Due to the nature of our business, our systems and the systems of our cloud providers with which we contract store large amounts of information and data including our proprietary and confidential business data, data of our prospective and registered users, as well as data relating to the visitors and customers of our users (which we refer to as our users of users). We also maintain certain personal data of our personnel and job candidates (collectively, "Confidential Information"). Confidential Information may include personal information such as email addresses, geo-location, usage data, business data, passwords and also billing information, such as credit card numbers, full names, billing addresses, phone numbers, and additional information, which may be, or perceived to be sensitive or confidential. Third-party services available on our platform may also collect such Confidential Information and share it with us. In addition, as part of our product strategy, we have partially become an open platform, which may increase access of third parties to information and data available on our platform, or increase the scope of third parties who are integrated with our platform through our App Market. Apart from our attempts to scan and remove specific content such as content which may be deemed as child pornography or phishing patterns, we do not regularly monitor or review the content that our users, and their users, upload and store, or information, content, and data we receive from third-party applications and, therefore, we do not control the substance of the content on our servers, which may include confidential or personal information, including Confidential Information. As a result, we face risks of external or internal unauthorized access or leaks of user information, which may result in legal claims or proceedings (such as class actions) and negative reputational impacts that cause us to lose existing or future customers.
Although we have implemented cybersecurity standards and controls, operating rules and certification requirements, including in accordance with PCI DSS and Systems and Organization Controls 2 (SOC2), we cannot be sure that the steps that we have taken to protect the security, availability, integrity and confidentiality of the Confidential Information we, or our users, collect, store, or transmit, will succeed in preventing inadvertent or unauthorized use or disclosure. There can also be no assurance that our cybersecurity program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our systems and Confidential Information. Payments by Wix, for example, requires and is based on integrations with third-party vendors, service providers and payment gateways, and depends on the efficacy of secure transmission protocols and related technologies. There can be no assurance that the data security standards we have implemented, including for the collection and transmission of credit card and other payment information, or those of our third-party service providers, will adequately comply with the security standards of any jurisdiction in which we seek to market our solution.
Furthermore, like many online and other companies, we have experienced and may experience in the future cyberattacks and security incidents, as well as attempts by third parties to circumvent the security of our systems. We have experienced, and expect to continue to experience, attempts by hackers to penetrate our internal network and hosted servers. Hackers are increasingly using various tools and techniques, including leveraging technology, such as AI, to sophisticated tailored phishing attacks, ransomware, computer malware, viruses, distributed denial-of-service (DDoS) attacks, a technique used by hackers to take an internet service offline by overloading its servers, and other exploitation of known and unknown vulnerabilities. As a result, we may be unable to detect, investigate, remediate or recover from future attacks or incidents, or to avoid a material adverse impact to our information technology Systems, Confidential Information or business. Moreover, retaliatory acts by Russia in response to economic sanctions or other measures taken by the international community against Russia arising from the Russian military invasion of Ukraine could include an increased number or severity of cyberattacks from Russia or its allies. Similarly, as a result of the current war between Israel and Hamas (and any potential escalation of the conflict throughout the region), we may be increasingly targeted by malicious actors seeking to sabotage our cyber environment. The scale of some of these attacks against us in the past has caused us and some of our registered user websites to experience intermittent downtime. Although to date none of these incidents has been material, there can be no assurance that any future attempts may not be material. In addition, risks of internal leaks from our employees or other insiders, whether due to human error or malice, or acts of sabotage, exist, and we may not have adequate internal controls to properly monitor and prevent such leaks. We may not be successful in identifying, blocking or otherwise preventing access to our systems or Confidential Information, despite our security measures. Since techniques used to obtain unauthorized access change frequently, including newer strains of malware, and ransomware, as well as attacks generated by bad actors supported by foreign governments, we may be unable to anticipate these techniques or to implement adequate preventative measures. Furthermore, given that attackers are increasingly using tools that circumvent controls and obfuscate forensic evidence, we may be unable to promptly detect, investigate, remediate or recover from a future attack or incident or avoid material adverse impact to our systems, Confidential Information or business.
Because we make extensive use of third-party suppliers and service providers, such as cloud services that support our internal and customer-facing operations, successful cyberattacks that disrupt or result in unauthorized access to third party systems can materially impact our operations and financial results. Additionally, our products and services are integrated with our customers' systems and processes, and any circumvention or failure of our cybersecurity defenses or measures in relation to such systems and processes could compromise the confidentiality, integrity, and availability of our customers' proprietary or other sensitive information. We also rely on outside parties to provide physical security for our facilities, including data centers, and any physical breach of security could result in unauthorized access or damage to our systems.
If our security measures are, or are perceived to be, breached, whether because of third-party action, employee error, malfeasance or otherwise, or if design flaws in our software are exposed, exploited or abused in any way, as a result, an unauthorized party disrupts our operations, or accesses any of our Confidential Information, users' data or the data of their users, or otherwise gains control of our platform, or if it is perceived that any unauthorized access has occurred (such as when users utilize weak passwords or their credentials are disclosed, stolen or lost), our brand may be negatively impacted, we may be unable to acquire new users, our relationships with our users may be damaged, our registered users may choose to cancel their premium subscriptions, we could incur increased costs of incident responses, system restoration, remediation and compliance, or other liability and could be subject to regulatory investigations, fines and litigation (including class action lawsuits); any of which may negatively impact our business, operating results or financial performance, and/or result in a decline of our share price. Even if such a data breach affects a competitor and does not arise out of our actions or inactions, the resulting concern about using our platform could negatively affect our business.
We are also subject to federal, state, provincial and foreign laws regarding cybersecurity and the protection of our systems and Confidential Information. Many jurisdictions have enacted laws requiring companies to notify individuals (and regulators) of data breaches or cybersecurity incidents involving certain types of personal information, and, in addition, our agreements with certain of our providers require us to notify them in the event of a security incident. These, and other mandatory disclosures, including SEC required disclosures, regarding a cybersecurity incident may lead to negative publicity and may cause our investors, registered users or providers to lose confidence in the effectiveness of our cybersecurity measures. We could be required to devote significant resources to investigate and address a security incident. Additionally, some jurisdictions, as well as our contracts with certain providers, require us to use industry-standard or reasonable measures to safeguard Confidential Information, and failure to comply with such safeguards and measures may cause harm to our operations. Following the introduction of Wix Payments, our integrated payment processing solution, and the increased storage of personal and financial information, including Confidential Information, of our users and their users, a violation of data privacy or security laws or contractual clauses, many of which focus on personal financial and payment information, could lead to reputational harm, loss of business, legal action (including class action litigation) and/or regulatory inquiries, resulting in monetary liability, other penalties or other consequences that could negatively impact our reputation and adversely affect our operating results and financial condition.
If our data security measures fail to protect the credit card details, passwords or personal and financial information, including Confidential Information, adequately, we could be liable to both our users and their users for any related losses (such as fraudulent credit card transactions), as well as certain of our providers under our contractual agreements, including fines and higher transaction fees. Additionally, we could face regulatory action or face litigation, and our users and providers could terminate or materially change their relationships with us, any of which could harm our business, results of operations or financial condition. There can be no assurance that the limitations of liability in our contracts would be enforceable or adequate or would otherwise protect us from any such liabilities or damages with respect to any particular data related claim. Our existing general liability insurance coverage and coverage for errors and omissions may not continue to be available on acceptable terms or at all in the future or may not be available in sufficient amounts to cover one or more large data related claims. The insurer may also exclude certain data related events from coverage, or deny coverage for any future data related claim. The successful assertion of one or more large data related claims against us that exceeds our available insurance coverage, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or co-insurance requirements, could have a material adverse effect on our business, financial condition and results of operations.