In the ordinary course of our business, we collect and store sensitive data, including intellectual property, personal information, our proprietary business information and that of our customers, suppliers and business partners, and personally identifiable information of our customers and employees in our data centers and on our networks. The secure maintenance and transmission of this information is critical to our operations and business strategy. We rely on commercially available systems, software, tools and monitoring to provide security for processing, transmission, and storage of confidential information. Computer hackers may attempt to penetrate our computer systems and, if successful, misappropriate personal or confidential business information. In addition, an employee, contractor, or other third-party with whom we do business may attempt to circumvent our security measures in order to obtain such information and may purposefully or inadvertently cause a breach involving such information. Despite the security measures we have in place and any additional measures we may implement in the future to safeguard our systems and to mitigate potential security risks, our facilities and systems, and those of our third-party service providers, could be vulnerable to security breaches, including the Cyber Incident (as defined below) . If unauthorized parties gain access to our systems or databases, such as with the Cyber Incident, or those of third parties on which we rely, they could be able to steal, publish, delete, hold ransom or modify our private and sensitive information, including payment information, personal information, and confidential and other proprietary business information. The Company, its customers, suppliers and business partners, as well as the Company's employees, could suffer harm if valuable business data, or employee, customer and other confidential and proprietary information were corrupted, lost, accessed or misappropriated by third parties due to a cyber-attack, a security systems failure, or due to one of our third-party service providers or our employees.
Any such compromise of our data security and access, public disclosure, or loss of personal or confidential business information could result in legal claims or proceedings, liability under laws that protect the privacy of personal information, regulatory penalties, disruption of our operations, damage to our reputation, loss of our customers' willingness to transact business with us, and subject us to additional costs and liabilities which could materially adversely affect our business. While we maintain insurance for cyber events, our insurance may not be sufficient to cover us against all losses that could potentially result from a breach of our systems or loss of sensitive data.
Even the most well protected IT networks, systems and facilities remain potentially vulnerable because the techniques used in attempted cybersecurity attacks are continually evolving, and may not be recognized until after the attack is launched against a target or, in some instances, are designed not to be detected and, in fact, may not be detected. Any such compromise of the Company's or any of our partners' IT systems could result in unauthorized access, public disclosure, or loss of personal, sensitive, or confidential business information, could result in legal claims and proceedings, liability under applicable laws and regulatory penalties, and could disrupt the Company's operations, require significant management attention and resources to remedy any damages that result, and damage the Company's reputation and customer willingness to transact business with it, any of which could adversely affect its business.