In connection with our business, we and our service providers collect and retain large volumes of certain types of personal and proprietary information pertaining to our customers, shareholders, and employees. Such information includes, but is not limited to, large volumes of customer credit and payment card information, customer travel documents, other identification documents, account numbers, and other personally identifiable information. We are subject to attack by cyber-criminals (including nation state-sponsored or nation state-supported organizations, terrorist organizations, criminal enterprises and other actors) operating on a global basis attempting to gain access to such information as well as our source code information, and the integrity and protection of that customer, shareholder, and employee data and proprietary information is critical to us.
While we maintain what we believe are reasonable security controls over personal and proprietary information (including the personal information of customers, shareholders, and employees), and our information technology staff regularly assesses and seeks to identify vulnerabilities in our information technology and cybersecurity systems and controls, breaches of or breakdowns in our systems that result in the theft, loss, access to, fraudulent use or other unauthorized release of personal, confidential or other proprietary information, source code information, or other data have occurred in the past and may occur in the future. While we have sought and will continue to seek to appropriately address and remedy these vulnerabilities as they are identified, we cannot assure you that all such vulnerabilities will be adequately or timely remediated to prevent unauthorized access to our information technology systems in the future.
In addition, any such cyber-attacks could persist for an extended period of time without detection, which could likely have a material adverse effect on our brands, reputation, customer confidence, business, financial condition and results of operations, as well as subject us to significant regulatory actions and fines, litigation, losses, third-party damages and other liabilities. Such a breach or a breakdown could also materially increase our costs to protect such information and to protect and insure against such risks. Our and our third-party service providers' vulnerability to attack exists in relation to known and unknown threats. As a consequence, the security measures we deploy are not perfect or impenetrable, and we may likely be unable to anticipate or prevent all unauthorized access attempts made on our systems or those of our third-party service providers.
Data breaches and other serious cyber incidents have increased globally, along with the sophistication of the methods and techniques of the intrusions and complexity of the attacks, including use of viruses, ransomware and other malicious software, phishing, deepfake technology, artificial intelligence ("AI") technology, and other ever-evolving efforts to discover and exploit any design flaws, bugs or other security vulnerabilities. Continued geopolitical turmoil (including the ongoing conflict between Russia and Ukraine and the ongoing conflicts in the Middle East) has heightened the risk of cyber-attacks. We have experienced and likely will continue to experience such cyber-attacks. Further, because methods used by third-party actors to obtain unauthorized access to or interference with information systems are ever-evolving, they may not be identified until long after they are used against a target and, as a result, our cybersecurity measures then in place may be inadequate in preventing any such intrusion or in identifying or assessing the breadth or significance of any such intrusion. Also, the same cybersecurity threats exist for the third parties with whom we interact (such as parties providing us software or services) or share information, and cyber-attacks on third parties with which we interact or which possess, use or have access to our customer, and other information have in the past adversely impacted us in the same way as a direct cyber-attack on us. Additionally, we currently have a hybrid work environment in which many corporate associates work both in the office and remotely on an ongoing basis.
The increase in the number of our associates working remotely has increased certain risks to our business, including increased demand on our information technology resources and systems, and greater potential for phishing and other cybersecurity attacks.
While to date no such cyber-attacks have had, individually or in the aggregate, any known material adverse impact on our operations or financial results, we cannot guarantee that cyber-attacks have not gone generally undetected or without general recognition of magnitude or will not continue to occur in the future, any of which could materially adversely affect our brands, reputation, consumer confidence in us, costs, and profitability.
Our information technology infrastructure (including our, and our third-party service providers', information systems and legacy proprietary online reservation and management systems) has been and will likely continue to be vulnerable to system failures such as server malfunction or software or hardware failures, computer hacking, phishing attacks, user error, cyber-terrorism, loss of data, computer viruses, ransomware and malware installation, deepfake technology, and other intentional or unintentional interference, negligence, fraud, misuse and other unauthorized attempts to access or interfere with these systems, including through the use of AI technology, and our personal and proprietary information. In addition, as we continue to transition from our legacy systems to new, cloud-based technologies and other technology systems, we will likely continue to face issues that may negatively impact customers, other individuals and third parties. In addition, as we pursue new initiatives that are designed to improve our operations and cost structure, the expansion and implementation of new technologies and systems (including our increasing use, and the likely increasing use by our third-party service providers, of AI technologies carries significant potential risks, including failure to operate as designed, potential loss of or corruption of information, changes in security processes, implementation delays, and disruption of operations. The increased scope and complexity of our information technology infrastructure and systems could contribute to the risk of future material security breaches or breakdowns, any of which could have a material adverse impact on our business, brands, reputation, and results of operations. Further, if we fail to fully assess, identify and address all cybersecurity risks associated with acquisitions (such as our acquisition of Accor Vacation Club) or fail successfully to integrate all information technology systems of such acquired businesses into and with our existing technology framework and cybersecurity controls, we would become increasingly vulnerable to all of the above risks.