We rely on information technology networks and systems, including the Internet, to process, transmit, and store electronic and financial information, to manage a variety of business processes and activities, including our accounting and financial functions, and to comply with regulatory, legal, and tax requirements. We also depend on our information technology infrastructure for digital marketing activities and for electronic communications among our locations, personnel, customers, and suppliers. These information technology systems (some of which are provided and maintained by third parties) may be susceptible to damage, disruptions, or shutdowns due to hardware failures, computer viruses, hacker attacks, telecommunication failures, user errors, catastrophic events or other factors. In addition, a number of our salaried employees are working remotely at various times. This remote working environment may pose a heightened risk for security breaches or other disruptions of our information technology systems. If our information technology systems suffer severe damage, disruption or shutdown, and our business continuity plans do not effectively resolve the issues in a timely manner, we could experience business disruptions, a loss of critical company records, transaction errors, processing inefficiencies, and the loss of customers and sales, causing our product sales, financial condition, and operating results to be adversely affected and the reporting of our financial results to be delayed.
In addition, in the ordinary course of our business, we collect and store sensitive data, including our intellectual property, our proprietary business information and that of our customers, suppliers and business partners, and personally identifiable information or other sensitive information of our customers and employees. The secure use, processing, maintenance and transmission of this information is critical to our operations and business strategy. Despite the information security measures we have taken, our information technology and infrastructure may be subjected to attacks by hackers or breached due to employee malfeasance, employee errors, or other disruptions. Cybersecurity threats and sophisticated computer crime pose a potential risk to the security of the Company's information technology systems, networks, and services, as well as the confidentiality and integrity of the Company's data and intellectual property. Cyber-attacks, unauthorized access or security breaches, and other cyber incidents could include, among other things, computer viruses, malicious or destructive code, ransomware, social engineering attacks (including phishing and impersonation), hacking, denial-of-service attacks, and other similar attacks. These threats are constantly evolving, which increases the difficulty of defending against them or implementing adequate preventive measures. Sensitive information is also stored by our vendors and on the platforms and networks of third-party providers. Cyber-attacks on the Company, our vendors, or our third-party providers could result in inappropriate access to our intellectual property, Company data, or personally identifiable information of our global workforce, suppliers, or customers. Potential consequences of a successful cyber-attack or other cybersecurity breach or incident include remediation costs, legal costs, increased cybersecurity protection costs, lost revenues resulting from the unauthorized use of proprietary information or the failure to retain or attract customers following an attack, litigation and legal risks including governmental or regulatory enforcement actions, increased insurance premiums, reputational damage that adversely affects customer or investor confidence, and damage to the Company's competitiveness, stock price, and long-term shareholder value.
While we have taken steps to address these risks by implementing enhanced security technologies, internal controls, and business continuity plans, these measures may not be adequate. We cannot assure that the steps we have taken will be sufficient to protect our systems, information or other property. Our systems and information may be vulnerable to theft, loss, damage and interruption from a number of potential threats and events.