Terrorist attacks or cyber-attacks may affect the energy industry and economic conditions, including our operations and our customers, general economic conditions, consumer confidence and spending, and market liquidity. Strategic targets, such as energy-related assets, may be at greater risk of future attacks than other United States targets. A cyber incident could cause information theft, data corruption, operational disruption, and financial loss. Our insurance may not protect us against such occurrences. It is possible that any of these occurrences, or a combination of them, could have a material adverse effect on our business, financial condition, and results of operations.
We are increasingly dependent on digital technologies, including information systems, infrastructure, and cloud applications and services, to operate our businesses, process and record financial and operating data, communicate with our employees and business partners, analyze seismic and drilling information, estimate quantities of natural gas reserves, and perform other activities related to our businesses. Our business partners, including vendors, service providers, and financial institutions, also depend on digital technology.
As dependence on digital technologies has increased, cyber incidents, including deliberate attacks or unintentional events, have also increased. A cyber-attack could include gaining unauthorized access to digital systems to misappropriate assets or sensitive information, corrupting data, or causing operational disruption, or result in denial-of-service on websites.
Our technologies, systems, networks, and those of our business partners may become the target of cyber-attacks or information security breaches that could cause the unauthorized release, gathering, monitoring, misuse, loss, or destruction of proprietary and other information, or other disruption of our business operations. Some cyber incidents, like surveillance, may remain undetected for a long time.
Deliberate attacks on our assets, or security breaches in our systems or infrastructure, the systems or infrastructure of third-parties or the cloud could lead to corruption or loss of our proprietary data and potentially sensitive data, delays in production or delivery, difficulty completing and settling transactions, challenges in maintaining our books and records, environmental damage, communication interruptions, other operational disruptions, and third-party liability, including:
- a cyber-attack on a vendor or service provider could cause supply chain disruptions, which could delay or halt the development of more infrastructure, effectively delaying the start of cash flows from the project;- a cyber-attack on our facilities may cause equipment damage or failure;- a cyber-attack on mid-stream or downstream pipelines could prevent our products from being delivered, leading to losing revenues;- a cyber-attack on a communications network or power grid could cause operational disruption resulting in loss of revenues;- deliberate corruption of our financial or operational data could cause events of non-compliance leading to regulatory fines or penalties; and - business interruptions could cause expensive remediation efforts, the distraction of management, or damage to our reputation.
Implementation of various controls and processes to monitor and mitigate security threats and increase security for our information, facilities and infrastructure are costly and labor-intensive. There can be no assurance that such measures will prevent security breaches from occurring. As cyber threats continue to evolve, we may have to spend significant additional resources to modify or enhance our protective measures or investigate and remediate any information security vulnerabilities.