The Company and its hotel managers and franchisors rely on information technology networks and systems, including the Internet, to process, transmit and store electronic information, and to manage or support a variety of business processes, including financial transactions and records, personally identifiable information, reservations, billing and operating data. The Company and its hotel managers and franchisors rely on commercially available and internally developed systems, software, tools and monitoring to provide security for processing, transmission and storage of confidential data. Such data may include employee, operator and customer information, such as personally identifiable information, and information relating to payroll and financial accounts. The Company's corporate information technology systems are not used to process business transactions with its hotel guests, and those systems currently have no connectivity to hotel and/or third-party management and brand technology platforms. A number of hospitality and consumer-facing brands have been subject to successful cyber-attacks, including those seeking guest credit card information. Moreover, the risk of a cybersecurity incident or disruption, particularly through cyber-attack or cyber intrusion, including by computer hackers, nation-state affiliated actors and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. The safety and security measures taken by the Company and its hotel managers, third-party vendors and franchisors have not been, and in the future may not be, able to completely prevent damage to the technology networks or systems, ensure their proper functioning, or prevent against cybersecurity incidents, including those resulting in unauthorized access to or disclosure of personally identifiable information.
Cybersecurity incidents, including intentional or unintentional physical or electronic break-ins, cyber-attacks, cyber intrusions or the deployment of ransomware or other extortion tactics, malware, computer viruses, attachments to emails, social engineering or phishing schemes, or fraudulent schemes, have created and may in the future create system disruptions, shutdowns, deployment of malware or ransomware, theft of the Company's data, or unauthorized access to or disclosure of confidential information. Any failure to maintain proper function, security and availability of information systems could interrupt operations, interfere with the Company's ability to comply with financial reporting requirements, damage the reputations of the Company, the Company's hotel managers or franchisors, and subject the Company to liability claims, notification and monitoring requirements or regulatory penalties that may not be fully covered by insurance, all of which could have a material adverse effect on the business, financial condition and results of operations of the Company. The Company has incurred, and will continue to incur, expenses to comply with data protection standards and protocols imposed by law, regulation, industry standards and contractual obligations. Increased regulation of data collection, use and retention practices, including self-regulation and industry standards, changes in existing laws and regulations, enactment of new laws and regulations, increased enforcement activity, and changes in interpretation of laws, could increase the Company's cost of compliance and operation, limit its ability to grow its business or otherwise harm its business. Due to the complexity and interconnectedness of the Company's information systems and networks, and those upon which the Company and its hotel managers and franchisors rely, the process of upgrading or patching protective measures could itself create a risk of cybersecurity issues or system disruptions for the Company, as well as for its hotel managers, franchisors, and others who rely upon, or have exposure to, such information systems and networks. Further, adoption of artificial intelligence ("AI") tools by the Company or by third parties may pose new cybersecurity challenges. Threat actors may use AI tools to automate and enhance cybersecurity attacks against the Company. The Company uses software and platforms designed to detect such cybersecurity threats, including AI-based tools, but these threats could become more sophisticated and harder to detect and counteract, which may pose significant risks to the Company's data security and systems. In addition, unauthorized access to, disclosure of, or loss of personally identifiable information or confidential or proprietary information could result in damage to the Company or the hotel management company's or franchisor's reputation, a loss of confidence among hotel guests, reputational harm for the Company's hotels, legal liability, potential litigation, and increased regulatory oversight, including governmental investigations, enforcement actions, and regulatory fines, investigatory costs and costs to comply with notification and monitoring requirements.
In the conduct of its business, both the Company and its hotel managers and franchisors rely on relationships with third parties, including cloud data storage and other information technology service providers, suppliers, distributors, contractors and other external business partners, for certain functions or for services in support of key portions of the Company's operations. These third-party entities are subject to similar risks related to cybersecurity, privacy violations, and business interruption, and a cybersecurity incident or disruption affecting the Company's third-party service providers or partners could have a material adverse effect on the Company's business. While the Company may be entitled to damages if its third-party service providers fail to satisfy their cybersecurity-related obligations to the Company, any award may be insufficient to cover the Company's damages, or the Company may be unable to recover such award.
The Company has processes in place to deter, detect, report, and respond to cybersecurity incidents but there can be no guaranty that those processes will be successful in preventing every attempted intrusion or attack. While the Company is not aware of any cybersecurity incidents, including third-party incidents, that have materially affected it as of December 31, 2025, there can be no guarantee that the Company will not be the subject of future attacks, threats or cybersecurity incidents that may have a material impact on its business strategy, results of operations or financial condition. The Company maintains cybersecurity insurance, but there can be no assurances that the coverage would be adequate in relation to any incurred losses. Moreover, as cyber-attacks increase in frequency and magnitude, the Company may be unable to retain or obtain cybersecurity insurance in amounts and on terms it views as adequate for its operations.