The Company relies heavily on public utilities infrastructures, internal information and operating systems, and cloud-based solutions and storage to conduct its business, and these systems could fail in a variety of ways. In addition, the use of network, cloud-based, or third-party hosted systems expose the Company to the increased sophistication and activity of cyber-criminals, both domestic and international. A cyber incident is considered to be any adverse event that threatens the confidentiality, integrity, or availability of the information resources of the Company. These incidents may be an intentional attack or an unintentional event and could involve blocking the Company from accessing its own systems or remote servers in exchange for a ransom payment, gaining unauthorized access directly to our information systems, or indirectly through our vendors and customers systems or servers, for purposes of misappropriating assets, stealing confidential corporate information or customers' Personally Identifiable Information, corrupting data, denying access or causing operational disruption. The Company's independent third-party service providers or their subcontractors may also have access to customers' personal information and therefore also expose the Company to cybersecurity risk. Additionally, vendors' and customers' home, business or mobile information systems and the servers they rely on, are at risk of fraudulent corporate account takeovers which the Company may not be able to detect. There is no guarantee the Company's counteractions will be successful or that the Company will have the resources or technical expertise to anticipate, detect or prevent rapidly evolving types of cyber-attacks.
Third party or internal systems and networks may fail to operate properly or become disabled due to deliberate attacks or unintentional events. Our operations are vulnerable to disruptions from human error, natural disasters, power loss, computer viruses, spam attacks, denial of service attacks, unauthorized access and other unforeseen events. Undiscovered data corruption could render our customer information inaccurate. These events may obstruct our ability to provide services and process transactions. While we believe we are in compliance with all applicable privacy and data security laws, an incident could put our customer confidential information at risk. Although we have not experienced a cyber-incident which has compromised our data or systems, we can never be certain that all of our systems are entirely free from vulnerability to breaches of security or other technological difficulties or failures. We monitor and modify, as necessary, our protective measures in response to the perpetual evolution of cyber threats.
The occurrence of any failures or disruptions of infrastructure, or breakdown, breach, failures or interruptions of the Company's information systems, access points, or those hosted by third-party service providers and customers, or in the cloud, or the Company's inability to detect, respond, disclose and correct such occurrence or compromise in a timely manner, could result in an interruption in our ability to conduct transactions for an indeterminable length of time, could expose customers' personal and confidential information to unauthorized parties, increase the risk of fraud or theft, subject the Company to increased operational costs to detect and rectify the situation, damage the Company's reputation and deter customers from using the Company's services, and increase the Company insurance cost or the ability to obtain adequate cyber insurance coverage. In addition, as a result of any breach, we could incur higher costs to conduct our business, to increase protection or related to remediation. Furthermore, our customers could terminate their accounts with us because of a cyber-incident which occurred on their own system or with that of an unrelated third party, which is outside of our control. In addition, a security breach could also subject us to additional regulatory scrutiny and expose us to civil litigation and possible financial liability.