We and our partners capture, transmit, handle and store sensitive information in conducting and managing electronic, financial, and mobile transactions, such as card information, PIN numbers and personal information of various types. These businesses involve certain inherent security risks, in particular: the risk of electronic interception and theft of the information for use in fraudulent or other card transactions by persons outside the Company, including third party vendors or by our own employees; and the use of fraudulent cards on our network of owned or outsourced ATMs and POS devices. We incorporate industry-standard encryption technology and processing methodology into our systems and software and maintain controls and procedures regarding access to our computer systems by employees and others, to maintain high levels of security. Although this technology and methodology decreases security risks, they cannot be eliminated entirely as criminal elements apply increasingly sophisticated technology to attempt to obtain unauthorized access to the information handled by ATM, money transfer and electronic financial transaction networks. Our services and infrastructure are increasingly reliant on the internet. Computer networks and the internet are vulnerable to unauthorized access, computer viruses and other disruptive problems such as denial of service attacks or other cyber-attacks carried out by cyber criminals or state-sponsored actors. Other potential attacks include attempts to obtain unauthorized access to confidential information or destroy data, often through the introduction of computer viruses, ransomware or malware, cyber-attacks, and other means, which are constantly evolving and difficult to detect. Those same parties may also attempt to fraudulently induce employees, customers, vendors, or other users of our systems through phishing schemes or other methods to disclose sensitive information in order to gain access to our data or that of our customers or clients. In addition, the cost and timeframes required for implementation of new technology may result in a time lag between availability of such technology and our adoption of it. Further, our controls, procedures and technology may not be able to detect when there is a breach, causing a delay in our ability to mitigate it. As previously disclosed, we have been the subject of computer security breaches, and we cannot exclude the possibility of additional breaches in the future.
Any breach in our security systems could result in the perpetration of fraudulent financial transactions for which we may bear the liability. We are insured against various risks, including theft and negligence, but such insurance coverage is subject to deductibles, exclusions and limits that may leave us bearing some or all of any losses arising from security breaches.
We and our partners also collect, transfer, and retain personal data as part of our business. These activities are subject to certain privacy laws and regulations in the U.S. and in other jurisdictions where our services are offered. We maintain technical and operational safeguards designed to comply with applicable legal requirements. Despite these safeguards, there remains a risk that these safeguards could be breached resulting in improper access to, and disclosure of, sensitive customer information. Under state, federal, and foreign laws requiring consumer notification of security breaches, the costs to remediate security breaches can be substantial. Breaches of our security policies or applicable legal requirements resulting in a compromise of customer data could expose us to regulatory enforcement action, subject us to litigation, limit our ability to provide services and/or cause harm to our reputation.
In addition to electronic fraud issues and breaches of our systems, the possible theft and vandalism of ATMs or cash in the ATMs present risks for our ATM business. We install ATMs at high-traffic sites and consequently our ATMs are exposed to theft and vandalism, and to attacks whereby the security of the ATM is breached electronically by transmitting a command to the ATM to dispense cash without a card being present. We constantly monitor ATM security and take measures to protect our systems from such attacks and other breaches, but we cannot be certain that our measures will be effective against new, rapidly developing methods used by criminal elements. Although we are insured against such risks, deductibles, exclusions, or limitations in such insurance may leave us bearing some or all of any losses arising from theft or vandalism of ATMs or loss of cash due to security breaches of our ATM networks. In addition, we have experienced increases in claims under our insurance, which has increased our insurance premiums.