We collect, use, and retain large volumes of customer data, including payment card numbers and other personal information for business, marketing, and other purposes, and our various information technology systems capture, process, summarize, and report such data. We also maintain personal information and other data about our colleagues, as well as other forms of proprietary business information such as trade secrets. We store and process such customer, colleague, and Company data both at onsite facilities and at third-party owned facilities including, for example, in third-party hosted cloud environments. We also rely on the availability of information technology systems to operate our business, including communications; reservations; digital platforms, including the loyalty program and paid membership program; guest services; payments; and other general operations. The availability and protection of customer, member, colleague, and Company data, as well as the continuous operation of our systems, are critical to our business. Our customers and colleagues expect that we, as well as our third-party owners, franchisees, licensees, hospitality venture partners, and service providers, will adequately protect their personal information and that our services will be continuously available.
The regulations and contractual obligations applicable to security and privacy are increasingly demanding, both in the United States and in other jurisdictions where we operate, and cyber threat actors regularly target the hospitality industry, including our business. In addition, the scope and complexity of the cyber-threat landscape could affect our ability to adapt to and comply with changing regulatory obligations and expectations. Because of the scope and complexity of our information technology structure, our reliance on third party hardware, software, and services to support and protect our structure and data, and the constantly evolving cyber-threat landscape, our systems are vulnerable to disruptions, failures, unauthorized access, cyber-terrorism, adverse action by state actors, malfeasance by insiders, human error, negligence, fraud, or other misuse. Moreover, our systems, colleagues, and customers have been, and we expect will continue to be, targeted by social engineering attacks or account takeover tactics that may, among other things, aim to obtain funds or information fraudulently. These or similar occurrences, whether accidental or intentional, have in the past, and could in the future, result in an interruption in the operation of our systems or theft, unauthorized access, disclosure, destruction, encryption by ransomware, loss, and fraudulent or unlawful use of customer, colleague, or Company data, all of which has in the past, and could in the future, impact our business, result in operational interruptions, inefficiencies or loss of business, create negative publicity, cause harm to our reputation, or subject us to remedial and other costs, fines, penalties, investigations, enforcement actions, or lawsuits. Additionally, we increasingly rely on third-party owners, franchisees, licensees, and hospitality venture partners who operate their own networks and systems and engage with their own service providers, and a security incident involving such networks or systems could lead to an interruption in, or other adverse effects on, our business, resulting in operational inefficiencies, potential exposure to fines or litigation, or loss of business, and negative publicity and reputational harm.
In addition, we may be subject to data risks and cybersecurity vulnerabilities as part of acquisition activities. Our due diligence and post-acquisition assessments of an acquiree's cybersecurity controls and procedures and information technology systems may not be sufficient to detect current or prior security incidents that have not yet been detected or to identify security measures that are not sufficient to appropriately address security risks to data and business continuity. Any such security incidents may pose material cybersecurity risks, including risks of theft, unauthorized access, disclosure, loss, and fraudulent use of customer colleague, or Company data.
We have previously detected and disclosed prior incidents involving cyber threat actors who have attacked our systems, as well as those operated by third-parties. We expect ongoing attempts to gain access to our systems and those operated by our third-party owners, franchisees, licensees, hospitality venture partners, and vendors. We also may be victims of current or future software supply-chain incidents, even if those incidents are not directly targeted at Hyatt. We continue to use an evolving privacy and security risk management framework utilizing risk assessments to identify priorities for enhancements and security updates. While we implement security measures designed to safeguard our systems and data and have business continuity measures, and intend to continue implementing additional measures in the future, our implementation efforts may be incomplete or our measures may not be sufficient or timely enough to maintain the confidentiality, security, or availability of the data we collect, store, and use to operate our business. We work to continuously evaluate our security posture throughout our business and make changes to our operating processes and improve our defenses. Nonetheless, there can be no assurance that our cybersecurity risk management program and processes, including our policies, controls, or procedures, will be fully implemented, complied with, or effective in protecting our systems and information. Attackers are also increasingly sophisticated and using techniques and tools, including artificial intelligence ("AI"), that can circumvent security controls, evade detection and remove forensic evidence. As a result, we may be unable to detect, investigate, remediate or recover from future attacks or incidents, or to avoid a material adverse impact to our systems, information, or business. Furthermore, although we carry cyber insurance that is designed to protect us against certain losses related to cyber risks, that insurance coverage may not be sufficient or available to cover all expenses or other losses that may occur, such as brand and reputational damage, loss of customers, loss of business partners, regulatory investigations, penalties and fines, legal claims brought by customers or employees, significant system or data restoration, remediation or compliance costs, and/or other liabilities that may arise in connection with cyberattacks, security compromises, and other related incidents. Any future occurrences could result in costs and business impacts that may not be covered or may be in excess of any available insurance that we, or our third-party owners, franchisees, licensees, or hospitality venture partners, may have arranged. Furthermore, in the future such insurance may not be available on commercially reasonable terms, or at all. As a result, future incidents could have a material impact on our business and adversely affect our financial condition and results of operations.