Security incidents have become more prevalent across industries and may occur on our systems. Security incidents may be caused by, or result in but are not limited to, security breaches, computer malware or malicious software, computer hacking, unauthorized access to confidential information, denial of service attacks, security system control failures in our own systems or from vendors we use, email phishing, software vulnerabilities, social engineering, sabotage and drive-by downloads. Such security incidents, whether intentional or otherwise, may result from actions of hackers, criminals, nation states, vendors, employees or customers.
We may experience disruptions, data loss, outages and other performance problems on our systems due to service attacks, unauthorized access or other security related incidents. Any security breach or loss of system control caused by hacking, which involves efforts to gain unauthorized access to information or systems, or to cause intentional malfunctions or loss, modification or corruption of data, software, hardware or other computer equipment and the inadvertent transmission of computer malware could harm our business.
In addition, our software stores and transmits customers' confidential business information in our facilities and on our equipment, networks, corporate systems and in the cloud. Security incidents could expose us to litigation, remediation costs, increased costs for security measures, loss of revenue, damage to our reputation and potential liability. Our customer data and corporate systems and security measures may be compromised due to the actions of outside parties, employee error, malfeasance, capacity constraints, a combination of these or otherwise and, as a result, an unauthorized party may obtain access to our data or our customers' data. Outside parties may attempt to fraudulently induce our employees to disclose sensitive information in order to gain access to our customers' data or our information. We must continuously examine and modify our security controls and business policies to address new threats, the use of new devices and technologies, and these efforts may be costly or distracting.
Because the techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently or may be designed to remain dormant until a predetermined event and often are not recognized until launched against a target, we may be unable to anticipate these techniques or implement sufficient control measures to defend against these techniques. Though it is difficult to determine what harm may directly result from any specific incident or breach, any failure to maintain confidentiality, availability, integrity, performance and reliability of our systems and infrastructure may harm our reputation and our ability to retain existing customers and attract new customers. If an actual or perceived security incident occurs, the market perception of the effectiveness of our security controls could be harmed, our brand and reputation could be damaged, we could lose customers, and we could suffer financial exposure due to such events or in connection with remediation efforts, investigation costs, regulatory fines and changed security control, system architecture and system protection measures.