We are reliant on our digital technology, including our Evolus Practice App, which allows customers to open a new account, order Jeuveau, pay invoices and engage with our customer experience team and medical affairs representatives. In the event that our digital technology is unable to function in the manner it was designed or at all, we would experience difficulty processing customer orders and requests in a timely manner or at all which would have a material adverse effect on our business, results of operations and financial condition.
The information systems underlying our digital technology may not be adequately designed or may not operate with the reliability and redundancy necessary to avoid performance delays or outages that could be harmful to our business. If our digital technology is unavailable when customers attempt to access them, or if they do not load as quickly as expected, users may not use our technology as often in the future, or at all, and our ability to sell our products through a more limited sales force may be disrupted and we may not realize the efficiencies of leveraging our digital technology, any of which could adversely affect our business and financial performance. As the number of users of our digital technology continues to grow we will need an increasing amount of technical infrastructure, including network capacity and computing power, to continue to satisfy our needs. It is possible that we may fail to continue to effectively scale and grow our technical infrastructure to accommodate these increased demands, which may adversely affect our customers' experience with our digital technology which may decrease our revenue and harm our results of operations.
Further, we rely on third-party service providers and technologies to operate critical business systems to process sensitive information in a variety of contexts, including, without limitation, cloud-based infrastructure, encryption and authentication technology, employee email, and other similar functions. Our ability to monitor these third parties' information security practices is limited, and these third parties may not have adequate information security measures in place, or they may suffer unexpected power losses or computer system or data network failures that negatively impacts the systems or solutions on which we rely. If our third-party service providers experience a security incident or other type of interruption or if an unexpected flaw or failed software update related to third-party software used in our information systems occurs, even if inadvertent, our information systems may become disabled or inaccessible and access to our data and other business information may be limited, which could materially disrupt our operations.
Despite the implementation of security measures, our internal computer systems, including our information systems, and those of third parties on which we rely, are vulnerable to disruption or damage from computer viruses, malware, natural disasters, terrorism, war, telecommunication and electrical failures, cybersecurity incidents, insider threats, persons who access our information systems in an unauthorized manner, or inadvertent misconfiguration of our systems. The risk of a security incident or system disruption, particularly through cybersecurity incidents, including by computer hackers, foreign governments and cybercriminals, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. Interruptions in our operations caused by any such event could result in a material disruption of our current or future product development programs. The costs to us to mitigate network security problems, bugs, viruses, worms, malicious software programs and security vulnerabilities could be significant, and while we have implemented security measures to protect our data security and information systems, our efforts to address these problems may not be successful, and these problems could result in unexpected interruptions, delays, cessation of service, government files or penalties and other harm to our business and our competitive position. Interruptions in our operations caused by any such event could also result in a material disruption in our relationship with our customers. For example, if our Evolus Practice App were rendered inoperable, we would have to process orders by telephone or otherwise which may result in slower processing times and harm to our reputation.
Moreover, a cybersecurity incident that affects our information systems or results in the unauthorized access to financial information, personally identifiable information (PII), customer information or data, including credit card transaction data or other sensitive information, could materially damage our reputation. In addition, such a security incident may require notification to governmental agencies, the media or individuals pursuant to various international, federal and state privacy and security laws, including the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Clinical Health Act of 2009, and its implementing rules and regulations, as well as regulations promulgated by the Federal Trade Commission and state breach notification laws. Additionally, the regulatory environment governing information, security and privacy laws is increasingly demanding and continues to evolve and a number of states have adopted laws and regulations that may affect our privacy and data security practices regarding the use, disclosure and protection of PII. For example, the California Consumer Privacy Act, among other things, has created new individual privacy rights and imposes increased obligations on companies handling PII. In the event of a security incident, we would also be exposed to the risk of litigation and potential liability, which could materially adversely affect our business, results of operations and financial condition. Our liability insurance may not be sufficient in type or amount to cover us against claims related to security breaches, cybersecurity incidents and other related security incidents.