Fundamental to the use of our solutions is the secure collection, storage and transmission of confidential donor, customer and end user data, personally identifiable information and transaction data, including in our payment services. Despite the network, application and physical security procedures and internal control measures we employ to safeguard our systems, we have been, and in the future may be, vulnerable to a security breach, intrusion, loss or theft of confidential donor data and transaction data, which has in the past harmed and may in the future harm our business, reputation and future financial results. Furthermore, our reliance on remote access to information systems increases our exposure to potential cybersecurity incidents.
Like virtually all major businesses, we are, from time to time, a target of cyberattacks, such as the Security Incident (as described below and in Note 11 to our consolidated financial statements in this report), information systems interruptions, phishing, social engineering schemes and other systems disruptions. We expect these threats to continue, some of which have been, and in the future may be, successful to varying degrees. Because the numerous and evolving cybersecurity threats used to obtain unauthorized access, disable, degrade or sabotage systems have become increasingly more complex and sophisticated, it may be difficult to anticipate these acts or to detect them for periods of time, as with the Security Incident, and we may be unable to respond adequately or timely. As these threats continue to evolve and increase, we have already devoted and expect to continue to devote significant resources in order to modify and enhance our security controls and to identify and remediate any security vulnerabilities.
A compromise of our data security, such as the Security Incident, that results in customer or customer constituent personal or payment card data being obtained by unauthorized persons could adversely affect our reputation with our customers and others, as well as our operations, results of operations, financial condition and liquidity and has resulted in, and could in the future result in, litigation against us, government investigations or the imposition of fines and penalties. (See Note 11 to our consolidated financial statements in this report for information regarding litigation, government investigations, fines and penalties related to the Security Incident.) We have been, and in the future might be, required to expend significant additional capital and other resources to rectify problems caused by a security breach, including notification under data privacy laws and regulations, and incur expenses related to remediating our information security systems.
Even though we carry cyber-technology insurance policies that provide insurance coverage under certain circumstances, we have in the past suffered losses and may in the future suffer losses as a result of a security breach that significantly exceed the coverage available under our insurance policies or for which we do not have coverage. (See Note 11 to our consolidated financial statements in this report for expense and insurance coverage information related to the Security Incident.) Furthermore, in the future such insurance may not be available on commercially reasonable terms, or at all. A security breach and any efforts we make to address such breach could also result in a disruption of our operations, particularly our online sales operations.
The occurrence of actual cyber security events, such as the Security Incident, could magnify the severity of the adverse effects of future incidents on our business. The techniques used to obtain unauthorized access, disable or degrade service, or sabotage information systems can be difficult to detect for long periods of time and can involve difficult or prolonged assessment or remediation periods even once detected. We, therefore, cannot assure you that all potential causes of past significant incidents, including the Security Incident, have been fully identified and remediated. The steps we take may not be sufficient to prevent future significant incidents and, as a result, such incidents may occur again.
A material example of the foregoing risks is the ransomware attack that in May 2020 during which a cybercriminal removed a copy of a subset of data from our self-hosted environment (the "Security Incident").
As a result of the Security Incident, we received approximately 260 specific requests from customers for reimbursement of expenses incurred by them related to the Security Incident, approximately 400 reservations of the right to seek expense recovery in the future from customers or their attorneys in the U.S., U.K. and Canada related to the Security Incident and notices of proposed claims on behalf of a number of U.K. data subjects, all of which have been fully resolved and closed or are inactive and are considered by us to have been abandoned. In addition, insurance companies representing various customers' interests through subrogation claims contacted us, and certain insurance companies filed subrogation claims in court, of which two cases remain active and unresolved. We also were a defendant in putative consumer class action cases in U.S. and Canadian courts alleging harm from the Security Incident, all of which have now been resolved.
In addition, the Company reached a settlement with the SEC that fully resolved an SEC investigation of the Security Incident; entered into separate, substantially similar Administrative Orders with each of 49 state Attorneys General and the District of Columbia that fully resolved a multi-state Civil Investigative Demand and the separate Civil Investigative Demand from the Office of the Indiana Attorney General relating to the Security Incident; reached a settlement with the U.S. Federal Trade Commission (the "FTC") in connection with the Security Incident; and agreed to a Final Judgment and Permanent Injunction with the Attorney General of the State of California (the "California Judgment") relating to the Security Incident. In addition, we received notices of governmental actions or investigations by the U.S. Department of Health and Human Services, the Office of the Australian Information Commissioner and the Office of the Privacy Commissioner of Canada, each of which we now believe are now longer active actions or investigations.
The terms of the California Judgment, FTC Order, the Attorneys General Administrative Orders and our settlement with the SEC require that we implement and maintain certain processes and programs and comply with certain legal requirements related to cybersecurity and data protection. Effectively implementing, monitoring and updating these requirements has been, and is expected to be over an extended period of time, expensive and time-consuming. Our failure to do so in accordance with the terms of our agreements with FTC, the Attorneys General and with the SEC, and possibly others, could expose us to additional material liability under the terms of the Administrative Orders, the SEC settlement, or otherwise.
Furthermore, significant management time and Company resources have been, and are expected to continue to be, devoted to the Security Incident.
In addition, publicity or developments related to the Security Incident could in the future have a range of other adverse effects on our business or prospects, including causing or contributing to loss of customer confidence, reduced customer demand, reduced customer retention, strategic growth opportunities, and associated retention and recruiting difficulties, some or all of which could be material.