Some of our lines of business and services, including our dispensaries, rely on services hosted and controlled directly by third-party service providers. We do not have redundancy for all of our systems, many of our critical applications reside in only one of our data centers, and our disaster recovery planning may not account for all eventualities. If our business relationship with a third-party provider of hosting or software services is negatively affected, or if one of our service providers were to terminate its agreement with us, we might not be able to deliver access to our data, which could subject us to reputational harm and cause us to lose customers and future business, thereby reducing our revenue.
We hold large amounts of customer data, some of which is hosted in third-party facilities. A security incident at those facilities or ours may compromise the confidentiality, integrity or availability of customer data. Unauthorized access to customer data stored on our computers or networks may be obtained through break-ins, breaches of our secure network by an unauthorized party, employee theft or misuse or other misconduct. It is also possible that unauthorized access to customer data may be obtained through inadequate use of security controls by customers. Accounts created with weak passwords could allow cyber-attackers to gain access to customer data. If there were an inadvertent disclosure of customer information, or if a third party were to gain unauthorized access to the information we possess on behalf of our customers, our operations could be disrupted, our reputation could be damaged and we could be subject to claims or other liabilities. In addition, such perceived or actual unauthorized disclosure of the information we collect or breach of our security could damage our reputation, result in the loss of customers and harm our business.
Because of the large amount of data we collect and manage using our hosted solutions, it is possible that hardware or software failures or errors in our systems (or those of our third-party service providers) could result in data loss or corruption, cause the information that we collect to be incomplete or contain inaccuracies that our customers regard as significant or cause us to fail to meet committed service levels. Furthermore, our ability to collect and report data may be delayed or interrupted by a number of factors, including access to the Internet, the failure of our network or software systems or security breaches. In addition, computer viruses or other malware may harm our systems, causing us to lose data, and the transmission of computer viruses or other malware could expose us to litigation. We may also find, on occasion, that we cannot deliver data and reports in near real time because of a number of factors, including failures of our network or software. If we supply inaccurate information or experience interruptions in our ability to capture, store and supply information in near real time or at all, our reputation could be harmed and we could lose customers, or we could be found liable for damages or incur other losses.
Loss of access to our data could have a negative impact on our business and results of operations. In particular, the states in which we operate require that we maintain certain information about our customers and transactions. If we fail to maintain such information, we could be in violation of state laws.