We collect, store, use, retain, disclose, transfer and otherwise process a significant amount of confidential, sensitive and personal information from and about our actual and potential patients and our employees, including tax information, patient health information and payroll data. In addition to internal resources, we rely on third-party service providers in providing our services, including to provide continual maintenance and enhancements and security of any protected data. Such third-party service providers have access to confidential, sensitive and personal information about our patients and employees, and some of these service providers in turn subcontract with other third-party service providers. Through contractual provisions, review from our cybersecurity team, our Vulnerability Management Framework, and third-party risk management processes, we take steps to require that our service providers, and their subcontractors, protect our confidential, sensitive and personal information. However, due to the size and complexity of our technology platform and services, the amount of confidential, sensitive and personal information that we store and the number of patients, employees and third-party service providers with access to confidential, sensitive and personal information, we are potentially vulnerable to a variety of intentional and inadvertent cybersecurity attacks and other security-related incidents and threats, which could result in a material adverse effect on our business, financial position, results of operations and liquidity.
Threats to our information technology systems and data security can take a variety of forms. Hackers may develop and deploy viruses, worms and other malicious software programs that attack our networks and data centers or those of our service providers. Additionally, unauthorized parties may attempt to gain access to our systems or facilities, or those of third parties with whom we do business, through fraud, trickery, or other forms of deceiving our employees or contractors, direct social engineering, phishing, credential stuffing, ransomware, denial or degradation of service attacks and similar types of attacks against any or all of us, our patients and our service providers. Other threats include inadvertent security breaches or theft, misuse, unauthorized access or other improper actions by our employees, patients, service providers and other business partners. Cybersecurity attacks and other security-related incidents are increasing in frequency and evolving in nature.
We have implemented policy, procedural, technical, physical and administrative controls with the aim of protecting our networks, applications, bank accounts, and the confidential, sensitive and personal information entrusted to us from such threats. Specifically, we have cybersecurity management processes, independent of enterprise risk management, which adhere to an internally developed Intelligence Policy and a Vulnerability Management Framework, and in accordance therewith we have installed privacy protection systems and devices on our network and point of care tablets in an attempt to prevent unauthorized access to information in our database. In addition, a dedicated Assistant Vice President of Cybersecurity, who reports to the Chief Information Officer, has been tasked with managing the Company's cybersecurity program and related policies, under ultimate oversight by the Audit Committee of the Board of Directors. However, given the unpredictability of the timing, nature and scope of cybersecurity attacks and other security-related incidents, our technology may fail to adequately secure the confidential health information and personally identifiable information we maintain in our databases and there can be no assurance that our data and cybersecurity risk management infrastructure or any security procedures and controls that our service providers have implemented will be sufficient to prevent such incidents from occurring. Furthermore, because the methods of attack and deception change frequently, are increasingly complex and sophisticated, and can originate from a wide variety of sources, including third parties such as service providers and even nation-state actors, it is possible that we may not be able to anticipate, detect, appropriately react and respond to, or implement effective preventative measures against, all cybersecurity attacks and other security-related incidents. As a result, our business, financial condition, results of operations and liquidity could be materially and adversely affected.
The occurrence of any actual or attempted cybersecurity attack or other security-related incident, the reporting of such an incident, whether accurate or not, or our failure to make adequate or timely disclosures to the public or law enforcement agencies following any such event, whether due to delayed discovery or a failure to follow existing protocols, could result in liability to our patients and/or regulators, which could result in significant fines, litigation penalties, orders, sanctions, adverse publicity, litigation or actions against us or our service providers by governmental bodies and other regulatory authorities, patients or third parties, that could have a material adverse effect on our business, consolidated financial condition, results of operations, cash flows and liquidity. Any such proceeding or action, any related indemnification obligation, even if we are not held liable, and any resulting negative publicity, could harm our business, damage our reputation, force us to incur significant expenses in defense of these proceedings, increase the costs of conducting our business, distract the attention of management or result in the imposition of financial liability.
We may be required to expend significant capital and other resources to protect against the threat of cybersecurity attacks and security breaches or to alleviate problems caused by breaches, including unauthorized access to patient data and personally identifiable information stored in our information systems, the introduction of computer viruses or other malicious software programs to our systems, cybersecurity attacks, email phishing schemes, network disruption, denial of service attacks, malware and ransomware. A cybersecurity attack or other incident that bypasses our, our patients' or third-party service providers' information system's security, or the information system's security of vendors or counterparties to our patients' or third-party service providers, could cause a security breach that may lead to a material disruption to our information systems infrastructure or business and may involve a significant loss of business or patient health information and other confidential, sensitive or personal information. If a cybersecurity attack or other unauthorized attempt to access our systems or facilities, or those of our patients or third-party service providers, directly or indirectly, were to be successful, it could result in the theft, destruction, loss, misappropriation or release of confidential, sensitive or personal information or intellectual property, and could cause operational or business delays that may materially impact our ability to provide various healthcare services. Any successful cybersecurity attack or other unauthorized attempt to access our systems or facilities, or those of our patients or third-party service providers, also could result in negative publicity which could damage our reputation or brand with our patients, referral sources, payers or other third parties and could subject us to substantial sanctions, fines and damages and other additional civil and criminal penalties under HIPAA, the HITECH Act, the HIPAA Omnibus Rule (the "Omnibus Rule") and other federal and state privacy laws, in addition to litigation with those affected.
We, our patients, and our third-party service providers have been the victims of these types of threats, attacks and security breaches in the past. On February 21, 2024, Change Healthcare, a subsidiary of UnitedHealth Group that acts as an intermediary for processing certain payment claims we submit through certain third-party revenue cycle management solutions for payors ("third-party vendors"), notified our third-party vendors of a cybersecurity incident. In response to the incident, both our third-party vendors and Change Healthcare severed the service connections between their respective systems. The Change Healthcare incident has not affected our operations, except our ability to submit payment claims through these particular third-party vendors. In the event the Change Healthcare service is not restored in a timely fashion, we may experience payment collection delays as we turn to alternative channels to submit certain claims. As of the date hereof, the incident has affected approximately sixteen business days of billings for certain claims and could, depending on when Change Healthcare restores its service or our full implementation of alternative claims submission arrangements, result in an increase in our patient accounts receivable balances and a decrease in our Net cash provided by (used in) operating activities for the first quarter of 2024. We expect to fund any increase in working capital resulting from the billing and payment disruption through cash on hand and draws on our Securitization Facility and Revolving Credit Facility. No security measures, procedures, technology or amount of preparation can provide guaranteed protection from these threats, or ensure that we, our patients and our third-party service providers will not be victims again in the future. Similar events, like the cyber-attack described above may occur again in the future.
Failure to maintain the security and functionality of our information systems and related software, or to defend a cybersecurity attack or other attempt to gain unauthorized access to our systems, facilities or patient health information could expose us to a number of adverse consequences, the vast majority of which are not insurable, including but not limited to disruptions in our operations, regulatory and other civil and criminal penalties, fines, investigations and enforcement actions (including, but not limited to, those arising from the SEC, Federal Trade Commission, the HHS Office of Inspector General ("OIG") or State Attorneys General), litigation with those affected by the data breach, loss of patients, disputes with payers and increased operating expense, which either individually or in the aggregate could have a material adverse effect on our business, financial position, results of operations and liquidity.