Information security risks have increased in recent years, in part because of the proliferation of new technologies and an increase in remote work arrangements, as well as the increased sophistication and activities of hackers, terrorists and activists. We use internet-based channels that collect customers' financial account and payment information, as well as other sensitive information, including proprietary business information and personally identifiable information of our customers, employees, contractors, suppliers and business partners. Each year, we process hundreds of millions of records containing data related to individuals and businesses. We also provide services that are instrumental in supporting our customers and their businesses, such as merchant services and remittance processing. Cybersecurity is one of the top risks identified by our Enterprise Risk Management Committee, as technology-based organizations such as ours are vulnerable to targeted attacks aimed at exploiting network and system weaknesses.
The secure and uninterrupted operation of our networks and systems, as well as the processing, maintenance and confidentiality of the sensitive information that resides on our systems, is critical to our business operations and strategy. We have a risk-based information/cybersecurity program dedicated to protecting our data and solutions. We employ a defense-in-depth strategy, utilizing the concept of security layers and the CIA (confidential, integrity and availability) triad model. Computer systems and networks are, by nature, vulnerable to unauthorized access. An accidental or willful security breach could result in unauthorized access and/or use of customer information, including consumers' personally identifiable information or, in some cases, the protected health information of certain individuals. Our security measures could be breached by third-party action, computer viruses, accidents, employee or contractor error, or malfeasance by rogue employees. Individuals or third parties may be able to circumvent controls and/or exploit vulnerabilities that may exist, resulting in the disclosure or misuse of sensitive business and personal customer or employee information and data.
We depend on a number of third parties, including vendors, developers and partners, that are critical to our business and to which we may grant access to our customer or employee data. We have established a vendor security program that assesses the risk of these partners, and certain of our third-party relationships are subject to security requirements as specified in written contracts. However, we cannot control the actions of our third-party providers, and any cyberattacks or security breaches they experience could adversely affect our ability to service our customers or otherwise conduct our business.
Because techniques used to obtain unauthorized access, disable or degrade service, or sabotage computer systems change frequently, may be difficult to detect immediately, and generally are not recognized until they are launched against a target, we may be unable to implement adequate preventive measures. Unauthorized parties may also attempt to gain access to our systems or facilities through various means, including hacking into our systems or facilities, fraud, trickery or other means of deceiving employees and contractors. Additionally, our customers and employees have been and will continue to be targeted by threat actors using social engineering techniques to obtain confidential information or using fraudulent "phishing" emails to introduce malware into the environment. To-date, these various threats and incidents have not materially impacted our customers, our business or our financial results. However, our technologies, systems and networks are likely to be the target of future attacks due to the increasing threat landscape for all technology businesses, and we can provide no assurance that future incidents will not be material.
Despite our significant cybersecurity systems and processes, a party that circumvents our security measures could misappropriate our own, our customers' or our partners' personal or proprietary information, cause interruption in our operations, damage our computers or those of our users, or otherwise damage our reputation, all of which could deter clients and consumers from ordering our products and services and result in the termination of client contracts. Additionally, it is possible that there could be vulnerabilities that impact large segments of mobile, computer or server architecture. Any of these events would adversely affect our business, financial condition and results of operations.
In addition, if we were to experience a material information security breach, we may be required to expend significant amounts of management time and financial resources to remedy, protect against or mitigate the effects of the breach, and we may not be able to remedy the situation in a timely manner, or at all. Furthermore, under payment card association rules and our contracts with debit and credit card processors, if there is a breach of payment card information that we store or that is stored by third parties with which we do business, we could be liable to the payment card issuing banks for their cost of issuing new cards and other related expenses. We could also lose our ability to accept and process credit and debit card payments, which would likely result in the loss of customers and the inability to attract new customers. We could also be exposed to time-consuming and expensive litigation, government inquiries and/or enforcement actions. If we are unsuccessful in defending a claim regarding information security breaches, we may be forced to pay damages, penalties and fines, and our insurance coverage may not be adequate to compensate us fully for any losses that may occur. Contractual provisions with third parties, including cloud service providers, may limit our ability to recover losses resulting from the security breach of a business partner.
There are international, federal and state laws and regulations requiring companies to notify individuals of information security breaches involving their personal data, the cost of which would negatively affect our financial results. These mandatory disclosures regarding an information security breach often lead to widespread negative publicity. If we were required to make such a disclosure, it may cause our clients and customers to lose confidence in the effectiveness of our information security measures. Likewise, general publicity regarding information security breaches at other companies could lead to the perception among the general public that e-commerce is not secure. This could decrease traffic to our websites, negatively affect our financial results and limit future business opportunities.