In operating a global online business, with operations in thirteen countries, we and our third-party service providers maintain significant proprietary information and maintain large amounts of personal data and confidential information about our employees, customers and merchants. We and such service providers are at constant risk of cyber-attacks or cyber intrusions via the Internet, computer viruses, break-ins, malware, ransomware, phishing attacks, hacking, denial-of-service attacks or other attacks and similar disruptions from the unauthorized use of or access to computer systems (including from internal and external sources). These types of incidents continue to be prevalent and pervasive across industries, including in our industry, and such attacks on our systems have occurred in the past and are expected to occur in the future. In addition, we expect the amount and sophistication of the perpetrators of these attacks to continue to expand, which could include state-sponsored actors. Further, we believe that our websites and mobile applications are attractive targets for such attacks as a result of the high profile of our brand and the amount and type of information we maintain relating to our customers and merchants. Any such attack could lead to interruptions, delays or website outages, causing loss of critical data or the unauthorized disclosure or use of personally identifiable or other confidential information. Further, third party service providers we utilize in our operations could be targeted by such cyber attacks, which could indirectly impact our business, by way of similar adverse consequences to a direct attack depending on the type of service.
Any failure to prevent or mitigate cybersecurity breaches or other improper access to, or disclosure of, our data or confidential information, including non-public financial information, could result in: the loss or misuse of such data or information; significant reputational harm, including a negative impact on customers', merchants', employees' and third-party business partners' confidence in the security of our services which could potentially result in significant customer or merchant attrition; a decline in customer purchase frequency; litigation and/or regulatory investigations; and/or damage to our brand and reputation.
Our risk and exposure to these matters remains heightened because of, among other things, the evolving nature of these threats, our prominent size and scale, the large number of transactions that we process, our geographic footprint and international presence, the complexity of our systems, our number of employees, the jurisdictions in which we operate and the various and evolving laws and regulatory schemes governing data and data protection applicable to us, the extent to which our current systems, controls, processes and practices permit us to detect, log and monitor security events, our use of cloud based technologies and the outsourcing of some of our business operations.
Although cybersecurity and the continued development and enhancement of our controls, processes and practices designed to protect our systems, computers, software, data and networks from attack, damage or unauthorized access are a high priority for us, our activities and investment may not be deployed quickly enough or successfully protect our systems against all vulnerabilities, including technologies developed to bypass our security measures or zero day vulnerabilities. In addition, outside parties may attempt to fraudulently induce employees, merchants or customers to disclose access credentials or other sensitive information in order to gain access to our systems and networks. We also may be subject to additional vulnerabilities as we utilize third parties to provide various services for our operations (e.g., cloud services) and integrate the systems, computers, software and data of acquired businesses and third-party business partners into our networks and separate the systems, computers, software and data of disposed businesses from our networks.
As described in Item 1.C - Cybersecurity, we maintain a cybersecurity risk management program that is overseen by our IT and Information Security teams. A member of our IT and Information Security teams regularly reports to the Audit Committee on the state of our cybersecurity program and provides updates on cybersecurity matters. We also conduct an annual cybersecurity review with our Board. As part of our cybersecurity risk management program, we employ security practices to protect and maintain the systems located at our hosting providers, invest in intrusion, anomaly, and vulnerability detection tools and engage third-party security firms to test the security of our websites and systems. In addition, we regularly evaluate and assess our systems and the controls, processes and practices to protect those systems and also conduct penetration testing against our own systems. The evaluations, assessments and testing identify areas of potential weakness in, and suggested improvements to, the maturity of our systems, processes, and risk management framework as well as vulnerabilities in those systems, processes and risk management framework that could be attacked and exploited to access and acquire proprietary and confidential information, including information about our customers and merchants. There are no assurances that our cybersecurity risk mitigation program or actions and investments to improve the maturity of our systems, processes and risk management framework or remediate vulnerabilities will be sufficient or completed quickly enough to prevent or limit the impact of any cyber intrusion or related attack.
In addition, in the future we may be required to expend significant additional resources to rebuild our internal systems; implement additional threat protection measures; provide modifications or enhancements to our websites, mobile applications, protective measures, controls, systems, processes, and risk management framework; or investigate or remediate any information security vulnerabilities. These improvements, modifications and enhancements may take significant time to implement. Further, the sophistication of potential attacks or the capabilities of our systems and processes may not permit us to detect the occurrence of cyber incidents until significant data loss has occurred. Moreover, because the techniques used to gain access to or sabotage systems often are not recognized until launched against a target, we may be unable to anticipate the methods necessary to defend against these types of attacks and we cannot predict the extent, frequency or impact these problems may have on us. Any actual breach, the perceived threat of a breach, or a perceived breach could cause our customers, merchants, employees and payment card processors to cease doing business with us or do business with us less frequently, subject us to lawsuits (including claims for damages), investigations, regulatory fines or other action or liability or damage to our brand and reputation, which would harm our business, financial condition and results of operations.