To be successful, we need to continue to have available a high capacity, reliable and secure network. We face the risk, as does any company, of a security breach, whether through cyber-attack, malware, computer viruses, sabotage, or other significant disruption of our IT infrastructure and related systems. As such, there is a risk of a security breach or disruption of the system we operate, including possible unauthorized access to our and our customers' proprietary or classified information. We are also subject to breaches of our network resulting in unauthorized utilization of our services or products, which subject us to the costs of providing those products or services, which are likely not recoverable. The secure maintenance and transmission of our and our customers' information is a critical element of our operations. Our information technology and other systems that maintain and transmit customer information, or those of service providers or business partners, may be compromised by a malicious third party penetration of our network security, or that of a third party service provider or business partner, or impacted by advertent or inadvertent actions or inactions by our employees, or those of a third party service provider or business partner. As a result, our or our customers' information may be lost, disclosed, accessed or taken without the customers' consent or our product and service may be used without payment.
Although we make significant efforts to maintain the security and integrity of these types of information and systems, there can be no assurance that our security efforts and measures will be effective or that attempted security breaches or disruptions would not be successful or damaging, especially in light of the growing sophistication of cyber-attacks and intrusions sponsored by state or other interests. We may be unable to anticipate all potential types of attacks or intrusions or to implement adequate security barriers or other preventative measures. Certain of our business units have been the subject of attempted and successful cyber-attacks in the past. We have researched the situations and do not believe any material internal or customer information has been compromised.
Network disruptions, security breaches and other significant failures of the above-described systems could (i) disrupt the proper functioning of our networks and systems and therefore our operations or those of certain of our customers; (ii) result in the unauthorized use of our services or products without payment, (iii) result in the unauthorized access to, and destruction, loss, theft, misappropriation or release of proprietary, confidential, sensitive or otherwise valuable information of ours or our customers, including trade secrets, which others could use to compete against us or for disruptive, destructive or otherwise harmful purposes and outcomes; (iv) require significant management attention or financial resources to remedy the damages that result or to change our systems and processes; (v) subject us to claims for contract breach, damages, credits, fines, penalties, termination or other remedies; or (vi) result in a loss of business, damage our reputation among our customers and the public generally, subject us to additional regulatory scrutiny or expose us to litigation. Any or all of which could have a negative impact on our results of operations, financial condition and cash flows.