Any failure of our information technology ("IT") infrastructure adversely impacts our business, financial condition, and/or results of operations. We rely upon the capacity, reliability and security of our information technology infrastructure and our ability to expand and continually update this infrastructure in response to the changing needs of our business. For example, we have implemented enterprise resource planning and other IT systems in certain aspects of our business over a period of several years and continue to update and further implement new systems going forward. Like many systems, these systems may not always perform as expected. We also face the challenge of supporting our older systems and implementing necessary upgrades. When we experience a problem with the functioning of an important IT system or a security breach of our IT systems, the resulting disruptions have an adverse effect on our business, financial condition, and/or results of operations.
We face certain security threats, including threats to the confidentiality, availability and integrity of our data and systems. We maintain an extensive network of technical security controls, policy enforcement mechanisms, monitoring systems and management, Board, and Board committee oversight in order to address these threats. While these measures are designed to prevent, detect and respond to unauthorized activity in, or otherwise compromise of, our systems, certain types of attacks, including cyber-attacks, could result in significant financial or information losses and/or reputational harm. We, and certain of our third-party vendors, receive and store personal information in connection with our human resources operations and other aspects of our business. Despite our implementation of security measures, our IT systems, like all IT systems, are vulnerable to damages from computer viruses, natural disasters, unauthorized access, cyber-attack and other similar disruptions. Any such system failure, accident or security breach results in disruptions to our operations. A material network breach in the security of our IT systems could include the theft of our intellectual property, trade secrets or customer information. To the extent that any disruptions or security breach results in a loss or damage to our data, or an inappropriate disclosure of confidential or customer information, it could cause significant damage to our reputation, affect our relationships with our customers, lead to claims against the Company and ultimately harm our business, reputation, financial condition, and/or results of operations. In addition, we incur significant costs to protect against damage caused by these disruptions or security breaches.