We retain highly confidential information in our systems and databases on third party network providers. Although we maintain security features in our systems designed to protect proprietary information and prevent data loss and other security breaches, such measures cannot provide absolute security and our operations may be susceptible to breaches on our third party networks, including from circumvention of security systems, denial of service attacks or other cyber-attacks, hacking, computer viruses or malware, technical malfunction, employee error, malfeasance, physical breaches, system disruptions or other disruptions. We outsource certain functions, including IT functions, and these relationships allow for the storage and processing of our information, as well as customer, counterparty and employee information. While we engage in actions to reduce our exposure resulting from outsourcing, ongoing threats may result in unauthorized access, loss, exposure or destruction of data, or other cybersecurity incidents, with increased costs and other consequences, including those described below.
Disruptions from cybersecurity events may jeopardize the security of information stored in and transmitted through our systems or the systems of outsourcing parties. An increasing number of websites, including those owned by several other large Internet and offline companies, have disclosed breaches of their security, some of which have involved sophisticated and highly targeted attacks on portions of their websites or infrastructure. The techniques used to obtain unauthorized access, disable, or degrade service, or sabotage systems, change frequently, may be difficult to detect for a long time, and often are not recognized until launched against a target. Certain efforts may be state sponsored and supported by significant financial and technological resources and therefore may be even more difficult to detect. We may not anticipate these techniques or implement adequate preventive measures. We currently expend, and may be required to expend significant additional capital and other resources to protect against such security breaches or to alleviate problems caused by such breaches. Our insurance coverage may be inadequate to compensate us for any related losses we incur.
These issues are likely to become more difficult as we expand our operations. Any breach of our security measures, or even a perceived breach of our security measures, could cause us to lose potential customers and governmental approvals; suffer material harm to our business, financial condition, operating results and reputation; or be subject to regulatory actions, litigation, sanctions or other statutory penalties.