Our business involves the storage and/or transmission of proprietary information and sensitive or confidential data, including personal information of our employees, customers, and others. In addition, we rely on our vendors that provide goods and services to us to maintain appropriate security measures to protect our operations. Also, we operate data centers for our customers that host their technology infrastructure and may store and transmit both business-critical data and confidential information. In connection with our services business, some of our employees also may have access to our customers' confidential data and other information. We have privacy and data security policies in place that are designed to prevent security breaches; however, as newer technologies emerge such as AI, and the portfolio of the service providers with whom we share sensitive information grows, we could be exposed to increased risk of breaches in data security and other illegal or fraudulent acts, including ransomware attacks and other types of cyberattacks. The evolving nature of such threats, considering new and sophisticated methods used by criminals and cyberterrorists, including computer viruses, malware, phishing, social engineering, AI, and forgery, are making it increasingly challenging to anticipate and adequately mitigate these risks.
As a high percentage of our employees work from home more often than in our offices, we are highly reliant on the availability and functionality of our information systems to enable our operations. Working from home may increase risk of data loss, including privacy-related events. If our information systems are not operational for reasons which may include cybersecurity attacks, data center failures, failures by telecom providers to provide services to our business and to our employees' homes, as well as the home offices of our vendors' and customers' employees, power failures, or failures of cloud application software such as SaaS based software, our business and financial results may be adversely impacted.
If third parties or our employees are able to maliciously penetrate our network security or otherwise misappropriate our customers' information or employees' personal information, or other information for which our customers may be responsible and for which we agree to be responsible in connection with service contracts into which we may enter, or if we give third parties or our employees improper access to certain information, we could be subject to liability. This liability could include claims for unauthorized access to devices on our network; unauthorized access to our customers' or suppliers' networks, hardware, applications, data, devices, or software; unauthorized purchases with credit card information; and identity theft or other similar fraud-related claims. This liability could also include claims for other misuses of or inappropriate access to personal information. Other liability could include claims alleging misrepresentation of our privacy and data security practices. Any such liability could decrease our profitability. We could incur additional expenses when new laws or regulations regarding the use, safeguarding, or privacy of information are enacted or interpreted if governmental agencies require us to substantially modify our privacy or security practices. We could fail to comply with international and domestic data privacy laws, the violation of which may result in audits, fines, penalties, litigation, or administrative enforcement actions with associated costs.
Third parties, such as hackers, could circumvent or sabotage the security practices and products used in our product and service offerings, and/or the security practices or products used in our internal IT systems, which could result in disclosure of sensitive or personal information, unauthorized procurement, or other business interruptions that could damage our reputation and disrupt our business, as well as that of our customers. Attacks may range from random attempts to coordinated and targeted attacks, including sophisticated computer crime and advanced persistent threats.
Advances in technology, new discoveries in the field of cryptography, quantum computing, or AI, other events or developments may result in a compromise or breach of the security practices we use to protect sensitive customer transaction information and employee information. A party that can circumvent our security measures could misappropriate proprietary information or cause interruptions in our operations. Further, third parties may attempt to fraudulently induce employees or customers into disclosing sensitive information such as usernames, passwords, or other information or otherwise compromise the security of our internal networks and/or our customers' information. Since techniques used to obtain unauthorized access change frequently and the impact and severity of security breaches are increasing, we may be unable to implement adequate preventative measures or timely identify or stop security breaches while they are occurring.
We may be required to expend significant capital and other resources to protect against security breaches or to remediate the subsequent risks and issues caused by such breaches. Our security measures are designed to protect against security breaches, but our failure to prevent such security breaches could cause us to incur significant expense to investigate and respond to a security breach and remediate any problems caused by any breach, subject us to liability, damage our reputation, and diminish the value of our brand. There can be no assurance that the limitations of liability in our contracts would be enforceable or adequate or would otherwise protect us from any such liabilities or damages with respect to any claim. We also cannot be sure that our existing insurance coverage for errors and omissions or security breaches will continue to be available on acceptable terms or in sufficient amounts to cover one or more large claims, or that our insurers will not deny coverage as to any future claim. The successful assertion of one or more large claims against us that exceeds our available insurance coverage, or changes in our insurance policies, including additional exclusions, premium increases or the imposition of large deductible or co-insurance requirements, could have an adverse effect on our business, financial condition, and results of operations.