We collect, receive, store, process, generate, use, transfer, disclose, make accessible, protect, secure, dispose of and share personal information, confidential information and other information necessary to provide our services, to operate our business, for legal and marketing purposes, and for other business-related purposes.
Our platform and products involve the storage and transmission of data, including personal information, and security breaches or unauthorized access to our platform and products, or those of our third-party service providers, could result in the unauthorized, unlawful, or accidental acquisition, modification, destruction, loss, alteration, encryption, disclosure of, or access to sensitive information including our customers' data. Consequently, we may be subject to significant litigation, indemnity obligations, fines, penalties, disputes, investigations and other liabilities. We have previously and may in the future become the target of cyber-attacks by third parties seeking to gain unauthorized access to and exfiltrate our or our customers' data, including confidential and personal information, from certain of our infrastructure resources, or to disrupt our ability to provide our services. In addition, many of our employees are working remotely, which may pose additional data security risks (including, for example, an increase in phishing and malicious emails we began experiencing during 2020). The reliability and continuous availability of our platform is critical to our success. However, complex software such as ours can contain errors, defects, security vulnerabilities or software bugs that, despite testing by us, are difficult to detect and correct, particularly when such vulnerabilities are first introduced or when new versions or enhancements of our platform are released. Real or perceived errors, defects, security vulnerabilities or software bugs in our products could result in reputational harm, reduce the demand for our products and expose us to breach of contract claims, regulatory fines and related liabilities.
We may use third-party service providers and sub-processors to help us deliver services to our customers. These vendors, such as cloud infrastructure providers, may store or process personal and confidential information for us or our customers. We use third-party technology, systems and services in a variety of contexts, including, without limitation, encryption and authentication technology, employee email, content delivery to customers, back-office support, credit card processing and other functions. While we have taken steps to protect the confidential and personal information that we have access to, our security measures or those of our third-party service providers that store or otherwise process certain of our and our customers' data on our behalf could be breached or we could suffer a loss of our or our customers' data. Our ability to monitor our third-party service providers' data security is limited. Cyber-attacks, computer malware, viruses, employee mistakes or malfeasance, social engineering (including spear phishing), malicious code, denial-of-service attacks, credential harvesting and general hacking have become more prevalent in our industry, particularly against cloud services. Ransomware attacks, including those from organized criminal threat actors, nation-states and nation-state supported actors, are becoming increasingly prevalent and can lead to significant interruptions, delays, or outages in our operations, loss of data (including customer data), loss of income, significant extra expenses to restore data or systems, reputational loss and the diversion of funds. To alleviate the financial, operational and reputational impact of a ransomware attack it may be preferable to make extortion payments, but we may be unwilling or unable to do so (including, for example, if applicable laws or regulations prohibit such payments). Similarly, supply chain attacks have increased in frequency and severity, and we cannot guarantee that third parties and infrastructure in our supply chain have not been compromised or that they do not contain exploitable defects or bugs that could result in a breach of or disruption to our platform, systems and networks or the systems and networks of third parties that support us and our services. Despite the security controls we have in place, such attacks are very difficult to avoid.
There can be no assurance that any security measures that we or our third-party service providers have implemented will be effective against current or future security threats. While we have developed systems and processes designed to protect the integrity, confidentiality, and security of our and our customers' data, our security measures or those of our third-party service providers could fail and result in unauthorized access to or disclosure, modification, misuse, loss or destruction of such data.
Third parties may also conduct attacks designed to temporarily deny customers access to our cloud services. Any security breach or other security incident, or the perception that one has occurred, could result in a loss of customer confidence in the security of our platform and damage to our brand, reduce the demand for our products, disrupt normal business operations, require us to spend material resources to investigate or correct the breach and to prevent future security breaches and incidents, expose us to legal liabilities, including litigation, regulatory enforcement, and indemnity obligations, and adversely affect our business, financial condition and results of operations. These risks are likely to increase as we continue to grow and process, store, and transmit increasingly large amounts of data.
In addition, we do not directly control content that our customers store in our products. If our customers use our products for the collection, transmission or storage of personal information and our security measures are or are believed to have been breached as a result of third-party action, employee error, malfeasance or otherwise, our reputation could be damaged, our business may suffer, and we could incur significant liability. In addition, our remediation efforts may not be successful.
We also process, store and transmit our own data as part of our business and operations. This data may include personal, confidential or proprietary information. We may expend significant resources, fundamentally change our business activities and practices, or modify our operations or information technology in an effort to protect against security incidents and to mitigate, detect, and remediate actual and potential vulnerabilities.
We take steps designed to detect, mitigate, and remediate vulnerabilities in our information systems (such as our hardware and/or software, including that of third parties upon which we rely). We may not, however, detect and remediate all such vulnerabilities on a timely basis. Among other things, our applications, systems, networks, software, other computer assets and physical facilities could be breached or could otherwise malfunction or fail, or the personal or confidential information that we store could be otherwise compromised due to employee error or malfeasance, if, for example, third parties fraudulently induce our employees or our members to disclose information or user names and/or passwords, or otherwise compromise the security of our networks, systems and/or physical facilities. Additionally, from time to time employees or service providers may inadvertently misconfigure resources or misdirect certain communications, leading to security vulnerabilities or incidents that we must then expend effort and incur expenses to correct.
We may have contractual and other legal obligations to notify relevant stakeholders of security incidents. For instance, most jurisdictions have enacted laws, such as the U.S. Health Insurance Portability and Accountability Act of 1996, or HIPAA, requiring companies to notify individuals, regulatory authorities, and others of security breaches involving certain types of data. Such mandatory contractual and legal disclosures are costly, could lead to negative publicity, may cause our customers to lose confidence in the effectiveness of our security measures and require us to expend significant capital and other resources to respond to and/or alleviate problems caused by the actual or perceived security breach, and any failure to provide appropriate notice may violate the terms of our customer contracts. Applicable laws, our contracts, our representations, or industry standards may require us to use industry-standard or reasonable measures to safeguard sensitive personal information or confidential information. A security breach could lead to claims by our customers, or other relevant stakeholders, that we have failed to comply with such legal or contractual obligations. As a result, we could be subject to legal action or our customers could end their relationships with us. Further, there can be no assurance that any limitations of liability in our contracts would be enforceable or adequate or would otherwise protect us from liabilities or damages.
The costs to respond to a security breach and/or mitigate any security vulnerabilities that may be identified could be significant, our efforts to address these problems may not be successful, and these problems could result in unexpected interruptions, delays, cessation of service, negative publicity, and other harm to our business and our competitive position. We could be required to fundamentally change our business activities and practices in response to a security breach or related regulatory actions or litigation, which could have an adverse effect on our business.
Additionally, we cannot be certain that our insurance coverage will be adequate for fines, judgments, settlements, penalties, costs, attorney fees and other impacts that arise out of privacy or security incidents or breaches. If the impacts of a privacy or security incident or breach, or the successful assertion of one or more large claims against us that exceeds our available insurance coverage, or results in changes to our insurance policies (including premium increases or the imposition of large deductible or co-insurance requirements), it could have an adverse effect on our business. In addition, we cannot be sure that our existing insurance coverage, cyber coverage and coverage for errors and omissions will continue to be available on acceptable terms or that our insurers will not deny coverage as to any future claim. The successful assertion of one or more large claims against us that exceed available insurance coverage, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or co-insurance requirements, could adversely affect our reputation, business, financial condition and results of operations. Our risks are likely to increase as we continue to expand, grow our customer base, and process, store, and transmit increasingly large amounts of proprietary and sensitive data.