We rely on our own and third-party service providers' information technology systems and infrastructure to connect with our clients, people and others, and to collect, store, transfer, process and use business, personal and financial data. We face cybersecurity risks that threaten the confidentiality, integrity and availability of our information technology systems or data stored on such systems. Additionally, hardware, software applications or services that we develop or procure from third parties may contain defects in design or manufacture or other problems that could compromise the confidentiality, integrity or availability of our information technology systems or data stored on such systems.
Cybersecurity threats and attacks, including computer viruses, advanced persistent threats, malware, hacking, ransomware or other destructive or disruptive activities or software, are constantly evolving and pose a risk to our information technology systems and data. There can be no assurance that our cybersecurity risk management program and processes will be fully implemented, complied with or effective in detecting and preventing such threats or protecting our information technology systems or data. Security breaches, improper use of our systems and unauthorized access to our data and information by employees and others may pose a risk that data may be exposed to unauthorized persons. Such occurrences could adversely affect our business, results of operations, financial position and reputation and could result in litigation or regulatory action, as discussed below.
In addition, we make extensive use of third-party service providers, including cloud providers, that store, transmit and process data. These third-party service providers are also subject to malicious attacks and cybersecurity threats that could adversely affect our business, results of operations, financial condition and reputation and could result in litigation or regulatory action, as discussed below.
Currently, many of our agencies operate in a flexible working environment that allows for partial remote work. The number of personnel working remotely varies by market and is dependent on local conditions. When our employees work remotely, the risk of cybersecurity incidents and attacks and unauthorized exposure of sensitive business and client advertising and marketing information, as well as personal data or information, increases.
We and certain of our third-party providers regularly experience cyberattacks and other incidents, and we expect such attacks and incidents to continue. For example, we have experienced cybersecurity incidents that resulted in the disruption of our information technology systems and required us to engage third parties to remediate the issues. While to date no incidents have had a material impact on our operations or financial results, we cannot guarantee that material incidents will not occur in the future. Any attack or incident could result in legal claims or proceedings (such as class actions), regulatory investigations and enforcement actions, fines and penalties, negative reputational impacts, and/or significant incident response, system restoration or remediation and future compliance costs, which could materially adversely affect our business, results of operations and financial condition. We also cannot guarantee that any such costs or losses will be covered by our existing insurance policies or that applicable insurance will be available to us in the future on economically reasonable terms or at all.