In connection with our client services, we and our third-party service providers receive, process, store and transmit sensitive business information and, in certain circumstances, personal medical information of our clients' patients, electronically over the internet. We or our third-party service providers may become the target of attempted cyber-attacks and other security threats and may be subject to breaches of the information technology systems we use. Experienced computer programmers and hackers may be able to penetrate our security controls and access, misappropriate or otherwise compromise protected personal information or proprietary or confidential information or that of third parties, create system disruptions or cause system shutdowns that could negatively affect our operations. They also may be able to develop and deploy viruses, worms, ransomware, and other malicious software programs that attack our systems or otherwise exploit any security vulnerabilities.
In addition, the risk of cyber-attacks has increased in connection with the military conflict between Russia and Ukraine and the resulting geopolitical conflict. In light of those and other geopolitical events, nation-state actors or their supporters may launch retaliatory cyber-attacks and may attempt to cause supply chain and other third-party service provider disruptions, or take other geopolitically motivated retaliatory actions that may disrupt our business operations, result in data compromise, or both. Nation-state actors have in the past carried out, and may in the future carry out, cyber-attacks to achieve their aims and goals, which may include espionage, information operations, monetary gain, ransomware, disruption, and destruction. In February 2022, the U.S. Cybersecurity and Infrastructure Security Agency issued a "Shields Up" alert for American organizations noting the potential for Russia's cyber-attacks on Ukrainian government and critical infrastructure organizations to impact organizations both within and beyond the United States, particularly in the wake of sanctions imposed by the United States and its allies, which is still in effect. These circumstances increase the likelihood of cyber-attacks and/or security breaches.
We were the target of a cyber-attack in 2020, which resulted in temporary suspension of our services to clients. One of our third-party service providers was the target of a cyber-attack in December 2022, which resulted in a temporary suspension of certain services to our clients. In both instances no protected data was compromised or exfiltrated. We, and our service providers, will likely continue to be the target of other attempted cyber-attacks and security threats. Such cyber-attacks may subject us to litigation and regulatory risk, civil and criminal penalties, additional costs and diversion of management attention due to investigation, remediation efforts and engagement of third-party consultants and legal counsel in connection with such incidents, payment of "ransoms" to regain access to our systems and information, loss of clients, damage to client relationships, reduced revenue and profits, refunds of client charges and damage to our reputation, any of which could have a material adverse effect on our business, cash flows, financial condition and results of operations. While we have contingency plans and insurance coverage for potential liabilities of this nature, they may not be sufficient to cover all claims and liabilities and in some cases are subject to deductibles and layers of self-insured retention. Any system failure, inability to upgrade or update, or security breach (including cyber-attacks) related to our information technology systems may also impact third parties that we rely on in our business and could result in a hinderance to the services provided by the Company or such third parties, as the case may be, and may have a material adverse effect on our business.
We cannot ensure that we or our third-party service providers will be able to identify, prevent or contain the effects of cyber-attacks or other cybersecurity risks that bypass our security measures or disrupt our information technology systems or business. We have security technologies, processes and procedures in place to protect against cybersecurity risks and security breaches. However, hardware, software or applications we develop or procure from third parties may contain defects in design, manufacturer defects or other problems that could unexpectedly compromise information security. In addition, because the techniques used to obtain unauthorized access, disable or degrade service or sabotage systems change frequently, are becoming increasingly sophisticated, and may not immediately produce signs of intrusion, we may be unable to anticipate these techniques, timely discover or counter them or implement adequate preventative measures.
In addition, we use third-party technology, systems and services for a variety of reasons, including, without limitation, encryption and authentication technology, employee email, content delivery to clients, back-office support, and other functions that in some cases involve processing, storing and transmitting large amounts of data for our business. These third-party providers may also experience security breaches or interruptions to their information technology hardware and software infrastructure and communications systems that could adversely impact us.
Under the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act of 2009, or HITECH, implementing regulations promulgated by the U.S. Department of Health and Human Services, or "HHS," including what are referred to as the "Privacy Rule" and the "Security Rule" (collectively, "HIPAA"), we face potential liability related to the privacy of health information we obtain. We are required through our contracts with our clients and by HIPAA to protect the privacy and security of certain health information and to make certain disclosures to our clients or to the public if this information is unlawfully accessed.
Changes in privacy and information security laws and standards may require that we incur significant expense to ensure compliance due to increased technology investment and operational procedures. Noncompliance with any privacy or security laws and regulations, including, without limitation, HIPPA, or any security breach, cyber-attack or cybersecurity breach, and any incident involving the misappropriation, loss or other unauthorized disclosure or use of, or access to, sensitive or confidential information, whether by us or by one of our third-party service providers, could require us to expend significant resources to continue to modify or enhance our protective measures and to remediate any damage. In addition, this could negatively affect our operations, cause system disruptions, damage our reputation, cause client losses and contract breaches, and could also result in regulatory enforcement actions, material fines and penalties, litigation or other actions that could have a material adverse effect on our business, cash flows, financial condition and results of operations. Even if cyber-attacks or other cybersecurity breaches do not result in noncompliance with privacy or security laws, the perception that such noncompliance may have occurred by our clients or in the news media may have an adverse impact on our stock price and could result in damage to our reputation or loss of clients, which could have a material adverse effect on our business, cash flows, financial condition and results of operations.
In addition, the adoption of AI and other emerging technologies may become significant to operational results in the future. While AI and other technologies may offer substantial benefits, they may also introduce additional risk. We use AI for certain limited processes and expect our AI usage to increase in the future. However, if we are unable to successfully implement and utilize such emerging technologies as effectively as competitors or our customers are able to use AI as a replacement to our services, the Company may be negatively affected in the larger marketplace.