Increased global information technology cybersecurity threats and more sophisticated and targeted computer crime pose a risk to the security of our systems and networks and the confidentiality, availability and integrity of our data and communications. While we attempt to mitigate these risks by employing a number of measures, including employee training, comprehensive monitoring of our networks and systems, and maintenance of backup and protective systems, our systems, networks and products remain potentially vulnerable to advanced persistent threats. Depending on their nature and scope, such threats could potentially lead to the compromise of confidential information and communications, improper use of our systems and networks, manipulation and destruction of data, defective products, production downtimes and operational disruptions, which in turn could adversely affect our reputation, competitiveness and results of operations. We have cybersecurity insurance related to a breach event covering expenses for notification, credit monitoring, investigation, crisis management, public relations and legal advice. However, damage and claims arising from such incidents may not be covered or exceed the amount of any insurance available or may result in increased cybersecurity and other insurance premiums. In response to an increased reliance on our information technology systems, we have taken proactive measures to strengthen our information technology systems, including completion of a National Institute of Standards and Technology ("NIST") assessment, upgraded security patches across all servers, development of best-in-class hack protection service, implementation of recurring company-wide security training and enablement of advanced security for our major information systems. Management provides the Audit Committee with regular cybersecurity program updates including cybersecurity posture, risk management activities, and emerging risk.
Furthermore, the Company may have access to sensitive, confidential, or personal data or information that may be subject to privacy and security laws, regulations, or other contractually-imposed controls. Despite our use of reasonable and appropriate controls, material security breaches, theft, misplaced, lost or corrupted data, programming, or employee errors and/or malfeasance could lead to the compromise or improper use of such sensitive, confidential, or personal data or information, resulting in possible negative consequences, such as fines, ransom demands, penalties, loss of reputation, competitiveness or customers, or other negative consequences resulting in adverse impacts to our results of operations or financial condition.