In the normal course of business, our information technology systems hold sensitive patient information including patient demographic data and other protected health information, which is subject to HIPAA and HITECH. We also contract with third-party vendors to maintain and store our patients' individually identifiable health information. Numerous state and federal laws and regulations address privacy and information security concerns resulting from our access to our patient's and employee's personal information.
Our information technology systems and those of our vendors that process, maintain, and transmit such data are subject to computer viruses, cyber-attacks, or breaches. We adhere to policies and procedures designed to ensure compliance with HIPAA and other privacy and information security laws and require our third-party vendors to do so as well. If, however, we or our third-party vendors experience a breach, loss, or other compromise of unsecured protected health information or other personal information, such an event could result in significant civil and criminal penalties, lawsuits, reputational harm, and increased costs to us, any of which could have a material adverse effect on our financial condition and results of operations.
Furthermore, while our information technology systems, and those of our third-party vendors, are maintained with safeguards protecting against cyber-attacks. A cyber-attack that bypasses our information technology security systems, or those of our third-party vendors, could result in a material adverse effect on our business, financial condition, results of operations, or cash flows. In addition, our future results could be adversely affected due to the theft, destruction, loss, misappropriation, or release of protected health information, other confidential data or proprietary business information, operational or business delays resulting from the disruption of information technology systems and subsequent mitigation activities, or regulatory action taken as a result of such incident. We provide our employees with training and regular reminders on important measures they can take to prevent breaches. We routinely identify attempts to gain unauthorized access to our systems. However, given the rapidly evolving nature and proliferation of cyber threats, there can be no assurance our training and network security measures or other controls will detect, prevent, or remediate security or data breaches in a timely manner or otherwise prevent unauthorized access to, damage to, or interruption of our systems and operations. Accordingly, we may be vulnerable to losses associated with the improper functioning, security breach, or unavailability of our information systems as well as any systems used in acquired operations.