We rely on onsite and cloud-based computer systems, hardware, software, technology infrastructure and networks for both internal and external operations that are critical to our business (collectively, "IT Systems"). We own and manage some of these IT Systems but also rely on third parties for a range of IT Systems and related products and services, including but not limited to cloud computing services. We and certain of our third-party providers collect, maintain, transmit, process or store data about our employees, our partners, our customers, and their shoppers, including personal information, payment card information, and proprietary information belonging to our business such as trade secrets (collectively, "Confidential Information"). Third-party applications available on our platform and mobile applications may also store Confidential Information. We generally cannot and do not proactively monitor the content that our customers upload or the information provided to us through the applications integrated with our ecommerce platform; therefore, we do not control the substance of the content on our servers, which may include Confidential Information.
Cyberattacks and other malicious internet-based activity continue to increase, and cloud-based platform providers are expected to continue to be targeted, as threat actors are becoming increasingly sophisticated in using techniques and tools-including artificial intelligence-that circumvent security controls, evade detection and remove forensic evidence. We face numerous and evolving cybersecurity risks that threaten the confidentiality, integrity and availability of our IT Systems and Confidential Information, including from diverse threat actors such as state-sponsored organizations, attackers, and hacktivists, as well as through diverse attack vectors, such as social engineering/phishing, malware (such as viruses, worms, and ransomware), employee theft or misuse, action or inaction by our employees or contractors, human or technological error, denial-of-service attacks, malicious code embedded in open-source software, or misconfigurations, bugs or other vulnerabilities in commercial software that is integrated into our (or our suppliers' or service providers') IT Systems, products, or services. As a result, despite our efforts to create security barriers to such threats, we cannot entirely mitigate these risks. We and our third-party partners and service providers also may face difficulties or delays in identifying, remediating or otherwise responding to, cyberattacks and other security breaches and incidents. As we rely on third-party and public-cloud infrastructure, we depend in part on third-party security measures to protect against unauthorized access, cyberattacks, and the mishandling of Confidential Information. We and certain of our third-party providers have been subject to cyber-attacks and attempts in the past and will continue to be subject to such attacks in the future. Though no such incident to date has had a material impact on our business, we cannot guarantee that we will not experience material or adverse effects from any future incident. We have incurred substantial costs in efforts to protect against and address potential impacts of security breaches and incidents, and anticipate doing so in the future. Nevertheless, while we employ a number of security measures designed to prevent, detect, and mitigate potential harm to our platform, there can be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our IT Systems and Confidential Information. Any adverse impact to the availability, integrity or confidentiality of our IT Systems or Confidential Information could have significant costs, including regulatory enforcement actions, litigation (such as class actions), litigation indemnity obligations, civil or criminal penalties, operational changes, remediation costs, network downtime, increases in insurance premiums, and reputational damage. Any or all of the foregoing could materially adversely affect our business, results of operations, and financial condition.
Many companies that provide these services have reported a significant increase in cyberattack activity in recent years. Remote and hybrid working arrangements at our company (and at many third-party providers) may also increase cybersecurity risks due to the challenges associated with managing remote computing assets and security vulnerabilities that are present in many non-corporate and home networks.
Even if a data breach did not arise out of our action or inaction, or if it were to affect one or more of our competitors or our customers' competitors, rather than us, the resulting concern could negatively affect our customers and our business. Concerns regarding data privacy and security may cause some of our customers to stop using our platform and fail to renew their subscriptions. In addition, failures to meet our customers' or shoppers' expectations with respect to security and confidentiality of their data and information could damage our reputation and affect our ability to retain customers, attract new customers, and grow our business.
Our failure to comply with legal, contractual, or standards-based requirements around the security of personal information could lead to significant fines and penalties, as well as claims by our customers, their shoppers, or other stakeholders. Moreover, we have acquired and may continue to acquire companies with cybersecurity vulnerabilities and/or unsophisticated security measures, which exposes us to significant cybersecurity, operational, and financial risks. When we acquire companies that do not have security measures that are as robust as the measures we have in place, such as Feedonomics, B2B Ninja, or Bundle, the risk of fines and penalties may increase. Any such proceedings or violations could force us to spend money in defense or settlement of these proceedings, result in the imposition of monetary liability or injunctive relief, divert management's time and attention, increase our costs of doing business, and materially adversely affect our reputation and the demand for our platform. Additionally, as we accept debit and credit cards for payment, we are subject to the Payment Card Industry Data Security Standard ("PCI-DSS"), issued by the Payment Card Industry Security Standards Council. Compliance with PCI-DSS and implementing related procedures, technology and information security measures requires significant resources and ongoing attention. Any material interruptions or failures in our payment related systems could have a material adverse effect on our business, results of operations and financial condition. If there are amendments to PCI-DSS, the cost of compliance could increase and we may suffer loss of critical data and interruptions or delays in our operations as a result. If we or our service providers are unable to comply with the security standards established by banks and the payment card industry, we could be liable to our partners, the payment card associations, our customers, their shoppers and consumers with whom we have a direct relationship. In addition, we could be subject to fines and higher transaction fees, face regulatory or other legal action, or lose customers. The limitations of liability in our contracts may not be enforceable or adequate or would otherwise protect us from any such liabilities or damages with respect to any particular claim.
Our insurance coverage, including coverage for errors and omissions and cyber liability, may not continue to be available on acceptable terms or may not be available in sufficient amounts to cover one or more large claims. Our insurers could deny coverage as to any future claim and our cyber liability coverage may not adequately protect us against any losses, liabilities and costs that we may incur. The successful assertion of one or more large claims against us, or changes in our insurance policies, including premium increases or the imposition of large deductible or coinsurance requirements, could have an adverse effect on our business, financial condition, and results of operations.
Many jurisdictions have enacted laws requiring companies to notify individuals of security breaches involving certain types of personal information. Our agreements with certain customers and partners require us to notify them of certain security incidents. Some jurisdictions and customers require us to safeguard personal information or confidential information using specific measures. If we fail to observe these requirements, our business, operating results, and financial condition could be adversely affected.