Our business is dependent on our payroll, transaction, financial, accounting, and other data processing systems. We rely on these systems, which are maintained both internally and externally at third parties, to process, on a daily and time sensitive basis, a large number of complicated transactions. We, both through our internal systems and systems maintained by third parties, electronically receive, process, store, and transmit data and personal information about our customers and their employees, as well as our vendors and other business partners. We keep this information confidential. However, both our internal and third-party partners' websites, networks, applications and technologies, and other information systems have been, and may in the future be targeted by malevolent parties for sabotage, disruption, ransom, or data misappropriation. Further, as we grow by acquisition, these risks become acute in the period following the acquisition, as we set about integrating the acquisition target's systems into ours. Additionally, as we retire our legacy products like our bureau payroll services or sunset certain acquired products, we are decreasing investments in maintaining those systems which creates the potential for a security breach of one of those systems. The uninterrupted operation of our information systems and our ability to maintain the confidentiality and integrity of personal information and other customer and individual and company information that resides on our systems are critical to the successful operation of our business. We, and our third party providers, maintain systems and processes designed to protect this data and maintain business continuity, but notwithstanding such protective measures, there is a risk of intrusion, cyber-attacks or tampering that could compromise the integrity and privacy of this data. Any information security breach in our business processes or of our processing systems (whether they are maintained internally or externally at third parties) has the potential to impact our customer information and sensitive company information, including our financial reporting capabilities, which could result in the potential loss of business and our ability to accurately report financial results. If any of these systems fail to operate properly or become disabled even for a brief period of time, we could potentially miss a critical filing period, resulting in potential fees and penalties, or lose control of customer data, all of which could result in financial loss, a disruption of our business, liability to customers, regulatory intervention, or damage to our reputation. Further, our employees, service providers, and third parties frequently work on a remote or hybrid model, which may involve relying on less secure systems and may increase the risk of cybersecurity-related incidents. We cannot guarantee these private work environments and electronic connections to our work environment have the same security measures deployed in our physical offices.
Additionally, security breaches of customer and user information which occur outside of our systems may nevertheless result in increased business costs, lost revenues, damage to reputation, and exposure to litigation. In most instances, our customers administer access to the data of their employees and service providers. While we encourage customers to implement certain security controls, they may not implement appropriate controls to protect the identities used to access our products. As a result, customers may suffer a cybersecurity attack on their own systems, unrelated to our own, and allow a malicious actor access to the customer's information held on our platform. Even if such a breach is unrelated to our security programs or practices, such breach could cause us reputational harm and require us to incur significant economic and operational consequences in order to adequately assess and respond to the breach, including further protecting our customers from their own vulnerabilities, and to implement appropriate safeguards to protect against future breaches.
We are subject to a twenty-year consent order with the FTC that became final in June 2011 stemming from a December 2009 criminal hack into our discontinued U.S. payroll application. We conceded no wrongdoing in the order and we were not subject to any monetary fines or penalties. However, in connection with the order, we are required to, among other things, maintain a comprehensive information security program that is reasonable and appropriate for our size and complexity, and for the type of personal information we collect. We are also required to have portions of our security program, which apply to certain segments of our U.S. business, reviewed by an independent third party on a biennial basis. Maintaining, updating, monitoring, and revising an information security program in an effort to ensure that it remains reasonable and appropriate in light of changes in security threats, changes in technology, and security vulnerabilities that arise from legacy systems is time-consuming and complex, and is an ongoing effort.
While we have taken and continue to take steps to ensure compliance with the consent order, if we are determined not to be in compliance with the consent order, or if any new breaches of security occur, the FTC may take enforcement actions or other parties may initiate a lawsuit. Any such resulting fines and penalties could have a material adverse effect on our liquidity and financial results, and any reputational damage therefrom could adversely affect our relationships with our existing customers and our ability to attain new customers. Insurance may be inadequate or may not be available in the future on acceptable terms, or at all. In addition, our insurance policies may not cover all claims made against us, and defending a lawsuit, regardless of its merit, could be costly, divert management's attention, or damage our reputation.