The cybersecurity risks associated with the protection of our infrastructure and facilities is evolving and increasingly complex. We continue to heavily rely on technological tools that support our business operations and corporate functions while enhancing our security. There are various risks associated with our information technology infrastructure, including hardware and software failure, communications failure, data distortion or destruction, unauthorized access to data, misuse of proprietary or confidential data, unauthorized control through electronic means, cyber-attacks, cyber-terrorism, data breaches, programming mistakes, and other inadvertent errors or deliberate human acts. Further, the U.S. government has issued public warnings that indicate energy assets might be specific targets of cybersecurity threats and/or attacks.
Many of our employees, service providers, and vendors have been working, and continue to work, from remote locations, where cybersecurity protections could be limited and cybersecurity procedures and safeguards could be less effective. As such, we could be subject to a higher risk of cybersecurity breaches than ever before. Therefore, we could be required to expend significant resources to continue to modify or enhance our procedures and controls or to upgrade our digital and operational systems, related infrastructure, technologies and network security.
Any such failure, attack, or security breach could adversely impact our ability to safely and reliably deliver services to our customers through our transmission, distribution, and generation systems, subjecting us to reputational and other harm, and subject us to legal and regulatory proceedings and claims and demands from third parties, any of which could adversely affect our business, our earnings, results of operation and financial condition. In addition, the protection of customer, employee and Company data is crucial to our operational security. A breach or breakdown of our systems that results in the unauthorized release of individually identifiable customer information or other sensitive data could have an adverse effect on our reputation, results of operations and financial condition and could also materially increase our costs of maintaining our system and protecting it against future breakdowns or breaches. We take reasonable precautions to safeguard our information systems from cyber-attacks and security breaches; however, there is no guarantee that the procedures implemented to protect against unauthorized access to our information systems are adequate to safeguard against all attacks and breaches. We also cannot assure that any redundancies built into our networks and technology, or the procedures we have implemented to protect against cyber-attacks and other unauthorized access to secured data, are adequate to safeguard against all failures of technology or security breaches.