We rely upon information technology systems and manufacture networked and connected products, some of which are managed by third parties, to collect, process, transmit, use, protect and store electronic information and to manage or support a variety of our business processes, activities and products. Additionally, we and GM Financial collect, process, transmit, use, protect and store confidential data, including intellectual property and proprietary business information (including that of our dealers and suppliers), as well as personally identifiable information of our customers and employees, in data centers and on information technology networks (including networks that may be controlled or maintained by third parties). The secure operation of these systems and products, and the processing and maintenance of the information processed by these systems and products, is critical to our business operations and strategy. Further, customers using our systems rely on the security of our infrastructure, including hardware and other elements provided by third parties, to ensure the reliability of our products and the protection of their data. We also face the risk of operational disruption, failure, termination or capacity constraints of any of the service providers or third parties that facilitate our business activities, including vendors, suppliers, customers, counterparties, exchanges, clearing agents, clearinghouses or other financial intermediaries. Such parties and other third parties who provide us services or with whom we communicate could also be the source of a cyberattack on, or breach of, our operational systems, network, data or infrastructure.
Despite our security measures and business continuity plans, our information technology systems and networked and connected products may be vulnerable to intrusions, damage, disruptions or shutdowns caused by attacks by hackers, computer viruses or worms, malware (including "ransomware"), phishing attacks, spyware, denial of service attacks and/or breaches due to errors, negligence or malfeasance by employees, contractors, vendors and others who have access to these systems and products. In addition, cybersecurity threat actors are increasingly sophisticated and are targeting employees, contractors, service providers and third parties through various techniques that involve social engineering and/or misrepresentation. Techniques used in cyberattacks to obtain unauthorized access to, disable or sabotage information technology systems are increasingly diverse and sophisticated, including as a result of emerging technologies, such as artificial intelligence and machine learning. Data breaches and other cybersecurity events have become increasingly commonplace, including as a result of the intensification of state-sponsored cyberattacks during periods of geopolitical conflict. The occurrence of any of these events could compromise the confidentiality, operational integrity and accessibility of these systems and products and the data that resides within them. Similarly, such an occurrence could result in the compromise, acquisition or loss of the information processed by these systems and products. Such events could result in, among other things, the loss of proprietary data, interruptions or delays in our business operations and damage to our reputation. In addition, such events could increase the risk of claims alleging that we are non-compliant with applicable laws or regulations, subjecting us to potential liability from private litigation or regulatory penalties and related costs under laws protecting the privacy of personal information or unfair or deceptive practices relating to consumer information; disrupt our operations; or reduce the competitive advantage we hope to derive from our investment in advanced technologies. Various events described above have occurred in the past and may occur in the future. Although impacts of past events have been immaterial, the impacts of such events in the future may be material.