Our business involves the collection, storage, use, disclosure, processing, transfer, and other handling (collectively, "processing") of a wide variety of information, including personally identifiable information, for various purposes in our business, including to help ensure the integrity of our services and to provide features and functionality to our consumers and merchants. The processing of the information we acquire in connection with our consumers' and merchants' use of our services is subject to numerous privacy, data protection, cybersecurity, and other laws and regulations in the United States and foreign jurisdictions. The automated nature of our business and our reliance on digital technologies may make us an attractive target for, and potentially vulnerable to, cyber-attacks, computer malware, computer viruses, social engineering (including phishing and ransomware attacks), general hacking, physical or electronic break-ins, or similar disruptions. While we and our vendors have taken steps to protect the confidential, proprietary, and sensitive information to which we have access and to prevent data loss, our security measures or those of our vendors could be breached, including as a result of employee theft, exfiltration, misuse or malfeasance, our actions, omissions, or errors, third-party actions, omissions, or errors, unintentional events, or deliberate attacks by cyber criminals, any of which may result in the loss of, or unauthorized access to, our or our consumers' data, our intellectual property, or other confidential, proprietary, or sensitive business information. Any accidental or willful security breaches or other unauthorized access to our platform or servicing systems could cause confidential, proprietary, or sensitive information to be stolen and used for criminal or other unauthorized purposes. Security breaches or unauthorized access to confidential information could also expose us to liability related to the loss of the information, time-consuming and expensive litigation, and negative publicity. If security measures are breached because of employee theft, exfiltration, misuse or malfeasance, our actions, omissions, or errors, third-party actions, omissions, or errors, unintentional events, deliberate attacks by cyber criminals or otherwise, or if design flaws in our software or systems are exposed and exploited, our relationships with consumers or merchants could be damaged, and we could incur significant liability. Although we monitor our systems in order to detect security breaches or instances of unauthorized access to confidential information, there is no guarantee that our monitoring efforts will be effective.
The techniques used to obtain unauthorized, improper, or illegal access to our systems, our or our consumers' data, or to disable or degrade service or sabotage systems, are constantly evolving, may be difficult to detect quickly, and often are not recognized until after they have been launched against a target. We may be unable to anticipate these techniques, react in a timely manner, or implement adequate preventative or remedial measures. Unauthorized parties have in the past attempted and may in the future attempt to gain access to our systems or facilities through various means, including, among others, hacking into our or our partners' or consumers' systems or facilities, or attempting to fraudulently induce our employees, partners, consumers or others into disclosing usernames, passwords, or other sensitive information, which may in turn be used to access our information technology systems and gain access to our or our consumers' data or other confidential, proprietary, or sensitive information. For instance, in September 2020, we received alerts from our internal systems that there was suspicious activity involving keys used to access certain parts of our sites. After an investigation conducted by third party firms in conjunction with our internal team, we determined the compromised data was limited to non-sensitive information. Despite our monitoring efforts, there can be no assurances that future incidents would not result in a third party accessing sensitive information. Such efforts may be state-sponsored and supported by significant financial and technological resources, making them even more difficult to detect and prevent. For the years ended December 31, 2020 and 2019, we did not incur material expenses relating to cyber-attacks, employee or other internal misconduct, computer viruses, physical or electronic break-ins, or similar disruptions.
In addition, in certain circumstances we utilize vendors, including cloud service providers, to facilitate the servicing of consumer accounts. Under these arrangements, these vendors require access to certain consumer data for the purpose of servicing the accounts. Because we do not control our vendors, or the processing of data by our vendors, other than through our contractual relationships, our ability to monitor our vendors' data security may be very limited such that we cannot ensure the integrity or security of measures they take to protect and prevent the loss of our or our consumers' data. As a result, we are subject to the risk that cyber-attacks on, or other security incidents affecting, our vendors may adversely affect our business even if an attack or breach does not directly impact our systems. It is also possible that security breaches sustained by, or other security incidents affecting, our competitors could result in negative publicity for our entire industry that indirectly harms our reputation and diminishes demand for our products and services.
Any actual or perceived failure to comply with legal and regulatory requirements applicable to us, including those relating to information security, or any failure to protect the information that we collect from our consumers and merchants, including personally identifiable information, from cyber-attacks, or any such actual or perceived failure by our originating bank partners, may result in, among other things, revocation of required licenses or registrations, loss of approved status, private litigation, regulatory or governmental investigations, administrative enforcement actions, sanctions, civil and criminal liability, and constraints on our ability to continue to operate. Our originating bank partners also operate in a highly regulated environment, and many laws and regulations that apply directly to our originating bank partners are indirectly applicable to us through our arrangements with our originating bank partners.
Furthermore, federal and state regulators and many federal and state laws and regulations require notice of any data security breaches that involve personal information. These mandatory disclosures regarding a security breach are costly to implement and often lead to widespread negative publicity, which may cause consumers to lose confidence in the effectiveness of our data security measures. Any security breach suffered by us or our vendors, any attack against our service availability, any unauthorized, accidental, or unlawful access or loss of data, or the perception that any such event has occurred, could result in a disruption to our service, litigation, an obligation to notify regulators and affected individuals, the triggering of indemnification and other contractual obligations, regulatory investigations, government fines and penalties, reputational damage, and loss of consumers and ecosystem partners, and our business and operations could be adversely affected. In addition, we may incur significant costs and operational consequences in connection with investigating, mitigating, remediating, eliminating, and putting in place additional tools and devices designed to prevent future actual or perceived security incidents, as well as in connection with complying with any notification or other obligations resulting from any security incidents. Our insurance policies carry retention and coverage limits, which may not be adequate to reimburse us for losses caused by security breaches, and we may not be able to collect fully, if at all, under these insurance policies. The successful assertion of one or more large claims against us that exceed available insurance coverage, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or co-insurance requirements, could adversely affect our business. Furthermore, we cannot be certain that insurance coverage will continue to be available on acceptable terms or at all, or that the insurer will not deny coverage as to any future claim.