As our dependence on technology has grown, the scope and severity of potential risks from cyber-attacks and security threats have increased. We expect that the rapid evolution and increased adoption of artificial intelligence have heightened and will continue to heighten those risks. Many of our information technology systems and the systems of our third-party business partners (whether cloud-based or hosted in proprietary servers) contain personal, financial or other information of our guests, employees, and business partners, and confidential information about our business, such as business strategies, financial results, development initiatives, and confidential information about third parties, such as suppliers. Similar to many other restaurant companies, we have in the past experienced, and we expect to continue to experience, cyber-attacks, including phishing, and other attempts to breach, or gain unauthorized access to, our systems and databases and we expect the number and frequency of these attempts to increase as the scope and scale of our technology footprint and digital operations increases.
In addition, individuals performing work for us and our third-party business partners may access some of this data, including on personally owned digital devices. To the extent we, a third party or any such individual were to experience a breach of our or their information technology systems that results in the unauthorized access, theft, use, destruction or other compromises of guests' or employees' data or confidential information of Chipotle, including through cyber-attacks or other external or internal methods, it could have an adverse impact on our reputation and brand and we could experience a material loss of revenues, a decrease in our ability to retain guests or attract new ones, the imposition of potentially significant costs (including loss of data or payment for recovery of data) and liabilities, loss of business partners and the disruption to our supply chain and business plans. Unauthorized access, theft, use, destruction or other compromises are becoming increasingly sophisticated and may occur through a variety of methods, including attacks using malicious code, vulnerabilities in software, hardware or other infrastructure (including systems used by our supply chain), system misconfigurations, phishing, deepfakes, ransomware, malware or social engineering. Our logging capabilities, or the logging capabilities of third parties, are not always complete or sufficiently granular, affecting our ability to fully understand the scope of security breaches.
Given the increasing complexity and sophistication of techniques used by bad actors to obtain unauthorized access to or disable information technology systems, and the fact that cyberattacks are being made by groups and individuals with a wide range of expertise and motives, it is increasingly difficult to anticipate, defend against and detect cyberattacks. A cyberattack could occur and persist for an extended period of time before we detect it. Moreover, the extent of a particular cyber incident and the steps that we may need to take to investigate the incident may not be immediately clear, and it may take a significant amount of time before such investigation can be finalized and completed and reliable information about the incident is known. During the pendency of any such investigation, we may not know the extent of the harm or how best to remediate it, and we may be required to disclose incidents before their full extent is known.
Such security breaches also could result in a violation of applicable U.S. and international privacy, cyber and other laws or trigger data breach notification laws, including under the SEC's disclosure rules, and subject us to private third party or securities litigation and governmental investigations and proceedings, any of which could result in our exposure to material civil or criminal liability. These risks also exist in companies that license our brand, that we partner with or invest in that use separate information systems.
We may be required to make significant capital investments and other expenditures to investigate security incidents, remedy cybersecurity problems, recuperate lost data, prevent future compromises and adapt systems and practices to react to the changing threat environment. These include costs associated with notifying affected individuals and other agencies, additional security technologies and training, hiring additional employees, retention of experts and providing credit monitoring services for individuals whose data has been breached. These costs could be material and could adversely impact our results of operations in the period in which they are incurred, including by causing us to delay the pursuit of other important business strategies and initiatives, and may not meaningfully limit the success of future attempts to breach our information technology systems.