We rely on information technology systems and other computer resources to carry out operational and marketing activities, as well as to maintain our business records. As part of our normal business activities, we may collect and store certain confidential information, including information about employees, homebuyers, customers, vendors and suppliers and may share information with vendors who assist us with certain aspects of our business. Many of these resources are provided to us and/or maintained on our behalf by third-party service providers pursuant to agreements that specify certain security and service level standards. Our ability to conduct our business may be impaired if these resources are compromised, degraded, damaged or fail, whether due to a virus or other harmful circumstance, intentional penetration or disruption of our information technology resources by a third-party, social engineering attempts, natural disaster, hardware or software corruption or failure or error (including a failure of security controls incorporated into or applied to such hardware or software), telecommunications system failure, service provider error or failure, intentional or unintentional personnel actions (including the failure to follow our security protocols) or lost connectivity to networked resources.
There has been an increase in cyber-attacks in recent years. Breaches of our data security systems, including by cyber-attacks, could result in the unintended public disclosure or the misappropriation of our proprietary information or personal and confidential information, about our employees, consumers who view our homes, homebuyers or our business partners, which could require us to incur significant expense to address and resolve such issues. The release of confidential information may also lead to identity theft and related fraud, litigation or other proceedings against us by affected individuals, business partners and/or regulators, and the outcome of such proceedings, which could include penalties or fines, and any significant disruption of our business could have a material and adverse effect on our reputation resulting in the loss of customers, sales and revenue.
Data protection and privacy laws continue to evolve and become more complex in various U.S. federal and state jurisdictions. Such regulatory changes, variations in requirements across jurisdictions and ongoing discussions about a national privacy laws could present compliance challenges. The costs of complying with such changes could adversely affect our business.
We maintain insurance coverage for potential breaches but the costs to remedy a breach may not be fully covered by our insurance. We provide employee awareness training of cybersecurity threats and utilize information technology security experts to assist us in our evaluations of the effectiveness of the security of our information technology systems, and we regularly enhance our security measures to protect our systems and data. We use various encryption, tokenization and authentication technologies to mitigate cybersecurity risks and have increased our monitoring capabilities to enhance early detection and rapid response to potential cyber threats. While we have not had a significant cybersecurity breach or attack that had a material impact on our business or operations, there can be no assurance that our efforts to maintain the security and integrity of our information technology systems will be effective or that attempted breaches would not be successful in the future.