We intend to collect, maintain, transmit and store data about our customers, employees, contractors, suppliers, vendors and others, including credit card information and personally identifiable information, as well as other confidential and proprietary information. We also may employ third-party service providers that store, process and transmit certain proprietary, personal and confidential information on our behalf. We may rely on encryption and authentication technology licensed from third parties in an effort to securely transmit, encrypt, anonymize or pseudonymize certain confidential and sensitive information, including credit card numbers. Advances in computer capabilities, new technological discoveries or other developments may result in the whole or partial failure of this technology to protect transaction and personal data or other confidential and sensitive information from being breached or compromised. Our security measures, and those of our third-party service providers, may not detect or prevent all attempts to hack our systems, denial-of-service attacks, viruses, malicious software, break-ins, phishing attacks, social engineering, cybersecurity breaches or other attacks and similar disruptions that may jeopardize the security of information stored in or transmitted by our sites, networks and systems or that we or our third-party service providers otherwise maintain, including payment card systems and human resources management platforms. We and our service providers may not anticipate or prevent all types of attacks until after they have already been launched, and techniques used to obtain unauthorized access to or sabotage systems change frequently and may not be known until launched against us or our third-party service providers. In addition, security breaches can also occur as a result of non-technical issues, including intentional or inadvertent breaches by our employees or by persons with whom we have commercial relationships.
Breaches of our security measures or those of our third-party service providers or cyber security incidents could result in unauthorized access to our sites, networks and systems; unauthorized access to and misappropriation of personal information, including consumers' and employees' personally identifiable information, or other confidential or proprietary information of ourselves or third parties; limited or terminated access to certain payment methods or fines, penalties, assessments or higher transaction fees to use such methods; viruses, worms, spyware or other malware being served from our site, networks or systems; deletion or modification of content or the display of unauthorized content on our site; interruption, disruption or malfunction of operations; costs relating to breach remediation, deployment or training of additional personnel and protection technologies, responses to governmental investigations and media inquiries and coverage; engagement of third party experts and consultants; litigation, regulatory action and other potential liabilities. If any of these breaches of security occur, and/or our cybersecurity processes, procedures or policies are found to be deficient, our reputation and brand could be damaged, our business may suffer, we could be required to expend significant capital and other resources to alleviate problems caused by such breaches and we could be exposed to a risk of loss, litigation or regulatory action and possible liability. In addition, any party who is able to illicitly obtain a customer's password or other relevant information could access that customer's transaction data or personal information. Any compromise or breach of our security measures, or those of our third-party service providers, could violate applicable privacy, data security and other laws, and cause significant legal and financial exposure, adverse publicity and a loss of confidence in our security measures, which could have a material adverse effect on our business, financial condition and operating results. We may need to devote significant resources to protect against cybersecurity breaches or to address problems caused by breaches, diverting resources from the growth and expansion of our business.