We rely on information technology systems and infrastructure, including support provided by third parties. In particular, we rely on such systems for manufacturing, customer orders, shipping, regulatory compliance and various other matters, as well as information technology systems and infrastructure to aid us in the collection, use, storage and transfer and other processing of data including confidential, business, financial and personal information such as customer buying preferences and marketing profiles. We, or third-party systems that we rely upon, may be subject to information technology system failures and network disruptions caused by delays or disruptions due to system updates, natural disasters, malicious attacks and threats, accidents, power disruptions, telecommunications failures, acts of terrorism or war, computer viruses, physical or electronic break-ins, or similar events or disruptions.
In addition, our businesses have implemented and may implement in the future, digital systems or technologies, enterprise resource planning systems or additional applications to replace outdated systems and to operate more efficiently. We may not be able to successfully implement these projects without experiencing difficulties, which could require significant financial and human resources and may impact our ability to efficiently service our customers. Any expected benefits of implementing projects might not be realized or the costs of implementation might outweigh the benefits realized. If our information technology and other digital systems are damaged or fail to function properly or reliably, we may incur substantial remediation costs and experience data loss or theft, disruptions in our business operations and the impairment of our ability to maintain adequate internal controls and financial reporting. Moreover, we have acquired and may acquire in the future, businesses and subsidiaries that operate information technology systems that are distinct from our operating environment, which may result in significant integration or replacement issues or expenses.
We may be subject to security threats, including cyber and other attacks, which are becoming increasingly sophisticated, frequent and adaptive. In addition, many of our associates are working remotely, which, among other things, increases the importance of and exposes us to greater risks related to cybersecurity and our information technology systems. Third-party systems that we rely upon could also become vulnerable to the same risks and may contain defects in design or manufacture or other problems that could result in system disruption or compromise the information security of our own systems. From time to time, we have had to address non-material security incidents. There can be no assurance that we will not experience security incidents in the future. Security measures and resources we devote to network security, data encryption and other security measures to protect our systems and data cannot provide absolute security. Breaches and breakdowns affecting our information technology systems or protected data could lead to negative publicity, legal claims, extortion, ransom, theft, modification or destruction of proprietary information or key information, damage to or inaccessibility of critical systems, manufacture of defective products, production downtimes, operational disruptions, data breach claims, privacy violations and other significant costs.