In the regular course of our business, we collect, use, store, transmit, and process data and information about Hosts, Guests, employees, and others, some of which may be sensitive, personal, or confidential and make us an attractive target and potentially vulnerable to cyberattacks, computer viruses, electronic break-ins or similar disruptions. Any actual or perceived unauthorized access to or use of such data and information, or breach of our security measures or those of our third-party service providers, could adversely affect our business, operations, and future prospects. While we have taken steps to mitigate our cyberattack risks and protect the confidential information that we have access to, including but not limited to installation and periodical updates of antivirus software and backup of information on our computer systems, our security measures could be breached. Because techniques used to sabotage or obtain unauthorized access to systems change frequently and generally are not recognized until they are launched against a target, we may be unable to anticipate these techniques or to implement adequate preventative measures. Any cybersecurity incident, accidental or willful security breaches or other unauthorized access to our systems could cause confidential information to be stolen and used for criminal purposes. Cybersecurity incidents, security breaches or unauthorized access to confidential information could also expose us to liability related to the loss of the information, time-consuming and expensive litigation and negative publicity. If security measures are breached because of third-party action, employee error, malfeasance or otherwise, or if design flaws in our technology infrastructure are exposed and exploited, our relationships with our Hosts and Guests could be severely damaged, we could incur significant liability, and our business and operations could be adversely affected. Additionally, if we fail to protect confidential information, we may be susceptible to potential claims such as breach of contract, negligence or other claims. Such claims will require considerable time and resources to defend and there can be no assurances that favorable final outcomes will be obtained.
An increasing number of organizations, including large online and offline merchants and businesses, other large Internet companies, financial institutions, and government institutions have disclosed breaches of their information security systems and other information security incidents, some of which have involved sophisticated and highly targeted attacks. In addition, users on our platform could have vulnerabilities on their own mobile devices that are entirely unrelated to our systems and platform, but which could mistakenly be attributed to us and our system and platform. Further, breaches experienced by other companies may also be leveraged against us. For example, credential stuffing and ransomware attacks are becoming increasingly common, and sophisticated actors can mask their attacks, making them increasingly difficult to identify and prevent. Certain efforts may be state-sponsored or supported by significant financial and technological resources, making them even more difficult to detect. If a third party or employee circumvents any of our security measures or those of our third-party service providers, they may access, misappropriate, delete, alter, publish, or modify this information, which could cause interruptions in our business and operations, fraud or loss to third parties, regulatory enforcement actions, litigation, indemnity obligations, competitive harm, and other possible liabilities, as well as negative publicity. Widespread negative publicity may also result from real, threatened, or perceived security compromises (or lack of adequate security measures) of our industry, competitors, Hosts, and Guests. Concerns regarding privacy and data security could cause some Hosts and Guests to stop using our services, and for employees to be less satisfied with their employment with us and potentially leave the Company or institute claims against us. This discontinuance in use and the potential failure to acquire new Hosts and Guests, and similar personnel issues, could substantially harm our business, results of operations, financial condition, and future prospects.
Our information technology systems, internal computer systems, cloud-based computing services, and those of our current and any future third-party service providers are vulnerable to interruption and intrusion. Cyberattacks and other malicious internet-based activity, such as insider threats, computer malware, hacking, and phishing attempts continue to increase. Any cybersecurity incident or material disruption or slowdown of our systems could cause outages or delays in our services, which could harm our brand and adversely affect our operating results. Our failure to implement adequate cybersecurity protections could subject us to claims for any breach of security, particularly if it results in disclosure of information relating to our Hosts or Guests. If changes in technology cause our systems to become obsolete, or if our systems are inadequate to facilitate our growth, we could lose Hosts or Guests, and our business and operating results could be adversely affected. From time to time, and especially in 2018, we have experienced security incidents or attempted attacks, and in some instances, individuals have had their personal information compromised. We conduct investigations when we become aware of such incidents and/or attempted attacks (although our investigations may not be able to determine the method of attack) and may notify affected persons, as necessary. In addition to traditional computer "hackers" employing malicious code (such as viruses, worms, and ransomware) to breach our systems and platform, we are susceptible to and monitor for social engineering, cyber extortion, and personnel theft or misuse.
We may also be the subject of denial-of-service attacks, server malfunction, software or hardware failures, loss of data or other computer assets, adware, or other similar issues. Threat actors, nation states, and nation state-supported actors engage in cyberattacks, including for geopolitical reasons, continued opportunistic monetary reasons, and in connection with military conflicts and operations. During times of war and other major conflicts, we and our third-party service providers may be vulnerable to these attacks, including cyberattacks that could materially disrupt our systems, platform and operations. While we have security measures in place to protect customer information and prevent data loss, service interruption, and other security breaches, we cannot guarantee that our security measures or our third-party service providers' security measures will be sufficient to protect against unauthorized access to, or other compromise of, personal information, confidential information, or proprietary information or of disruptions or damage to our systems. The techniques used to sabotage or to obtain unauthorized access to our platform, systems, networks, and/or physical facilities in which data is stored or through which data is transmitted change frequently, and we may be unable to anticipate such techniques or implement adequate preventative measures or stop security breaches that may arise from such techniques. As a result, our safeguards and preventive measures may not be adequate to prevent current or future cyberattacks and security incidents, including security breaches that may remain undetected for extended periods of time, which can substantially increase the potential for a material and adverse impact resulting from the breach.
We are required to comply with laws, rules, industry standards, and regulations that require us to maintain the security of personal information in India. We may also have contractual and other legal obligations to notify relevant stakeholders of security breaches. Failure to prevent or mitigate cyberattacks could result and has in the past resulted in unauthorized access to such data, including personal information. India has enacted laws requiring companies to notify individuals, regulatory authorities, and others of security breaches involving certain types of data. In addition, our agreements with certain partners may require us to notify them in the event of a security breach. Such disclosures are and could be costly, could lead to negative publicity, may cause Hosts and Guests to lose confidence in the effectiveness of our security measures and to not use our services, and may require us to expend significant capital and other resources to respond to and/or alleviate problems caused by the actual or perceived security breach. In addition, the costs to respond to a cybersecurity event or to mitigate any identified security vulnerabilities could be significant, including costs for remediating the effects of such an event, paying a ransom, restoring data from backups, and conducting data analysis to determine what data may have been affected by the breach. In addition, our efforts to contain or remediate a security breach or any system vulnerability may be unsuccessful, and our efforts and any related failures to contain or remediate any breach or vulnerabilities could result in interruptions, delays, loss in customer trust, harm to our reputation, and increases in our insurance premiums.
We do not currently have insurance coverage for security incidents or breaches, including fines, judgments, settlements, penalties, costs, attorney fees, and other impacts that arise out of incidents or breaches. While we may obtain cyber liability insurance in the future, we cannot assure you that such insurance coverage will adequately cover liabilities actually incurred or that insurance will continue to be available to us on economically reasonable terms, or at all. The successful assertion against us of one or more large claims that exceeds available insurance coverage, or that results in changes to insurance policies (including premium increases or the imposition of large deductible or co-insurance requirements), could have an adverse effect on our business. Our risks are likely to increase as we continue to expand, grow our Host and Guest base, and process, store, and transmit increasingly substantial amounts of confidential, proprietary and sensitive data.