Our business involves the collection, storage, processing and transmission of confidential information and customers' personal data, including financial information and information about how customers interact with our platform. We have built our reputation on the premise that we offer customers a secure and convenient way to manage their crypto. We also maintain and process other information in our business, including our own proprietary, confidential, or otherwise sensitive information, and information we maintain or otherwise process for third parties. An increasing number of organizations, including large merchants, businesses, technology companies and financial institutions, as well as government institutions, have disclosed breaches of their information security systems, some of which have involved sophisticated and highly targeted attacks, including on their websites, mobile applications and infrastructure.
The techniques used to obtain unauthorized, improper, or illegal access to systems and information (including customers' personal data), disable or degrade service, or sabotage systems are constantly evolving and have become very complex and sophisticated, may be difficult to detect quickly, and often are not recognized or detected until after they have been launched against a target. We may be unable to anticipate these techniques or to implement adequate preventative measures, and any cyberattack, breach or other security incident may take longer than expected to remediate or otherwise address. Unauthorized parties have attempted, and we expect that they will continue to attempt, to gain access to our systems or facilities through various means, including, but not limited to, hacking into our systems or facilities or those of our customers or vendors, and attempting to fraudulently induce users of our systems (including employees and customers)into disclosing customer names, passwords, payment card information, or other sensitive information, which may in turn be used to access our information technology systems, or to steal crypto stored by our customers. Threats can come from a variety of sources, including criminal hackers, hacktivists, state-sponsored intrusions, industrial espionage and insider threats. Certain efforts may be supported by significant financial and technological resources, making them even more sophisticated and difficult to detect. The Russia-Ukraine war and Israel-Hamas war, and othe geopolitical tensions and military conflicts, may increase the risks we and our vendors face from cyberattacks. Numerous and evolving cybersecurity threats, including advanced and persistent cyberattacks, cyberextortion, ransomware, denial-of-service attacks, spear phishing and social engineering schemes, the introduction of computer viruses, ransomware or other malware, and the physical destruction of all or portions of our information technology and infrastructure could compromise the confidentiality, availability and integrity of the information (including consumers' personal data) in our systems. Although we have developed systems and processes designed to protect information we manage, prevent data loss and other security breaches and effectively respond to known and potential risks, and we expect to continue to expend significant resources to bolster these protections, there can be no assurance that these security measures will provide absolute security or have prevented or will prevent breaches, security incidents or attacks, in particular, as the frequency and sophistication of cyberattacks increases.
Our information technology and infrastructure and those of our vendors (including data center and cloud computing providers) may be vulnerable to cyberattacks, security incidents and breaches and third parties may be able to access our customers' personal data and/or proprietary information, banking, crypto and payment card information, or other confidential, proprietary, or otherwise sensitive information, stored on or accessible through those systems. We have experienced from time to time, and may experience in the future, security incidents or breaches due to human error, malfeasance, insider threats, system errors, bugs, vulnerabilities, or other causes. Actual or perceived breaches of our or our vendors' security could, among other things:
- interrupt our operations;- result in our systems or services being unavailable or degraded;- result in improper disclosure or other processing of information (including consumers' personal data) and actual or perceived violations of applicable privacy and other laws;- materially harm our reputation;- result in significant liability claims, litigation, regulatory scrutiny, investigations and other proceedings, fines, penalties and other legal and financial exposure;- cause us to incur significant remediation costs;- lead to loss or theft of customer crypto or loyalty points and other harm to customers;- lead to loss or theft of intellectual property;- lead to loss of customer confidence in, or decreased use of, our products and services;- divert the attention of management from the operation of our business;- result in significant compensation or contractual penalties from us to our customers as a result of losses to them or claims by them; and - adversely affect our business and results of operations.
We have expended and expect to continue to invest in resources to protect against privacy and security incidents and breaches and may be required to redress problems caused by privacy and security incidents or breaches. We have implemented remote and hybrid working protocols and offer work-issued devices to certain employees, but the actions of employees while working remotely may have a greater effect on the security of our infrastructure, networks, and the information, including personal data, we process, including for example by increasing the risk of compromise to systems or information arising from employees' combined personal and private use of devices, accessing our networks or information using wireless networks that we do not control, or the ability to transmit or store information outside of our secured network. Our employees' or third parties' intentional, unintentional, or inadvertent actions may increase our vulnerability or expose us to security threats, such as ransomware, other malware and phishing attacks, and we may remain responsible for unauthorized access to, loss, alteration, destruction, acquisition, disclosure or other processing of information we or our vendors process or otherwise maintain, even if the security measures used to protect such information comply with applicable laws, regulations and other actual or asserted obligations. Also, cyberattacks, including on the supply chain, continue to increase in frequency and magnitude, and we cannot provide assurances that our preventative efforts will be successful.
Financial services regulators in various jurisdictions have implemented authentication requirements for banks and payment processors intended to reduce online fraud, which could impose significant costs, require us to change our business practices, make it more difficult for new consumers to join us, and reduce the ease of use of our platform, which could harm our business. Our insurance policies may not be adequate to reimburse us for losses caused by security incidents or breaches. We also cannot be certain that our insurance coverage will be adequate for incurred information security liabilities, that insurance will continue to be available to us on economically reasonable terms, or at all, or that an insurer will not deny coverage as to any future claim. The successful assertion of one or more large claims against us that exceed available insurance coverage, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or co-insurance requirements, could have a material adverse effect on our business, including our financial condition, results of operations, and reputation.