We receive, retain, and transmit personal information about our Members and employees, and we entrust that information to third-party business associates, including cloud service-providers that perform activities for us. In addition, we and our third-party service providers store and maintain health-related personal information, pharmacy, and medical records in connection with our health and wellness and pharmacy businesses. We also utilize third-party service providers for a variety of reasons, including, without limitation, cloud services, back-office support, and other functions and our online operations depend on the secure transmission of confidential information over public networks, including information used for cashless payments. Each year, computer hackers, cyber terrorists, and others make numerous attempts to access the information stored in companies' information systems. The use of remote work infrastructure has also increased cybersecurity risk, as remote work continues even post-COVID-19. Additionally, the rapid evolution of artificial intelligence and the integration of machine learning technologies into our internal systems may intensify our cybersecurity risks and create new risks to our business, operations, and financial condition.
The use of data by our business and our business associates is regulated in all our operating countries. Privacy and information-security laws and regulations change, and compliance with them may result in increased costs due to, among other things, system changes and the development of new processes. If we or those with whom we share information fail to comply with these laws and regulations, we could face legal risk as a result of non-compliance.
We or our third-party service providers may be unable to anticipate one or more of the rapidly evolving and increasingly sophisticated means by which computer hackers, cyber terrorists and others may attempt to defeat our security measures or those of our third-party service providers and breach our or our third-party service providers' information systems. Error or malfeasance by our employees or consultants, faulty password management, or other irregularities may result in the defeat of our or our third-party service providers' security measures and a breach of our or our third-party service providers` information systems (whether digital or otherwise). As a result, one or more hackers, cyber terrorists or others might obtain the personal information of Members, employees and vendors that we hold or to which our third-party service providers have access, and we or our third-party service providers may not discover any security breach and loss of information for a significant period of time after the security breach occurs. Our logging capabilities, or those of third parties, are also not always complete or sufficiently detailed, affecting our ability to fully investigate and understand the scope of security events. We, or one of our third-party service providers may also be subject to a ransomware or cyber-extortion attack, which could significantly disrupt our operations. In the enterprise context, ransomware attacks involve restricting access to computer systems or vital data until a ransom is paid.
Any breach of our security measures or those of our third-party service providers and loss of our confidential information, or any failure by us to comply with applicable privacy and information security laws and regulations, could cause us to incur significant costs to protect any Members and/or employees whose personal data was compromised to restore Member and employee confidence in us and to make changes to our information systems and administrative processes to address security issues and compliance with applicable laws and regulations.
In addition, such events could have a material adverse effect on our reputation with our Members, employees, vendors and stockholders, as well as our results of operations, financial condition and liquidity; could result in the release to the public of confidential information about our operations and financial condition and performance; and could result in litigation against us or the imposition of penalties or liabilities. Moreover, a security breach could require us to devote significant management resources to address the problems created by the security breach and to expend significant additional resources to further upgrade the security measures that we employ to guard such important personal information against cyberattacks and other attempts to access such information, resulting in a disruption of our operations.
We regularly reassess these risks in response to the evolving cybersecurity landscape, and any significant changes are promptly communicated to executive management and our Board or Audit Committee. There are no assurances that our cybersecurity risk management program, policies, controls, or procedures will be fully implemented, complied with, or effectively protect our systems and information. We have not identified, and are not aware of, any risks from cybersecurity threats, including as a result of any prior cybersecurity incidents, which have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. Despite our security measures, there can be no assurance that we, or third parties with whom we interact, will not experience a cybersecurity incident in the future that materially affects us.