We rely on IT Systems that are important to the operation of our business, some of which are managed by third parties. These third parties are typically under no obligation to renew agreements and there is no guarantee that we will be able to renew these agreements on commercially reasonable terms, or at all. These systems are used to process, transmit and store electronic information, to manage and support our business operations. In addition, our services currently are expected to continue to involve the storage, processing and transmission of data, including Sensitive Information. Any security breach, including those resulting from a cybersecurity attack, phishing attack or any unauthorized access, unauthorized usage, virus or similar breach or disruption could result in the loss or destruction of or unauthorized access to, or use, alteration, disclosure, or acquisition of, data, damage to our reputation, litigation, regulatory investigations or other liabilities. Cybersecurity attacks are expected to accelerate on a global basis in frequency and magnitude, and the techniques and tools (including artificial intelligence) used to breach security safeguards, circumvent security controls, evade detection and remove forensic evidence are evolving rapidly. Additionally such attacks are of ever-increasing levels of sophistication and are made by groups and individuals with a wide range of motives and expertise, including organized criminal groups, "hacktivists," state-sponsored organizations, as well as through diverse attack vectors, such as social engineering/phishing, malware (including ransomware), malfeasance by insiders, human or technological error, malicious file attacks, bugs, viruses, worms, cross-site scripting, credential abuse, network penetration, denial of service attacks, and as a result of bugs, misconfigurations or exploited vulnerabilities in software or hardware. In particular, ransomware attacks, including those from organized criminal threat actors, nation-states, and nation-state supported actors, are becoming increasingly sophisticated, prevalent and severe, and can lead to significant interruptions in our operations, loss of data and income, reputational loss, diversion of funds, and may result in fines, litigation and unwanted media attention. Extortion payments may alleviate the negative impact of a ransomware attack, but we may be unwilling or unable to make such payments due to, for example, applicable laws or regulations prohibiting payments. Moreover, any failures in our IT systems or telecommunications services could affect our ability to operate our aircraft or otherwise conduct business.
In addition, we engage third-party service providers to store and otherwise process some of our data, including personal data and confidential and sensitive information. Our service providers may also be the targets of cybersecurity attacks, malicious software, phishing schemes, and fraud. Our ability to monitor our vendors and service providers' data security is limited, and, in any event, third parties may be able to circumvent those security measures, resulting in the unauthorized access to, misuse, acquisition, disclosure, loss, alteration, or destruction of our data, including our Sensitive Information. Moreover, because we make extensive use of third party suppliers and service providers, successful cybersecurity attacks that disrupt or result in unauthorized access to third party IT Systems can materially impact our operations and financial results. As a result, we may not be able to address these threats proactively or implement adequate preventative measures, and we may be unable to promptly detect and address any such disruption and/or security breach, if at all. As a result, as threats related to cybersecurity develop and grow, we may also find it necessary to make further investments to protect our data and infrastructure, which may impact our results of operations.
Further, the costs to eliminate or address the foregoing security threats and vulnerabilities before or after a cybersecurity incident could be significant. Our remediation efforts may not be successful and could result in interruptions, delays or cessation of service, and loss of existing or potential suppliers or players. We maintain cybersecurity policies and procedures to manage risk to our information technology systems, and we continuously adapt our systems and processes to mitigate such threats, and plan to enhance our protections against such attacks. Nevertheless, in light of the complex and evolving nature of such incidents, there can also be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our IT Systems and Sensitive Information, including where acquired entities are involved or being integrated. While to date no incidents have had a material impact on our operations or financial results, we cannot guarantee that material incidents will not occur in the future. We also do not maintain insurance policies covering losses relating to cybersecurity incidents, which may increase any potential harms that the business may suffer from a cybersecurity attack. As a result, we may be unable to cover all possible claims stemming from security breaches, cybersecurity attacks and other types of unlawful activity, or any resulting disruptions from such events, and we may suffer losses that could have a material adverse effect on our business.