In the ordinary course of our business, we store sensitive data, including our proprietary business information and that of our customers, suppliers and business partners, and personally identifiable information of our employees in our information technology systems, including in our data centers and on our networks. The secure processing, maintenance and transmission of this data is critical to our operations. Some of these systems are maintained or operated by third-party contractors, including cloud-based systems. Despite our efforts to secure our information systems from cyber-security attacks or breaches, our information technology systems may be vulnerable to attacks by hackers or breached or disrupted due to employee error, malfeasance or other disruptions. If these technologies, systems, products or services are damaged, cease to function properly, are compromised due to employee or third-party contractor error, user error, malfeasance, system errors, or other vulnerabilities, or are subject to cybersecurity attacks, such as those involving denial of service attacks, unauthorized access, malicious software, or other intrusions, including by criminals, nation states or insiders, our business may be adversely impacted. The impacts of any such circumstances could include production downtimes, operational delays, and other impacts on our operations and ability to provide products and services to our customers; compromise of confidential, proprietary or otherwise protected information, including personal information and customer confidential data; destruction, corruption, or theft of data or intellectual property; manipulation, disruption, or improper use of these technologies, systems, products or services; financial losses from fraudulent transactions, remedial actions, loss of business or potential liability; adverse media coverage; and legal claims or legal proceedings, including regulatory investigations, actions and fines; and damage to our reputation. There has been a rise in the number of cyberattacks targeting confidential business information generally and in the manufacturing industry specifically. Moreover, there has been a rise in the number of cyberattacks that depend on human error or manipulation, including phishing attacks or schemes that use social engineering to gain access to systems or perpetuate wire transfer or other frauds.
These trends increase the likelihood of such events occurring as well as the costs associated with protecting against such attacks. Although such attempts have been made to attack our information technology systems, no material harm has resulted. Any such attack, breach or disruption could compromise our information technology systems and the information stored in them could be accessed, publicly disclosed, lost or stolen and our business operations could be disrupted. Additionally, any significant disruption or slowdown of our systems could cause customers to cancel orders or cause standard business processes to become inefficient or ineffective, which could adversely affect our financial position, results of operations or cash flows. Any such access, disclosure or other loss of information or business disruption could result in legal claims or proceedings, liability under laws that protect the privacy of personal information, and damage to our reputation, which could adversely impact our operations.
The domestic and international regulatory environment related to information security, collection and privacy is increasingly rigorous and complex, with new and rapidly changing requirements applicable to our business, which often require changes to our business practices. Compliance with these new requirements, including the European Union's General Data Protection Regulation, the California Privacy Rights Act, and other international and domestic regulations, are costly and will result in additional costs in our efforts to continue to comply.