We employ sophisticated design and testing processes and practices, which include a range of stringent factory and on-site acceptance tests with criteria and requirements that are jointly developed with customers. Our systems may not be successfully implemented, pass required acceptance criteria, or operate or give the desired output, or we may not be able to detect and fix all defects in the satellites, products, hardware and software we sell or resolve any delays or availability issues in the launch services we procure. Failure to do so could result in increased costs, lost revenue and damage to our reputation and may adversely affect our ability to win new contract awards. We manufacture satellites with the intention of receiving full contractual value for builds; however, due to the inherent complexity, a number of adverse variables could negatively impact our ability to collect on the full amount of contractual consideration including circumstances where we may work in advance of customer funding. Such variables include, among others, schedule delays, including those caused by suppliers or major subcontractors, contractual disputes, failure to meet technological requirements and customer solvency concerns. These variables could lead to termination for convenience or default on our contracts which could have a material adverse effect on our financial results. Historically, we have experienced significant delays in the building of certain satellites. The schedule delays we from time to time experience in our satellite builds, some of which are significant, are due to a number of factors, inclusive of COVID-19 delays, subcontractor issues and technological requirements and we work closely with our customers to address these delays. We have, where appropriate, asserted force majeure provisions in our contracts but these can be subject to dispute.
Any significant disruption in or unauthorized access to our computer systems or those of third parties that we utilize in our operations, including those relating to cybersecurity or arising from cyber-attacks, and security threats could result in a loss or degradation of service, unauthorized disclosure of data, or theft or tampering of intellectual property, any of which could materially adversely impact our business.
Our operations, products, solutions, analysis and intellectual property are inherently at risk of loss, unauthorized access, tampering by both insider threats and external bad actors, or disruption due to inadvertent misconfiguration of our computers and networks. In particular, our operations face various cyber and other security threats, including those caused by physical or electronic break-ins, computer viruses, malware, worms, attacks by hackers or foreign governments, disruptions from unauthorized access and tampering, including through social engineering such as phishing attacks, coordinated denial-of-service attacks and similar incidents. These cyber and other security threats could result in attempts to gain unauthorized access to sensitive information, intellectual property, mission operations and networks. Our systems (internal, customer and partner systems) and assets may also be subject to damage or interruption from natural and other disaster events or disruptions including tsunamis, floods, earthquakes, fires, water shortages, other extreme weather conditions, epidemics or pandemics, acts of domestic or foreign terrorism, workplace violence, power shortages and blackouts, aging infrastructures and telecommunications failures. In addition, threats to the safety of our directors and employees, threats to the security of our facilities, infrastructure and supply chain, or the release of misleading or deceptive information by criminal, terrorist, or other bad actors, could have a material adverse impact on our business.
Our products, solutions and analysis that we develop or deliver to our customers are also at risk of disruption, loss, or tampering. The integrity of the data (e.g., pixels), information, and analysis in our products and services is at risk of being manipulated either before or after delivery to a customer. Our products with derived information characteristics are also at risk of being incorrect due to errors of deceptive practices by others.
Our customers and partners (including our supply chain and joint ventures) face similar threats. Customer or partner proprietary, classified, or sensitive information stored on our networks is at risk. Assets and intellectual property and products in customer or partner environments are also inherently at risk. We also have risk where we have access to customer and partner networks and face risks of breach, disruption or loss as well. Our supply chain for products and services also is becoming more diverse and therefore the risk is growing.
We have implemented certain systems and processes to help thwart bad actors and protect our data and our systems and assets. The techniques used to gain unauthorized access are constantly evolving, however, and we may be unable to prevent or mitigate all unauthorized access, disruption, loss, or harm. Because of our highly desired intellectual property and our support of the U.S. government and other governments, we (and/or partners we use) may be a particularly attractive target for such attacks by advanced, persistent and highly organized adversaries, including nation states and