Operating our business and platform involves the collection, use, storage, and transmission of sensitive, proprietary, and confidential information, including personal information of customers, our personnel, the personnel of our business partners, and others. For example, we collect certain customers' home and/or business addresses for processing delivery orders, mobile phone numbers from users of our platform, and personal information from our personnel, including in the administration of our benefit plans.
Security incidents compromising the confidentiality, integrity, and availability of our sensitive, proprietary, and confidential information and information technology systems, and those of the third parties with whom we work, could result from cyber-attacks, malicious internet-based activity, online and offline fraud, and other similar activities. Such threats are prevalent and continue to rise, are increasingly difficult to detect, and come from a variety of sources, including traditional computer "hackers," threat actors, "hacktivists," organized criminal threat actors, personnel (such as through theft or misuse), sophisticated nation states, and nation-state-supported actors. As an example, in fiscal year 2024, a third party with whom we work suffered a distributed denial of service (DDoS) attack, which temporarily limited some of our customers' ability to access their online Sweetgreen accounts and transact in certain of our Owned Digital Channels.
Some threat actors now engage and are expected to continue to engage in cyber-attacks, including without limitation nation-state actors, for geopolitical reasons and in conjunction with military conflicts and defense activities. During times of war and other major conflicts, we and the third parties with whom we work may be vulnerable to a heightened risk of these attacks, including retaliatory cyber-attacks, that could materially disrupt our systems and operations, supply chain, and ability to produce, sell, and distribute our goods and services.
We and the third parties with whom we work are subject to a variety of evolving threats, including but not limited to social-engineering attacks (including through phishing attacks), malicious code (such as viruses and worms), malware (including as a result of advanced persistent threat intrusions), denial-of-service attacks (such as credential stuffing), credential harvesting, personnel misconduct or error, ransomware attacks, software bugs, supply chain attacks, server malfunctions, software or hardware failures, loss of data or other information technology assets, adware, telecommunications failures, earthquakes, fires, floods, attacks enhanced or facilitated by AI, and other similar threats. In particular, severe ransomware attacks are becoming increasingly prevalent and could lead to significant interruptions in our operations, loss of sensitive data and income, reputational harm, and diversion of funds. Extortion payments may alleviate the negative impact of a ransomware attack, but we may be unwilling or unable to make such payments due to, for example, applicable laws or regulations prohibiting such payments. Additionally, remote work has increased risks to our information technology systems and data, as more of our employees utilize network connections, computers and devices outside our premises or network, including working at home, while in transit, and in public locations.
Security incidents have occurred in the past, and may occur in the future, resulting in unauthorized, unlawful, or inappropriate access to, inability to access, disclosure of, or loss of the sensitive, proprietary, and confidential information that we handle. For example, in the first fiscal quarter of 2024, we experienced multiple incidents of what we believe to be credential stuffing activity, in which malicious third parties accessed our online services by using credentials that may have been compromised in security incidents suffered by different services. We implemented security measures in response to this activity, and believe those security measures have thwarted such activity. However, these measures may not be adequate to ensure that our operations are not further disrupted, or that other security incidents do not occur. Risks relating to security incidents are likely to increase as we continue to grow and collect, process, store, and transmit increasingly large amounts of data.
We also rely on a number of third parties to support and operate our critical business systems and process sensitive, proprietary, and confidential information, such as Stripe, our account management provider, the payment processors that process customer credit card payments, and other third-party providers of services including cloud-based infrastructure, data center facilities, encryption and authentication technology, employee email, content delivery to customers, and other functions. Our ability to monitor these third parties' information security practices is limited, and these third parties may not have adequate security measures and could experience a security incident that compromises the confidentiality, integrity, or availability of the systems they operate for us or the information they process on our behalf. Moreover, the risk of circumvention of our security measures or those of our third parties with whom we work has been heightened by advances in computer and software capabilities and the increasing sophistication of actors who employ complex techniques. In particular, supply-chain attacks have increased in frequency and severity, and we cannot guarantee that third parties' infrastructure in our supply chain or our third-party partners' supply chains have not been compromised. Cybercrime and hacking techniques are constantly evolving, and we or third parties with whom we work may be unable to anticipate attempted security incidents, react in a timely manner, or implement adequate preventative measures, particularly given increasing use of hacking techniques designed to circumvent controls, avoid detection, and remove or obfuscate forensic artifacts. We have experienced adverse consequences from security incidents and other interruptions at our third-party service providers, and could experience additional adverse consequences from such incidents and interruptions in the future. While we may be entitled to damages if our third-party service providers fail to satisfy their data privacy or security-related obligations to us, any award may be insufficient to cover our damages, or we may be unable to recover such award.
Additionally, future or past business transactions (such as acquisitions or integrations) could expose us to additional cybersecurity risks and vulnerabilities, as our systems could be negatively affected by vulnerabilities present in acquired or integrated entities' systems and technologies. Furthermore, we may discover security issues that were not found during due diligence of such acquired or integrated entities, and it may be difficult to integrate companies into our information technology environment and security program.
Any of the previously identified or similar threats could cause a security incident or other interruption that could result in unauthorized, unlawful, or accidental acquisition, modification, destruction, loss, alteration, encryption, disclosure of, or access to our sensitive information or our information technology systems, or those of the third parties with whom we work. Because of the prominence of our brand, we believe that we are an attractive target for cyberattacks, which have increased in the industry. We have implemented security measures designed to detect and remediate vulnerabilities in our information security systems (such as our hardware and/or software, including that of third parties with whom we work), prevent security incidents, and to protect the confidentiality, integrity, and availability of our systems and the sensitive, proprietary, and confidential information under our control. However, despite any measures that we have taken to increase our cybersecurity, we cannot guarantee you that the measures that we or the third parties we work with have implemented will always be followed and/or be effective against current or future security threats or detect, mitigate, and remediate all vulnerabilities on a timely basis. We expend significant resources and modify our business activities to try to protect against security incidents. The costs to respond to a security incident and/or to mitigate any security vulnerabilities that may be identified could be significant and these problems could result in unexpected interruptions, delays, cessation of service, negative publicity, and other harm to our business and our competitive position. Further, we may experience delays in developing and deploying remedial measures designed to address any such identified vulnerabilities.
If we or the third parties we work with suffer, or are perceived to have suffered, a security incident, we may experience a loss of customer and partner confidence in the security of our platform and damage to our brand, reduced demand for our offerings, and disruption of normal business operations. Such incidents have required us, and may in the future require us to spend resources to investigate and correct the issue and to prevent recurrence, and expose us to legal liabilities, including litigation, regulatory enforcement, and indemnity obligations, which could have an adverse effect on our business, financial condition and results of operations. Additionally, our agreements with our material third-party partners, such as Stripe and DoorDash, require us to maintain adequate security measures and not subject their confidential information to a security incident. If we were to breach those contractual obligations, we could be responsible for indemnifying our partners for any losses associated with such an incident. Future acquisitions of, or utilization of, new information technology infrastructure could also expose us to additional cybersecurity risks and vulnerabilities.
Laws in all states and U.S. territories require businesses to notify affected individuals, governmental entities, and/or credit reporting agencies of certain security incidents affecting personal information. Such laws are varied, and compliance in the event of a widespread security incident is complex, costly, and difficult to implement. Our existing general liability and cyber liability insurance policies may not cover, or may cover only a portion of, any potential claims related to security breaches to which we are exposed or may not be adequate to indemnify us for all or any portion of liabilities that may be imposed. We also cannot be certain that our existing insurance coverage will continue to be available on acceptable terms or in amounts sufficient to cover the potentially significant losses that may result from a security incident or breach or that the insurer will not deny coverage of any future claim.
In addition to experiencing a security incident, third parties may gather, collect, or infer sensitive information about us from public sources, data brokers, or other means that reveals competitively sensitive details about our organization and could be used to undermine our competitive advantage or market position. Additionally, sensitive information of the company or our customers could be leaked, disclosed, or revealed as a result of or in connection with our employees', personnel's, or vendors' use of generative artificial intelligence ("AI") technologies.