Like all online services, we are vulnerable to power outages, telecommunications failures, and catastrophic events, as well as computer viruses, break-ins, intentional or accidental actions or inaction by employees or others with authorized access to our networks, phishing attacks, denial-of-service attacks, malicious or destructive code, malware, ransomware or other extortion attacks, and other cyber attacks, breaches and security incidents. We regularly experience cyber-related events that may result in technology disruptions and/or security breaches, including intentional, inadvertent, or social engineering breaches occurring through Etsy or third-party service provider technical issues, vulnerabilities, or employees. Any of these occurrences could lead to interruptions or shutdowns of one or more of our platforms, loss of data, unauthorized disclosure of personal or financial information of our members or employees, or theft of our intellectual property or user data. Furthermore, if our employees, contractors, or third-party service providers fail to comply with our internal security policies and practices, member or employee data may be improperly accessed, used, or disclosed. Additionally, employees, contractors, or service providers have and may inadvertently misconfigure resources or misdirect certain communications in manners that may lead to security incidents, which could be expensive and time-consuming to correct. As we strive to reignite growth in our business, expand internationally, and gain greater public visibility, we may continue to face a higher risk of being targeted by cyber attacks.
Although we have integrated a variety of processes, technologies, and controls to assist in our efforts to assess, identify, and manage material cybersecurity-related risks, these are not exhaustive, and we cannot assure that they will be adequate to prevent or detect service interruption, system failure, data loss or theft, or other material adverse consequences, directly or through our vendors. Additionally, these measures have not always been in the past, and in the future may not be, sufficient to prevent or detect a cyber attack, system failure, or security breach particularly given the increasingly sophisticated tools and methods used by hackers, state actors, organized cyber criminals, and cyber terrorists. The costs and effort to respond to a security breach and/or to mitigate any security vulnerabilities that may be identified could be significant, our efforts to address these problems may not be successful, and these problems could result in unexpected interruptions, delays, cessation of service, negative publicity, negative seller or buyer sentiment, and other harm to our business and our competitive position. We could be required to fundamentally change our business activities and practices in response to a security breach or related regulatory actions or litigation, which would have an adverse effect on our business.
Our production systems rely on internal technology, along with cloud services and software provided by our third-party service providers (and other entities in our supply chain). In the event of a cyber-related incident, even partial unavailability of our production systems could impair our ability to serve our customers, manage transactions, or operate our marketplaces. We have implemented disaster recovery mechanisms, including systems to back up key data and production systems, but these systems may be inadequate or incomplete. For example, these disaster recovery systems may be susceptible to cyber-related events if insufficiently distributed across locations, not sufficiently separated from primary systems, not comprehensive, or not at a scale sufficient to replace our primary systems. Insufficient production and disaster recovery systems could, in the event of a cyber-related incident, harm our growth prospects, our business, and our reputation for maintaining trusted marketplaces.
Cyber attacks aimed at disrupting our and our third-party service providers' services regularly occur, and we expect they will continue to occur in the future. If we or our third-party service providers (and other entities in our supply chain) experience any cyber attacks or other security breaches or incidents that result in marketplace performance or availability problems or loss, compromise or unauthorized disclosure or use of personal data or other sensitive information, or if we fail to respond appropriately to any security breaches or incidents that we may experience, people may become unwilling to provide us the information necessary to set up an account with us.
We also rely on the security practices of our third-party service providers, which may be outside of our direct control. Additionally, some of our third-party service providers, such as identity verification and payment processing providers, regularly have access to payment card information and other confidential and sensitive member data. We may have contractual and regulatory obligations to supervise the security and privacy practices of our third-party service providers. Despite our best efforts, if these third parties fail to adhere to adequate security practices, or, as has occurred from time to time in the past, experience a cyber-related event or attack such as a breach of their networks, our members' data may be rendered unavailable, improperly accessed, used, or disclosed. More generally, our third-party service providers may not have adequate security and privacy controls, may not properly exercise their compliance, regulatory or notification requirements, including as to personal data, or may not have the resources to properly respond to an incident. Many of our service providers continue to operate in a partial or fully remote work environment and may, as a result, be more vulnerable to cyber attacks. Consequently, a security incident at any of such service providers or others in our supply chain could result in the loss, compromise, or unauthorized access to or disclosure of sensitive or personal data of our buyers or sellers.
In addition, the industry has generally moved to online remote infrastructure for core work and, as a result, we and our partners may be more vulnerable to cyber attacks. If a natural disaster, power outage, connectivity issue, or other event that impacted our employees' ability to work remotely were to occur, it may be difficult or, in certain cases, impossible, for us to operate our business for a substantial period of time. The prevalence of remote working for employees, vendors, or contractors may also result in increased consumer privacy, IT security, and fraud concerns or increased administrative costs.
A successful cyber attack could occur and persist for an extended period of time before being detected. Because the techniques used by hackers change frequently, we may be unable to anticipate these techniques or implement adequate preventive measures. In addition, because any investigation of a cybersecurity incident would be inherently unpredictable, the extent of a particular cybersecurity incident and the path of investigating the incident may not be immediately clear. It may take a significant amount of time before an investigation can be completed and full and reliable information about the incident is known. While an investigation is ongoing, we may not necessarily know the extent of the harm or how best to remediate it, certain errors or actions could be repeated or compounded before they are discovered and remediated, and communication to the public, regulators, members of our communities, and other stakeholders may be inaccurate or incomplete, any or all of which could further increase the costs and consequences of a cybersecurity incident. Applicable rules regarding how to respond, required notices to users, and reporting to regulators and investors vary by jurisdiction, and may subject us to additional liability and reputational harm.
If we experience, or are perceived to experience, security breaches that result in marketplace performance or availability problems or the loss, compromise or unauthorized disclosure of personal data or other sensitive information, or if we fail to respond appropriately to any security breaches that we may experience, or are perceived to do so, people may become unwilling to provide us the information necessary to set up an account with us to become a new seller or buyer. Existing sellers and buyers may also stop listing new items for sale, decrease their purchases, or close their accounts altogether. We could also face damage to our reputation, potential liability, regulatory investigations in multiple jurisdictions, and costly remediation efforts and litigation, which may not be adequately covered by, and which may impact our future access to, insurance. Any of these results could harm our growth prospects, our business, and our reputation for maintaining trusted marketplaces.