In order to provide our services, we process and store sensitive business and personal information, which may include credit and debit card numbers, bank account numbers, Social Security numbers, driver's license numbers, names and addresses and other types of sensitive personal or business information. Some of this information is also processed and stored by financial institutions, merchants and other entities, as well as third-party service providers to whom we outsource certain functions, and other agents, such as independent consultants and auditors, which we refer to collectively as our associated third parties. We may have responsibility to the card networks, financial institutions, regulators, and in some instances, our merchants, ISOs and/or individuals, for our failure or the failure of our associated third parties (as applicable) to protect this information.
We are a regular target of malicious attempts to identify and exploit system vulnerabilities, and/or to penetrate or bypass our security measures, in order to gain unauthorized access to our networks and systems or those of our associated third parties. Such attempts at unauthorized access can lead, and occasionally have led, to the compromise of sensitive, business, personal or confidential information. To mitigate these risks, we follow a defense-in-depth model for cybersecurity, meaning we proactively seek to employ multiple methods at different layers to defend our systems against intrusion and attack and to protect the data we possess. We have adopted policies and procedures as part of our information security program, as well as an incident response plan, that are designed to facilitate the identification, assessment and management of those risks, including any risks that have the potential to be material. Our information security program, which is designed to address cybersecurity risks and is subject to oversight by both the Board of Directors and management, includes technical, physical and administrative controls that are designed to maintain the confidentiality, integrity and availability of our information and technical assets. However, we cannot provide any assurance that these cybersecurity risk management processes and controls will be fully complied with or effective, and we cannot be certain that these measures or others will always be successful or will always be sufficient to counter, or to rapidly detect, contain and remediate all current and emerging technology threats.
More specifically, our computer systems and/or our associated third parties' computer systems have been, and we expect will continue to be, targeted on a regular basis, and our data protection measures may not prevent, and occasionally have not prevented, unauthorized access. The techniques used to obtain unauthorized access, disable or degrade services or sabotage systems change frequently. These techniques are often difficult to detect and they continually evolve and may become more sophisticated. These threats may be facilitated and exacerbated by the use of AI technologies, which may increase system complexity, expand data usage, and introduce new attack surfaces or modes of exploitation. Threats to our systems and our associated third parties' systems can derive from human error or malicious actions by employees or third parties, including state-sponsored organizations with significant financial and technological resources. In addition, we have experienced and may continue to experience system disruptions or delays caused by computer viruses and other malware or vulnerabilities that could infect our systems or those of our associated third parties. Denial of service, ransomware, phishing attempts, brute force attacks, exploiting software vulnerabilities (including "zero-day attacks"), supply chain attacks and other events or other methods of attacks could be launched against us for a variety of purposes, including to interfere with our services or to create a diversion for other malicious activities. Our defensive measures may not prevent downtime, unauthorized access or misuse of sensitive data. We have experienced all of the incident types described in this paragraph in the past, and we cannot guarantee that we will be able to detect and prevent all such incidents in the future. While we maintain first- and third-party insurance policies that may provide coverage for certain aspects of cybersecurity risks, such insurance coverage may be insufficient to cover all losses resulting from an incident.
Companies we acquire may also require implementation of additional cybersecurity defense controls or processes to align with our information security program and, as a result, there may be a period of heightened risk between the acquisition date and the completion of such implementation. Furthermore, certain of our third-party relationships are subject to our vendor management program and are governed by written contracts that contain requirements relating to information security. We have designed our risk identification, assessment and management processes and procedures to account for cybersecurity risks associated with our use of third-party service providers. However, we do not control the actions of our associated third parties, and any disruptions in their services caused by cybersecurity attacks and/or security breaches could adversely affect our ability to service our customers or otherwise conduct our business.
We impose contractual requirements on our counterparties, including vendors and other third parties, to comply with applicable privacy and security laws related to the use and security of sensitive or personal information. We cannot provide assurances that these contractual requirements will be followed or will be adequate to prevent the misuse of this data. We have occasionally received notifications from third parties informing us that our data stored on their systems has been accessed without authorization. Any future misuse or compromise of personal information stored on those systems, or any other failure by a vendor, partner or other third party to abide by our contractual requirements, could expose us to regulatory fines, third-party liability, protracted and costly litigation and, with respect to misuse of the personal information of our customers, lost revenue and reputational harm.
Any type of security incident, cybersecurity attack, unintentional or intentional disclosure of sensitive business and personal information, or misuse of data described above or otherwise, whether experienced by us or an associated third party, could harm our reputation; deter existing and prospective customers from using our services or from making digital payments generally; cause a loss of revenue; increase our operating expenses in order to contain and remediate the incident; expose us to unanticipated or uninsured liability; disrupt our operations (including potential service interruptions); distract our management; increase our risk of litigation or regulatory scrutiny; and result in the imposition of penalties and fines under state, federal and foreign laws or by the card networks (which may not be covered by our insurance policies). Removal from the networks' lists of Payment Card Industry Data Security Standard ("PCI DSS") compliant service providers could mean that existing customers, sales partners or other third parties could cease using or referring others to our services. Also, prospective merchant customers, sales partners or other third parties could choose to terminate negotiations with us, or delay or choose not to consider us for their processing needs.
In addition, as a global company, we are increasingly subject to complex and varied cybersecurity incident reporting requirements across numerous jurisdictions. With the often short timeframes required for cybersecurity incident reporting, there is a risk that we or our associated third parties will fail to meet the reporting deadlines for any given incident. Regardless of where an incident occurs, it may take considerable time for us to investigate and evaluate the full impact of a cybersecurity incident, particularly in the case of a sophisticated attack. These factors may inhibit our ability to provide prompt, full and reliable information about the cybersecurity incident to our customers, partners and regulators, as well as to the public. If we are unable to comply with reporting requirements, we could be subject to monetary damages, civil and criminal penalties, litigation, investigations and proceedings and damage to our reputation.
Any of the foregoing could adversely affect our business, financial condition and results of operation.