Our business requires collection, processing, and retention of large volumes of data, including personally identifiable information of our customers in various information systems that we maintain and in those maintained by third parties with whom we contract, including in areas such as customer product servicing, human resources outsourcing, website hosting, and various forms of electronic communications. We and third parties who provide services to us also maintain personally identifiable information about our employees. The integrity and protection of that customer, employee, and company data, including proprietary information, is critical to us. If that data is inaccurate or incomplete or inaccessible, we may make faulty decisions or experience business interruptions. Despite the security measures we have in place, our facilities and systems, and those of the retailers, dealers, licensees and other third-party suppliers and vendors with which we do business, may be vulnerable to cybersecurity threats, attacks or incidents, failures or disruptions, acts of vandalism or misconduct, computer viruses, misplaced or lost data, programming and/or human errors or other similar events. Any cybersecurity incidents involving the misappropriation, loss or other unauthorized disclosure of customer, employee, supplier or Company information, whether caused by us, an unknown third party, or the retailers, dealers, licensees or other third-party suppliers and vendors with which we do business, could result in losses, severely damage our reputation, expose us to the risks of litigation and liability, disrupt our operations and have a material adverse effect on our business, results of operations and financial condition. As cybersecurity threats may evolve in sophistication and become more prevalent worldwide, we continue to aim to increase our sensitivity and attention to these threats, seek additional investments and resources to address these threats and enhance the security of our facilities and systems and strengthen our controls and procedures to monitor, protect against and mitigate these threats. The domestic and international legal and regulatory environment related to information security, data collection and privacy is increasingly rigorous and complex, with new and constantly changing requirements applicable to our business.
Compliance with these requirements, including the European Union's General Data Protection Regulation ("GDPR"), China's newly enacted Personal Information Protection Law ("PIPL") and other domestic (including state law) and international regulations, could result in additional costs and changes to our business practices.
Moreover, we rely heavily on computer systems and software to manage and operate our business, record and process transactions, and manage, support and communicate with our employees, customers, suppliers, vendors, and other third parties. Computer systems and software are important to production planning, finance, company operations and customer service, among other business-critical processes. Despite our efforts to prevent disruptions to our computer systems and software, these systems and software may be affected by damage, disruption, attack, or interruption from, among other causes, power outages, system failures, computer viruses, the development of harmful malware or ransomware, denial-of-service attacks and other intrusions, including cybersecurity incidents and other disruptions or failures. Cybersecurity threat actors also may attempt to exploit vulnerabilities through software that is commonly used by companies in cloud-based services and bundled software. Computer hardware and storage equipment that is integral to efficient operations, such as email, telephone and other functionality, is concentrated in certain physical locations in the various continents in which we operate. We rely on software applications, enterprise cloud storage systems and cloud computing services provided by third-party vendors, and our business may be adversely affected by service disruptions in or cybersecurity incidents and disruptions and failures related to such systems. Remote work and remote access to our systems has increased, which also increases the risk of cybersecurity incidents and disruptions and failures on our systems surface. In addition, there has been a global increase in cybersecurity threat volume, frequency, and sophistication driven by the global enablement of remote workforces. Geopolitical tensions or conflicts, such as Russia's invasion of Ukraine, may further heighten the risk of cybersecurity incidents and disruptions of our services and software on which we rely. We continue to try to mitigate these risks in a number of ways, including through additional investment, engagement of third-party experts and consultants, improving the security of our facilities and systems (including through upgrades to our security and information technology systems), providing training for all employees (with more enhanced or frequent training based on role or responsibility), assessing the continued appropriateness of relevant insurance coverage and strengthening our controls and procedures to monitor, mitigate and respond appropriately to these threats. We carry cyber insurance, and while we have not incurred any material losses due to any failure of or disruptions to our systems, or from any cybersecurity incidents, we cannot be certain that our coverage will be adequate for liabilities actually incurred, that insurance will continue to be available to us on economically reasonable terms, or that any insurer will not deny coverage as to any future claim.
As part of our QuickSet Cloud feature delivery, our cloud data captures device information and data elements that are used to enhance product performance and create a more personalized consumer experience. These features, and any device specific data are delivered for use by our customers and not sold to third parties. While QuickSet Cloud services a subset of the data used by QuickSet, the majority of the data is captured, analyzed and stored on the device, and in the home, and is not stored outside of the home. This includes the more personal and private data classes such as content usage and user occupancy and presence.