Our internal information technology ("IT") systems contain certain personal, financial, health, or other protected and confidential information that is entrusted to us by our customers and employees. Our IT systems also contain the Company's and its wholly-owned subsidiaries' proprietary and other confidential information related to our business, such as business plans, customer lists and product and service development initiatives. From time to time, we have integration with new IT systems due to organic growth and acquisitions. In addition, we grant third-party business partners and service providers access to confidential information in order to facilitate business operations and administer employee benefits. Employees, third-party business partners, and service providers can knowingly or unknowingly disseminate such information or serve as an entry point for bad actors to access such information.
Our privacy compliance and digital risk management initiatives focus on the threats and risks to enterprise information and the underlying IT systems processing such information as part of the implementation of business processes. The Company also relies on, among other things, commercially available vendors, cybersecurity protection systems, software, tools and monitoring to provide security for processing, transmission and storage of protected information and data. The systems currently used for transmission and approval of payment card transactions, and the technology utilized in payment cards themselves, all of which can put payment card data at risk, meet standards set by the payment card industry ("PCI"). We have also implemented policies and procedures, internal training, system controls, and monitoring and audit processes to protect the Company from internal and external vulnerabilities and to comply with consumer privacy laws in the areas in which we operate. Further, the Company limits retention of certain data, encrypts certain data and otherwise protects information to comply with consumer privacy laws in the areas in which we operate.
We continue to evaluate and modify our systems and protocols for data security compliance purposes, and such standards may change from time to time. We monitor certain third-party business partners and service providers for compliance and vulnerabilities. Activities by bad actors, changes in computer and software capabilities and encryption technology, new tools and discoveries, cloud applications, changes in multi-jurisdictional regulations, and other events or developments may result in a compromise or breach of our systems. Any compromises, breaches, application errors or human mistakes related to our systems or failures to comply with applicable standards could not only disrupt our financial operations, including our customers' ability to pay for our services and products by credit card or their willingness to purchase our services and products, but could also result in violations of applicable laws, regulations, orders, industry standards or agreements and subject us to costs, penalties and liabilities which could have a material adverse impact on our reputation, business, financial condition, results of operations and cash flows. A breach of data security or failure to comply with rigorous multi-jurisdictional consumer privacy requirements could expose us to customer litigation, regulatory actions and costs related to the reporting and handling of such a violation or breach. Furthermore, while we maintain cybersecurity insurance, our insurance may not cover all liabilities incurred due to a security breach or incident and this could have a material adverse effect on our reputation, financial condition, results of operations and cash flows.