We rely on on-premise and cloud-based information technology systems, some of which are managed by or licensed from third parties, to support many critical aspects of our business, as well as to process, transmit and store our own electronic proprietary or confidential information, and confidential information of customers, employees, suppliers and others, including personally identifiable information, credit card data, and other proprietary confidential information. These systems are vulnerable to damage, disruptions and/or shutdowns due to attacks by cyber-criminals, data breaches, employee error, power outages, computer viruses, telecommunication or utility failures, systems failures, natural disasters, catastrophic events, or other unforeseen events. These vulnerabilities could interfere with our operations, compromise our data processing capacity and the security of our information and that of our customers and suppliers, and expose us to liability which could adversely impact our business and reputation. We actively manage these risks through a variety of hardware and software-based techniques that we own, license, or otherwise procure from third parties under contract to safeguard our systems, and we own or procure from third parties system data storage redundancy and disaster recovery capability. In particular, we have increased our investment in tools, techniques and training that we believe will reduce our vulnerability to attacks from cyber-criminals. However, due to the complexity of our systems, and especially due to the ever-increasing sophistication of cyber-criminals, there is no assurance that our efforts will be sufficient to prevent cyber-attacks, security breaches, or the other potential exploitation of vulnerabilities or systems failures. In any such circumstance, our system redundancy and other disaster recovery planning may be ineffective or inadequate. While we have experienced, and expect to continue to experience, these types of threats to our information technology networks and infrastructure, none of them to date has had a material impact. However, in the future, such events could result in legal claims or proceedings, liability or penalties under privacy laws, disruption in operations, and damage to our brand and reputation, all of which could adversely affect our business, operating results and financial condition.
We maintain insurance for a variety of cybersecurity risks to mitigate their possible impact, but because of the prevalence of claims in the market for cybersecurity insurance, the cost for that insurance has increased and the underwriting criteria to obtain such insurance has become far more demanding. There is no assurance that we will be able to obtain such insurance in the future, despite our substantial investments in cybersecurity, and if we are able to do so, it may be at substantially higher costs. In addition, in response to these higher costs, we may choose to reduce the amount of insurance we maintain because we believe our improvements in our cybersecurity profile have reduced our risk exposure relative to the increased cost of insurance. If our risk assessments prove incorrect and we were to have a loss not fully covered by insurance, our financial condition and results of operations could be materially negatively impacted.