We collect, use, store, transmit and otherwise process data and information about our customers, employees and others, some of which may be sensitive, personal and/or confidential. Any actual or perceived breach of our security measures or those of our service providers could adversely affect our business, operations and future prospects. Circumvention of our security measures or those of our service providers may result in access, misappropriation, deletion, alteration, publication, modification or other compromise of our information, which could cause interruptions in our business and operations, fraud or loss to third-parties, regulatory enforcement actions, litigation, indemnity obligations and other possible liabilities, as well as negative publicity. Widespread negative publicity may also result from real, threatened or perceived security compromises affecting our industry, competitors and customers. Concerns regarding data privacy and security could cause some of our customers to stop using our services and fail to renew their subscriptions. This discontinuance in use and failure to renew could harm our business, results of operations, financial condition and future prospects.
Our internal information systems, cloud-based computing services, and those of our current and any future service providers are vulnerable to a variety of evolving threats. Cyberattacks and other malicious internet-based activity, such as computer malware, hacking and phishing attempts, continue to increase. In addition to traditional computer "hackers," sophisticated nation-state and nation-state supported actors now engage in similar attacks (including advanced persistent threat intrusions). Other threats include malicious code (such as viruses, worms and ransomware), social engineering attacks (such as through deep fakes and phishing attacks, cyber extortion, personnel error or malfeasance (including theft and misuse), malware, denial-of-service attacks, supply-chain attacks, software bugs, information systems malfunctions and failures, data loss, and other similar threats are evolving. In particular, severe ransomware attacks are becoming increasingly prevalent and can lead to significant interruptions in our operations, ability to provide our products and services, loss of sensitive data and income, reputational harm, and diversion of funds. Extortion payments may alleviate the negative impact of a ransomware attack, but we may be unwilling or unable to make such payments due to, for example, applicable laws or regulations prohibiting such payments.
We have adopted a remote-first policy, which permits personnel to work remotely or virtually indefinitely unless the nature of the personnel's job requires their in-office presence. This policy, which results in a predominantly remote workforce, poses additional data security risks to our information technology systems and data, as more of our personnel work from home and utilize network connections outside our premises. Additionally, future or past business transactions (such as acquisitions or integrations) could expose us to additional cybersecurity risks and vulnerabilities, as our systems could be negatively affected by vulnerabilities present in acquired or integrated entities' systems and technologies. Any of the previously identified or similar threats could cause a security breach or other interruption. A security breach or other interruption could result in unauthorized, unlawful, or accidental acquisition, modification, destruction, loss, alteration, encryption, disclosure of, or access to our sensitive information.
We may expend significant resources or modify our business activities to try to protect against security breaches. In addition, certain data privacy and security obligations have required and may in the future require us to implement and maintain specific security measures, industry-standard or reasonable security measures to protect our information technology systems and sensitive information, including contractually. We cannot guarantee that our security measures to protect customer information and prevent data loss and other security breaches will be sufficient to protect against unauthorized access to, or other compromise of, personal information, or confidential, proprietary or otherwise sensitive information. The techniques used to sabotage or to obtain unauthorized access to our platform, systems, networks and/or physical facilities in which data is stored or through which data is transmitted change frequently, and we have not always been able in the past and may be unable in the future to anticipate such techniques or implement adequate preventative measures or stop security breaches that may arise from such techniques. As a result, our safeguards and preventive measures may not be adequate to prevent past, current or future cyberattacks and security breaches, including security breaches that may remain undetected for extended periods of time, which can substantially increase the potential for a material adverse impact resulting from the breach. Further, we may experience delays in developing and deploying remedial measures designed to address any such identified vulnerabilities.
Like many companies, we rely on service providers to operate critical business systems to process sensitive information in a variety of contexts, including, without limitation, providers of cloud-based infrastructure, employee email, customer service and other functions. We may share or receive sensitive information with or from third-parties. Our ability to monitor these third-parties' information security practices is limited, and these third-parties may not have adequate information security measures in place, which could lead to a breach in our information.
If we, or third-parties upon which we rely, experience or are perceived to have experienced (in the past or future) a security breach, we may experience adverse consequences. While we may be entitled to damages if our service providers fail to satisfy their privacy or security-related obligations to us, any award or other recovery may be insufficient to cover our damages.
We implement and maintain security measures designed to protect against security breaches and other compromise. However, there can be no assurance these measures will be effective. For example, we take steps designed to detect, mitigate and remediate vulnerabilities in our information systems (such as our hardware and software, including of third parties upon which we rely). We may not, however, detect and remediate all such vulnerabilities on a timely and effective basis.
We may expend significant resources or modify our business activities to try to protect against security incidents. Certain data privacy and security obligations may require us to implement and maintain specific security measures or industry-standard or reasonable security measures designed to protect our information technology systems and information.
Applicable data privacy and security obligations may require us to notify relevant stakeholders, which may include affected individuals, regulatory authorities, or customers of security breaches. We operate in an industry that is prone to cyberattacks. We have experienced security breaches (such as unauthorized access to customer information) for which we may have been or were legally required to notify individuals, customers, regulators, the media and others. Data breach notification disclosures are costly, time consuming, and could lead to adverse consequences. In addition, the costs to respond to a cybersecurity event or to mitigate any security vulnerabilities that may be identified could be significant, including costs for remediating the effects of such an event, paying a ransom, restoring data from backups and conducting data analysis to determine what data may have been affected by the breach. In addition, our efforts to contain or remediate a security breach or any vulnerability exploited to cause a breach may be unsuccessful, and efforts and any related failures to contain or remediate them could result in interruptions, delays, loss in customer trust, harm to our reputation and increases to our insurance coverage.
Our contracts may not contain limitations of liability, and even where they do, there can be no assurance that limitations of liability in our contracts are sufficient to protect us from liabilities, damages, or claims related to our data privacy and security obligations, including under the recently expanded private right of action in the CCPA. We may not have adequate insurance coverage for security incidents or breaches, including fines, judgments, settlements, penalties, costs, attorney fees and other impacts that arise out of such breaches. We cannot assure you that our cyber liability insurance coverage will be adequate to cover liabilities actually incurred or that insurance will continue to be available to us on economically reasonable terms, or at all. The successful assertion of one or more large claims against us that exceeds our available insurance coverage, or results in changes to our insurance policies (including premium increases or the imposition of large deductible or co-insurance requirements), could have an adverse effect on our business. Our risks are likely to increase as we continue to expand, grow our customer base, and process, increasingly large amounts of sensitive information.
In addition to experiencing a security incident, third parties may gather, collect, or infer sensitive information about us from public sources, data brokers, or other means that reveals competitively sensitive details about our organization and could be used to undermine our competitive advantage or market position.