As noted above in Item?1, "Business - Factors Significant to the Company's Operations - Technology," the Company's information technology systems used in connection with its operations are located in Jacksonville, Florida and to a lesser extent in Rockford, Illinois. In addition, the Company utilizes several third party data centers throughout the United States. Landstar relies, in the regular course of its business, on the proper operation of its information technology systems to link its extensive network of customers, employees, agents and third party capacity providers, including its BCO Independent Contractors. Moreover, a majority of the Company's employees work remotely or on a hybrid basis. Although the Company has redundant systems for its critical operations, any significant disruption or failure of its technology systems or those of third party data centers on which it relies could significantly disrupt the Company's operations and impose significant costs on the Company. Moreover, it is critical that the data processed by or stored in the Company's information technology systems or otherwise in the Company's possession remain confidential, as it often includes confidential, proprietary and/or competitively sensitive information regarding our customers, employees, agents and third party capacity providers, key financial and operational results and statistics, and our strategic plans, including technology innovations, developments and enhancements. Cyber incidents that impact the security, availability, reliability, speed, accuracy or other proper functioning of these systems and data, including outages, computer viruses, break-ins and similar disruptions, could have a significant impact on our operations. Accordingly, information security and the continued development and enhancement of the controls and processes designed to protect our systems, computers, software, data and networks from attack, damage or unauthorized access remain a priority for us. Our information systems and those of our third party service providers have been, and will likely continue to be, targeted by or subject to viruses, malware or other malicious codes, unauthorized access, cyber-attacks, cyber frauds, ransomware or other unauthorized occurrences which jeopardize the confidentiality, integrity or availability of our information or information systems. Cybersecurity threats are rapidly evolving and those threats and the means for obtaining access to our systems are becoming increasingly sophisticated. Cybersecurity threats can originate from a wide variety of sources including terrorists, nation states, financially motivated actors, hacktivists, internal actors, or third parties, such as external service providers or other third parties who may use an external service provider as a conduit to access our systems, and the techniques used change frequently and often are not recognized until after they have been launched. The rapid evolution and increased adoption of artificial intelligence technologies may intensify our cybersecurity risks including the deployment of artificial intelligence technologies by threat actors. Although we believe that we have robust security procedures and other safeguards in place, as threats continue to evolve, we may be required to expend additional resources to continue to enhance our information security measures and/or to investigate and remediate any security vulnerabilities. At any given time, we face known and unknown cybersecurity risks and threats that are not fully mitigated, and we may discover vulnerabilities as we continuously work to enhance our cybersecurity risk management program. A significant incident, including system failure, security breach, disruption by malware or ransomware, or other damage, could interrupt or delay our operations, damage our reputation with customers, agents, third party capacity providers, employees, vendors, investors or other stakeholders, cause a loss of customers, agents and/or third party capacity providers, expose us to a risk of loss or litigation, and/or cause us to incur significant time and expense to remedy such an event, any of which could have a material adverse impact on our results of operations and financial condition.
Although the Company maintains cybersecurity and business interruption insurance, the Company's insurance may not be adequate to cover all losses that may be incurred in the event of a significant disruption or failure of its information technology systems. In addition, cybersecurity and business interruption insurance could in the future become more expensive and difficult to maintain and may not be available on commercially reasonable terms or at all.