As our brand profile and our reliance on technology has increased, so have the risks posed to our systems, both internal and those we have outsourced. Additionally, there has been an increase in data integration and complexity of our technology systems, particularly in our international markets. Our information technology systems include the use of electronic payment methods and the collection and storage of personal information from individuals, which may expose us and our franchisees to increased risk of cyber incidents, privacy and/or security breaches or intrusions, and other risks. We rely on commercially available systems, software, tools and monitoring to provide security for processing, transmitting, and storing such information. The use of personally identifiable information by us is regulated by foreign, federal, and state laws, which continue to evolve, as well as by certain third-party agreements. As privacy and information security laws and regulations change, we may incur additional costs to ensure that we remain in compliance with those laws and regulations. See "Changing regulations relating to privacy, information security, and data protection could increase our costs and affect or limit how we collect and use personal information" below for a further discussion on privacy, information security, and data protection regulations.
Our franchisees, contractors and third parties with whom we do business have experienced cyber incidents and security breaches or intrusions in which confidential or personal information could have been stolen and we, our franchisees, contractors and third parties with whom we do business may experience cyber incidents and security breaches or intrusions in which confidential or personal information is stolen in the future. Third parties may have the technology or know-how to breach the security of confidential or personal information collected, stored or transmitted by us or our franchisees, and our and their security measures and those of third parties with whom we do business, including technology vendors, solution providers, software manufacturers and supply chain vendors, may not effectively prohibit others from obtaining improper access to this information. Third parties have been and will likely be able to continue to develop and deploy viruses, worms and other malicious software programs, such as ransomware, that attack our, our franchisees' and third parties with whom we do business's systems or otherwise exploit any security vulnerabilities. The techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently and are often difficult to detect for long periods of time, which may cause a breach to go undetected for an extensive period of time. Advances in computer and software capabilities, technology, new tools, and other developments may increase the risk of such a breach. If a person is able to circumvent the security measures of our business, our franchisees' businesses or those of other third parties, he or she could destroy or steal valuable information or disrupt the operations of our business. In addition, our franchisees, contractors or third parties with whom we do business or to whom we outsource business operations may attempt to circumvent our security measures in order to misappropriate confidential information and may purposefully or inadvertently cause a breach involving such information. The costs to us to eliminate any of the foregoing cybersecurity vulnerabilities or to address a cyber incident could be significant and have material adverse impact on our business, financial condition, and results of operations. The rapid evolution and increased adoption of artificial intelligence technologies may intensify our cybersecurity risks.
If we, our employees, franchisees, or vendors fail to comply with applicable laws, regulations, or contract terms, and covered information is obtained by unauthorized persons, used inappropriately, or destroyed, it could adversely affect our reputation, disrupt our operations and result in costly litigation, judgments, or penalties resulting from violation of laws and payment card industry regulations. Any such claim or proceeding could cause us to incur significant unplanned expenses and significantly harm our reputation, which could have a material adverse impact on our business, financial condition, and results of operations. A cyber incident could also require us to provide notifications, result in adverse publicity, loss of sales and profits, increase fees payable to third parties, and result in penalties or remediation and other costs that could materially adversely affect the operation of our business, financial condition, and results of operations. In addition, our cyber liability coverage may be inadequate or may not be available in the future on acceptable terms, or at all, and defending a suit, regardless of its merit, could be costly and divert management's attention.