Through our operations, we collect and store, including by electronic means, certain personal, proprietary and other sensitive information, including payment card information, that is provided to us through purchases, registration on our websites or mobile applications, or otherwise in communication or interaction with us. These activities require the use of online services and centralized data storage, including through third-party service providers. Data maintained in electronic form is subject to the risk of security incidents, including breach, compromise, intrusion, tampering, theft, destruction, misappropriation or other malicious activity. The increased use of mobile and cloud technologies heightens these and other operational risks, as do hybrid work arrangements. Our ability to safeguard such personal and other sensitive information, including information regarding the Company and our customers, sponsors, partners and employees, independent contractors and vendors, is important to our business. We take significant steps to protect our stored information, including the implementation of systems and processes to thwart malicious activity. These protections are costly and require ongoing monitoring and updating as technologies change and efforts to overcome security measures become more sophisticated. See "- We Are Subject to Governmental Regulation, Which Can Change, and Any Failure to Comply With These Regulations May Have a Material Negative Effect on Our Business and Results of Operations."
Despite our efforts, the risks of a security incident cannot be entirely eliminated and our information technology and other systems that maintain and transmit customer, sponsor, partner, Company, employee, vendor, independent contractor, and other confidential and proprietary information may be compromised due to employee error or other circumstances such as malware or ransomware, viruses, hacking and phishing attacks, denial-of-service attacks, business email compromises, or otherwise. A compromise could affect the security of information on our network, or that of a third-party service provider, including MSG Entertainment or our vendors' systems to which we outsource information technology services, including technology relating to season ticket holders and purchases of individual game tickets, and certain payment processing. For example, in November 2016, a payment card issue that affected cards used at merchandise and food and beverage locations at several MSG Entertainment's venues, including The Garden, was identified and addressed with the assistance of security firms. The issue was promptly fixed and enhanced security measures were implemented. Additionally, outside parties may attempt to fraudulently induce employees, vendors or users to disclose sensitive, proprietary or confidential information in order to gain access to data and systems. Given the increasing sophistication of bad actors and complexity of the techniques used to obtain unauthorized access or disable systems, a security incident could potentially persist for an extended period of time before being detected. We may not be able to anticipate the incident or respond adequately or timely, and the extent of a particular incident, and the steps that we may need to take to investigate the incident, may not be immediately clear. As a result, our or our customers' or affiliates' sensitive, proprietary and/or confidential information may be lost, disclosed, accessed or taken without consent. See "- Economic and Business Relationship Risks - We Rely on Affiliated Entities' Performance, Including Performance of Financial Obligations, Under Various Agreements" for a discussion of services MSG Entertainment performs on our behalf.
We also continue to review and enhance our security measures in light of the constantly evolving techniques used to gain unauthorized access to networks, data, software and systems. We have expended, and expect to continue to expend, significant expenses on an ongoing basis in order to review and enhance our security measures and to address any actual or potential security incidents that arise, but these measures may be ineffective and we may be subject to legal or regulatory action, as well as financial losses, and we may not have insurance coverage for any or all such losses.
If we experience an actual or perceived security incident, our ability to conduct business may be interrupted or impaired, we may incur damage to our systems, we may lose profitable opportunities or the value of those opportunities may be diminished and we may lose revenue as a result of unlicensed use of our intellectual property. Unauthorized access to or security breaches of our systems could result in the loss of data, loss of business, severe reputational damage adversely affecting customer or investor confidence, diversion of management's attention, regulatory investigations and orders, litigation, indemnity obligations, damages for contract breach, penalties for violation of applicable laws or regulations and significant costs for remediation that may include liability for stolen or lost assets or information and repair of system damage that may have been caused, incentives offered to customers or other business partners in an effort to maintain business relationships after a breach and other liabilities. In addition, in the event of a security incident, changes in legislation may increase the risk of potential litigation. For example, the CCPA, which provides a private right of action (in addition to statutory damages) for California residents whose sensitive personal information is breached as a result of a business' violation of its duty to reasonably secure such information, took effect on January 1, 2020 and was expanded by the CPRA, which took effect in January 2023. A number of other states have passed similar laws and additional states may do so in the near future. Our insurance coverage may not be adequate to cover the costs of a data breach, indemnification obligations, or other liabilities.
We also routinely transmit and receive personal, confidential and proprietary information by email and other electronic means. We have discussed and worked with customers, sponsors, partners, employees, directors, independent contractors and vendors to secure transmission capabilities and protect against cyber incidents, but we do not have, and may be unable to put in place, secure capabilities with all of our customers, sponsors, partners, employees, directors, independent contractors and vendors and we may not be able to ensure that these third parties have appropriate controls in place to protect the confidentiality of the information. An interception, misuse or mishandling of personal, confidential or proprietary information being sent to or received from a client, vendor, service provider, counterparty or other third party could result in legal liability, regulatory action and reputational harm.
In addition, new regulations require us to disclose information about material cybersecurity incidents on a timely basis, including those that may not have been resolved or fully investigated at the time of disclosure, or, in some instances, we may have obligations to notify relevant stakeholders of security breaches. Such mandatory disclosures are costly, could provide information to bad actors, could lead to negative publicity, may cause our customers to lose confidence in the effectiveness of our security measures and may require us to expend significant capital and other resources to respond to or alleviate problems caused by an actual or perceived security breach.