We rely extensively on information technology systems to conduct our business. These systems affect, among other things, ordering and managing materials from suppliers, summarizing and reporting results of operations, complying with regulatory, legal or tax requirements, data security and other processes necessary to manage our business. Our information technology systems and those of our third-party service providers, vendors, strategic partners and other contractors or consultants are vulnerable to damage or interruption from computer viruses and malware (e.g., ransomware), natural disasters, terrorism, war, telecommunication and electrical failures, hacking, cyberattacks, phishing attacks and other social engineering schemes, malicious code, employee theft or misuse, human error, fraud, denial or degradation of service attacks, sophisticated nation-state and nation-state-supported actors or unauthorized access or use by persons inside our organization, or persons with access to systems inside our organization. The risk of a security breach or disruption, particularly through cyberattacks or cyber intrusion, including by computer hackers, foreign governments and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased and evolved. As a result of the COVID-19 pandemic, we and our third-party service providers and partners may also face increased cybersecurity risks due to our reliance on internet technology and the number of our employees who are working remotely, which may create additional opportunities for cybercriminals to exploit vulnerabilities. Although we have implemented cybersecurity protections to safeguard our data, including our patient and subject data, we can provide no assurances that these protections will prevent all cybersecurity breaches. We primarily use common off-the-shelf software systems, such as Microsoft 365, which receive frequent security updates from the software providers. We also utilize a third-party vendor to maintain our IT system networks, and as a result of limited internal IT resources, we are only able to perform limited due diligence on our third-party IT vendors. We receive periodic security monitoring from our cybersecurity insurance provider.
However, because the techniques used to obtain unauthorized access to, or to sabotage, systems change frequently and often are not recognized until launched against a target, we may be unable to anticipate these techniques or implement adequate preventative measures. We may experience security breaches that may remain undetected for an extended period. Even if identified, we may be unable to adequately investigate or remediate incidents or breaches due to attackers increasingly using tools and techniques that are designed to circumvent controls, to avoid detection, and to remove or obfuscate forensic evidence. Our third-party service providers and partners are also subject to these heightened risks. If our systems are damaged or cease to function properly due to any number of causes, ranging from catastrophic events to power outages to security breaches, and our business continuity plans do not effectively compensate on a timely basis, we may experience interruptions in our operations, which could have an adverse effect on our business.
We and certain of our service providers are from time to time subject to cyberattacks and security incidents. While we do not believe that we have experienced any significant system failure, accident or security breach to date, if such an event were to occur, it could lead to unauthorized access, disclosure and use of non-public information, including information from the patient information we create, receive, maintain or transmit, which are governed by HIPAA and other laws. Any such access, disclosure, or other loss of information could result in legal claims or proceedings, liability under laws that protect the privacy of personal information, and damage to our reputation, which would, in turn, materially and adversely affect our results of operations, financial condition, liquidity, and the value of our securities.