or our third-party vendors or suppliers; (b) facility security systems, owned by us or our third-party vendors or suppliers; (c) aircraft technology, including powertrain and avionics and flight control software, owned by us or our third-party vendors or suppliers; (d) the integrated software in our aircraft; or (e) customer data that we process or our third-party vendors or suppliers process on our behalf. Such incidents could: disrupt our operational systems; result in loss of intellectual property, trade secrets or other proprietary or competitively sensitive information; compromise certain information of customers, employees, suppliers, or others; jeopardize the security of our facilities; or affect the performance of in-product technology and the integrated software in our aircraft.
We plan to collect, store, transmit and otherwise process data from our aircraft, our customers, our employees and others as part of our business and operations, which may include personal information or confidential or proprietary information. We also work with partners and third-party service providers or vendors that collect, store and process such data on our behalf and in connection with our aircraft. There can be no assurance that any security measures that we or our third-party service providers or vendors have implemented will be effective against current or future security threats. If a compromise of data were to occur, we may become liable under our contracts with other parties and under applicable law for damages and incur penalties and other costs to respond to, investigate and remedy such an incident. Our systems, networks and physical facilities could be breached, or personal information could otherwise be compromised due to employee error or malfeasance, if, for example, third parties attempt to fraudulently induce our employees or our customers to disclose information or usernames and/or passwords. Third parties may also exploit vulnerabilities in, or obtain unauthorized access to, platforms, systems, networks and/or physical facilities utilized by our third-party service providers and vendors.
We plan to include avionics and flight control software services and functionality that utilize data connectivity to monitor aircraft performance and to enhance safety and enable cost-saving preventative maintenance. The availability and effectiveness of our services depend on the continued operation of information technology and communications systems. Our systems will be vulnerable to damage or interruption from, among others, physical theft, fire, terrorist attacks, natural disasters, power loss, war, telecommunications failures, viruses, worms, trojan horses, distributed denial or degradation of service attacks, ransomware, social engineering schemes, insider theft or misuse or other attempts to harm our systems. We intend to use our avionics and flight control software and functionality to log information about each aircraft's use in order to aid us in aircraft diagnostics and servicing. Our customers may object to the use of this data, which may increase our vehicle maintenance costs and harm our business prospects.
Our aircraft contain complex information technology systems and built-in data connectivity to share aircraft data with ground operations infrastructure. We plan to design, implement and test security measures intended to prevent unauthorized access to our information technology networks, our aircraft and related systems. However, hackers may attempt to gain unauthorized access to modify, alter and use such networks, aircraft and systems to gain control of or to change our aircraft's functionality, performance characteristics, or to gain access to data stored in or generated by the aircraft. A significant breach of our third-party service providers' or vendors' or our own network security and systems could have serious negative consequences for our business and future prospects, including possible fines, penalties and damages, reduced customer demand for our aircraft or urban aerial ride sharing services and harm to our reputation and brand.
There are inherent risks associated with developing, improving, expanding and updating our current systems, such as the disruption of our data management, procurement, production execution, finance, supply chain and sales and service processes. These risks may affect our ability to manage our data and inventory, to procure parts or supplies or to manufacture, deploy, deliver and service our aircraft, to adequately protect our intellectual property or achieve and maintain compliance with, or to realize available benefits under, applicable laws, regulations and contracts. We cannot be sure that these systems upon which we rely, including those of our third-party vendors or suppliers, will be effectively implemented, maintained or expanded as planned. If we do not successfully implement, maintain or expand these systems as planned, our operations may be disrupted and our ability to accurately and timely report our financial results could be impaired. Moreover, our proprietary information or intellectual property could be compromised or misappropriated, and our reputation may be adversely affected. If these systems do not operate as we expect them to, we may be required to expend significant resources to make corrections or find alternative sources for performing these functions.
Techniques used to obtain unauthorized access or sabotage technology systems change frequently and generally are not identified until they are launched against a target, and cybersecurity threats continue to evolve and are difficult to predict due to advances in the technological capabilities of threat actors and the new and sophisticated methods used by criminals, including phishing, social engineering or other illicit acts. We may be unable to anticipate these techniques or to implement adequate preventative measures. Threat actors, nation-states, and nation-state-supported actors now engage, and are expected to continue to engage, in cyber-attacks, including for geopolitical reasons and in connection with military conflicts and operations. During times of war and other major conflicts, we and our third-party vendors or suppliers may be vulnerable to heightened risk of these attacks.
The landscape of laws, regulations, and industry standards related to cybersecurity is evolving globally. We may be subject to increased compliance burdens by regulators and customers with respect to our aircraft, as well as additional costs to oversee and monitor security risks. Most jurisdictions have enacted laws mandating companies to inform individuals, stockholders, regulatory authorities, and others of security breaches. In addition, certain of our customer agreements may require us to promptly report security breaches involving their data on our systems or those of subcontractors processing such data on our behalf. These mandatory disclosures can be costly, harm our reputation, erode customer trust, and require significant resources to mitigate issues stemming from actual or perceived security breaches.
While we currently maintain cybersecurity insurance, our insurance may be insufficient or may not cover all liabilities we could incur. The successful assertion of one or more large claims against us that exceeds our available cybersecurity insurance coverage, or results in changes to our insurance policies (including premium increases or the imposition of large deductible or co-insurance requirements), could have an adverse effect on our business. In addition, we cannot be sure that our existing cybersecurity insurance coverage will continue to be available on acceptable terms or that our insurers will not deny coverage as to any future claim.