Technology and computer systems are critical to many aspects of our pharmacy business, including, but not limited to, the drug supply chain, our dispensing of drugs, and our reimbursement. For instance, we rely extensively on computer systems used by Rite Aid, Elixir Insurance, Bartell, and Health Dialog, to manage our ordering, pricing, point-of-sale, inventory replenishment and other processes. Our computer systems are at risk for failures, security breaches, and natural disasters, and they have been subject to attack by perpetrators of random or targeted malicious technology-related events, such as cyberattacks, ransomware, computer malware, worms, bot attacks or other destructive or disruptive software and attempts to misappropriate customer information, including credit card information. These sorts of attacks could subject our systems to damage or interruption from power outages, computer and telecommunications failures, computer malware, cyber-security breaches, vandalism, coordinated cyber-security attacks, severe weather conditions, catastrophic events and human error. Our disaster recovery planning considers many possible scenarios but cannot account for all eventualities. Collectively, we are building a security-aware culture across the organization by providing role-based security training, developing security champions across Technology and business areas, and partnering with industry experts. Our information security program is designed to protect confidential information, networks and systems against attacks through a multi-layered approach to address information security threats and vulnerabilities. However, a compromise of our information security controls or of those businesses with whom we interact, which results in confidential information being accessed, obtained, damaged or used by unauthorized or improper persons, could harm our reputation and expose us to regulatory actions and claims from customers and clients, financial institutions, payment card associations and other persons, any of which could adversely affect our business, financial position and results of operations. Moreover, a data security breach could require that we expend significant resources related to our information systems and infrastructure, and could distract management and other key personnel from performing their primary operational duties. We could also be adversely impacted by any significant disruptions in, or security breaches of, the systems and technology of third-party suppliers or processors we interact with, including key payors and vendors with whom we share information. If our systems are damaged, fail to function properly or otherwise become unavailable, we may incur substantial costs to repair or replace them, and may experience loss of critical data and interruptions or delays in our ability to perform critical functions, which could adversely affect our business and results of operations. Any compromise or breach of our data security, whether external or internal, or misuse of customer, associate, supplier, or our data could also result in a violation of applicable privacy, information security, and other laws, significant legal and financial exposure, fines or lawsuits, damage to our reputation, loss or misuse of the information and a loss of confidence in our security measures, which could harm our business. Although we maintain cyber-security insurance, we cannot know that the coverage limits under our insurance program will be adequate to protect us against future claims.
To effectively compete with our competitors and continue business partner relations, we must and are investing in and updating our technology and computer systems. In addition, as the regulatory environment related to information security, data collection and use, and privacy becomes increasingly rigorous, with new and constantly changing requirements applicable to our business, compliance with those requirements could also result in additional costs. While we seek to ensure that our security operations are current and that our technology can properly interface with our business partners, there are risks that our technology investments will not be successful, will not provide a return on investment, and/or may fail or never be deployed. Oftentimes, we are implementing multiple updates or technology changes at the same time. We are currently in the process of changing our omni-channel distribution and there can be no assurance that we will be able to implement this technology on its intended timeline or that it will achieve its intended benefits.We are subject to payment-related risks that could increase our operating costs, expose us to fraud or theft, subject us to potential liability and potentially disrupt our business.
We accept payments using a variety of methods, including cash, checks, credit and debit cards, gift cards and mobile payment technology, and we may accept new forms of payment over time. Acceptance of these payment options subjects us to rules, regulations, contractual obligations and compliance requirements including payment network rules and operating guidelines, data security standards and certification requirements, and rules governing electronic funds transfers. These requirements may change over time or be reinterpreted, making compliance more difficult or costly. For certain payment methods, including credit and debit cards, we pay interchange and other fees, which may increase over time and raise our operating costs. We rely on third parties to provide payment processing services, including the processing of credit cards, debit cards, and other forms of electronic payment. If these companies become unable to provide these services to us, or if their systems are compromised, it could potentially disrupt our business. The payment methods that we offer also subject us to potential fraud and theft by criminals, who are becoming increasingly more sophisticated, seeking to obtain unauthorized access to or exploit weaknesses that may exist in the payment systems. If we fail to comply with applicable rules or requirements for the payment methods we accept, or if payment-related data is compromised due to a breach or misuse of data, we may be liable for costs incurred by payment card issuing banks and other third parties or subject to fines and higher transaction fees, or our ability to accept or facilitate certain types of payments may be impaired. In addition, our customers could lose confidence in certain payment types, which may result in a shift to other payment types or potential changes to our payment systems that may result in higher costs. As a result, our business and operating results could be adversely affected.