Our operations depend on our ability to protect our network from interruption by damage from hackers, social engineering and phishing, ransomware, computer viruses, worms, other malicious software programs or similar disruptive problems or other events beyond our control. In the past, we have been subject to denial or disruption of service ("DDOS"), and we may be subject to DDOS attacks in the future. We cannot assure you that our backup systems, regular data backups, security protocols, DDOS mitigation and other procedures that are currently in place, or that may be in place in the future, will be adequate to prevent significant damage, system failure or data loss.
Inherent in our provision of service are the storage, processing, and transmission of our customers' data, which may include confidential and sensitive information. Customers may use our services to store, process and transmit a wide variety of confidential and sensitive information such as credit card, bank account and other financial information, proprietary information, trade secrets or other data that may be protected by sector-specific laws and regulations like intellectual property laws, laws addressing the protection of personally identifiable information (or personal data in the European Union), as well as the Federal Communications Commission's, or the FCC's, customer proprietary network information ("CPNI") rules. We may be targets of cyber threats and security breaches, given the nature of the information we store, process and transmit and the fact that we provide communications services to a broad range of businesses.
In addition, we use third-party vendors which in some cases have access to our data and our customers' data. Despite the implementation of security measures by us or our vendors, our computing devices, infrastructure or networks, or our vendors computing devices, infrastructure or networks may be vulnerable to hackers, social engineering and phishing, ransomware, computer viruses, worms, other malicious software programs or similar disruptive problems due to a security vulnerability in our or our vendors' infrastructure or network, or our vendors, customers, employees, business partners, consultants or other internet users who attempt to invade our or our vendors' public and private computers, tablets, mobile devices, software, data networks, or voice networks. If there is a security vulnerability in our or our vendors' infrastructure or networks that is successfully targeted, we could face increased costs, liability claims, government investigations, fines, penalties or forfeitures, class action litigation, reduced revenue, or harm to our reputation or competitive position.