We depend on information technology systems and infrastructure to operate our business. In the ordinary course of our business, we collect, store, process, and transmit large amounts of sensitive corporate, personal, and other information, including intellectual property, proprietary business information, user payment card information, user video and audio recordings, other user information, employee information, and other confidential information. It is critical that we do so in a secure manner to maintain the confidentiality, integrity, and availability of such information. Our obligations under applicable laws, regulations, contracts, industry standards, self-certifications, and other documentation may include maintaining the confidentiality, integrity, and availability of personal information in our possession or control, maintaining reasonable and appropriate security safeguards as part of an information security program, and complying with requirements regarding the use or cross-border transfer of such personal information. These obligations create potential legal liability to regulators, our business partners, our users, and other stakeholders and impact the attractiveness of our services to existing and potential users. Data protection laws around the world often require "reasonable," "appropriate," or "adequate" technical and organizational security measures, and the interpretation and application of those laws are often uncertain and evolving, and there can be no assurance that our security measures will be deemed adequate, appropriate, or reasonable by a regulator or court. Moreover, even security measures that are deemed appropriate, reasonable, or in accordance with applicable legal requirements may not be able to protect the information we maintain.
In addition, each U.S. state and most U.S. territories, each EU member state, and the United Kingdom, as well as many other foreign nations, have passed laws requiring notification to regulatory authorities, affected users, or others within a specific timeframe when there has been a security breach involving, or other unauthorized access to or acquisition or disclosure of, certain personal information and impose additional obligations on companies. In addition to potential fines, we could be subject to mandatory corrective action due to a data security incident, and any failure to maintain performance, reliability, security, and availability of our network infrastructure to the satisfaction of our users, business partners, regulators, or other relevant stakeholders may harm our reputation and our ability to retain existing users and attract new users, as well as adversely affect our business operations and result in substantial costs. These obligations create potential legal liability to regulators, our business partners, our users, and other stakeholders and impact the attractiveness of our services to existing and potential users.
We have outsourced or may outsource certain elements of our operations (including elements of our information technology infrastructure) to third parties, or may have incorporated technology into our platform, that collects, processes, transmits, and stores our users' or others' personal information (such as payment card information and user video and audio recordings), and as a result, we manage a number of third-party vendors and other partners who may or could have access to our information technology systems (including our computer networks) or to our confidential information. In addition, many of those third parties in turn subcontract or outsource some of their responsibilities to third parties. As a result, our information technology systems, including the functions of third parties that are involved in or have access to those systems, are very large and complex. Technology system disruptions, whether from attacks on our technology environment or from computer viruses, natural disasters, terrorism, war, foreign invasions, and telecommunications and electrical failures, could result in a material disruption of our product development and our business operations. Significant disruptions of our third-party vendors' or commercial partners' information technology systems or other similar data security incidents could also adversely affect our business operations or result in the loss, misappropriation, or unauthorized access, use or disclosure of, or the prevention of access to, sensitive or personal information, which could harm our business.
The size, complexity, accessibility, and distributed nature of our information technology systems, and the large amounts of sensitive or personal information stored on those systems, make such systems vulnerable to unintentional or malicious, internal, and external threats. Because of our prominence in the TV streaming industry, we believe we may be a particularly attractive target for threat actors. The risk of harm to our business caused by security incidents may also increase as we expand our product and service offerings and as we enter new markets. Vulnerabilities can be, and have been, exploited from inadvertent or intentional actions of our employees, third-party vendors, business partners, or by malicious third parties. Open-source software, which may be incorporated into our systems or products, inherently presents a large attack surface and may contain vulnerabilities of which we are not aware and which we cannot control or fully mitigate. Moreover, AI technologies may be used to implement certain cybersecurity attacks or to increase their intensity, which may further increase risk. While we have processes in place to mitigate the risks related to these vulnerabilities, these measures may not be adequately designed or implemented to ensure that our operations are not disrupted, our reputation is not harmed, or that we will not be impacted by ransomware, cybersecurity attacks, or other vulnerabilities in the future. For example, despite our efforts to secure our information technology systems and the data contained in those systems, we and our third-party vendors and business partners have experienced, and remain vulnerable to, data security incidents, including ransomware, phishing attacks, bot attacks, credential stuffing attacks, improper employee access of confidential data, and inadvertent employee disclosure of confidential data. There is no way of knowing with certainty whether we have experienced any data security incidents that have not been discovered. While we have no reason to believe that we have experienced a data security incident that we have not discovered, we note that attackers continue to advance the ways they conceal their unauthorized access to systems.
Malicious attacks are increasing in their frequency, levels of persistence, sophistication, and intensity, and are being conducted by sophisticated and organized groups and individuals with a wide range of motives (including, but not limited to, industrial espionage) and expertise, including organized criminal groups, "hacktivists," nation states, and others. The geopolitical conflicts stemming from the Russian invasion of Ukraine and the current unrest in the Middle East have increased the risk of malicious attacks on information technology operations globally, including for companies headquartered in the United States, that could materially disrupt our systems and operations, supply chain, and ability to produce, sell, and distribute our devices and services. Any attempts by threat actors to disrupt our streaming platform, streaming devices, smart home products, website, computer systems, or mobile apps, if successful, could harm our business, subject us to liability, be expensive to remedy, cause harm to our systems and operations, damage our reputation, and could result in contractual damages, litigation, governmental inquiries and investigations, enforcement actions, and regulatory notification requirements, fines, and penalties that could harm our business. For example, in the wake of a data breach involving payment card data, we may be subject to substantial penalties for failure to adhere to the technical or operational security requirements of the Payment Card Industry ("PCI") Data Security Standards ("DSS") imposed by the PCI Council to protect cardholder data. Penalties arising from PCI DSS enforcement are inherently uncertain as penalties may be imposed by various entities within the payment card processing chain without regard to any statutory or universally mandated framework. Such enforcement could threaten our relationship with our banks, card brands we do business with, and our third-party payment processors.
Most of our employees have a hybrid work schedule (consisting of both in-person work and working from home). Although we have implemented work from home protocols, the actions of our employees while working from home may have a greater effect on the security of our systems and the data we process, including by increasing the risk of compromise to our systems, intellectual property, or data arising from employees' combined use of personal and private devices, accessing our systems or data using wireless networks that we do not control, or the ability to transmit or store company-controlled data outside of our secured network.
The limitations of liability in our contracts related to our information technology systems may not be enforceable or adequate or otherwise protect us from liabilities or damages. While we maintain insurance policies to cover certain losses relating to our information technology systems, there may be exceptions. Security incidents or certain aspects of security incidents may not be fully covered by our insurance policies or covered at all. Additionally, insurance policies will not protect against the reputational harms caused by a major security incident. The successful assertion of one or more large claims against us that exceeds our available insurance coverage, or results in changes to our insurance policies (including premium increases or the imposition of large deductible or co-insurance requirements), could have an adverse effect on our business. Further, we cannot be sure that our existing insurance coverage and coverage for errors and omissions will continue to be available on acceptable terms or that our insurers will not deny coverage as to any future claim.