We receive and store certain personal information about our employees and our customers, including information permitting cashless payments, both in our stores and through our online operations at dillards.com. In addition, our operations depend upon the secure transmission of confidential information over public networks. Further, our ability to supply merchandise to and operate our stores, process transactions and generate performance and financial reports are largely dependent on the security and integrity of our information technology network.
We, like other companies, face a risk of unauthorized access to devices and technology assets, as well as computer viruses, worms, bot attacks, ransomware and other destructive or disruptive software and attempts to misappropriate customer or employee information and cause system failures and disruptions. Such events can result in theft, alteration, deletion or encryption of data, or disruption of services provided by the devices and assets, as well as demands to pay a third party to regain access to encrypted files and prevent publication of stolen data. In addition, employee error, malfeasance or security lapses could result in exposure of confidential information or otherwise adversely disrupt or affect our operations. We rely on third-party service providers to provide hardware, software and services necessary to operate our information technology systems, and the same issues could occur at those third parties and have an effect on our operational technology or data. Such attacks, if successful, have the potential for creating a loss of sales, business disruption, reputational impact, litigation, liability to consumers, regulatory investigations, or otherwise adversely affect our ability to operate our business.
We have a longstanding Information Security program committed to regular risk assessment and risk mitigation practices surrounding the protection of confidential data and our information technology systems and network. Our security controls include network segmentation, firewalls, identity and access controls, endpoint protection solutions, as well as specific measures like point-to-point encryption and tokenization solutions for payment card data. We also maintain data breach preparedness plans, conduct exercises to test response plans, and employ other methods to protect our data and networks, and promote security awareness. Our Senior Management and Board of Directors exercise oversight of our security measures through various methods, including participation in response preparedness discussions and discussions regarding assessments, expenditures related to security and security controls.
It is possible that unauthorized persons might defeat our security measures, those of third-party service providers or vendors, and obtain personal information of customers, employees or others, or compromise our information technology systems. A breach, whether in our information technology systems or those of our third-party service providers or vendors, resulting in personal information being obtained by or exposed to unauthorized persons, could adversely affect our operations, results of operations, financial condition and liquidity, and could result in litigation against us or the imposition of penalties. Our reputation and our ability to attract new customers could be adversely impacted if we fail, or are perceived to have failed, to properly prevent and respond to these incidents. In addition, a security breach could require that we expend significant additional resources related to our information security systems and could result in a disruption of our operations, particularly our online sales operations. A ransomware attack may also result in exposure to business interruption and lost sales, ransom payments, costs associated with recovery of data and replacement of systems, exposure to customer and employee litigation from disclosure of confidential information, fines and penalties.
A security breach also could result in a violation attributable to the Company of applicable privacy and other laws, and subject us to litigation by private customers, business partners, or securities litigation and regulatory investigations and proceedings, any of which could result in our exposure to civil or criminal liability. The regulatory environment surrounding information security, cybersecurity, and privacy is increasingly demanding, with new and changing requirements, such as the California Consumer Privacy Act. Security breaches, cyber incidents or allegations that we used personal information in violation of applicable privacy and other laws could result in significant legal and financial exposure.