Our continued success is dependent on our systems, applications, and software continuing to operate and to meet the changing needs of our customers and users. We rely on our technology and engineering staff and vendors to successfully implement changes to and maintain our systems and services in an efficient and secure manner. Like all information systems and technology, our website may contain material errors, failures, vulnerabilities, or bugs, particularly when new features or capabilities are released, and it may be subject to computer viruses or malicious code, break-ins, phishing impersonation attacks, attempts to overload our servers with denial-of-service or other attacks, ransomware and similar incidents, or disruptions from unauthorized use of our computer systems, as well as unintentional incidents causing data leakage, any of which could lead to interruptions, delays, or website shutdowns, or could cause loss of critical data, or the unauthorized disclosure, access, acquisition, alteration, or use of personal or other confidential information.
In the ordinary course of business, we collect, store, and transmit information, including personal information, in relation to our current, past, or potential customers, business partners, agents, staff, and contractors. We could be subject to a cyber-incident or other adverse event that threatens the security, confidentiality, integrity, or availability of our information resources, including intentional attacks or unintentional events where parties gain unauthorized access to systems to disrupt operations, corrupt data, or steal confidential information about subscribers, vendors, and employees. For example, unauthorized parties could steal or access our customers' names, email addresses, physical addresses, phone numbers, and other information that we collect when providing insurance quotes. Outside parties may also attempt to fraudulently induce employees or customers to disclose sensitive information in order to gain access to our information or customers' information. Further, our vendors are also susceptible to data breaches, including our payment processing vendors who handle customer credit card numbers or other payment information. While we use encryption and authentication technology licensed from third parties designed to effect secure transmission of such information, we cannot guarantee the security of the transfer and storage of personal information. Because the techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently, often they are not recognized until launched against a target and may originate from less regulated and remote areas around the world. Accordingly, we may be unable to proactively address these techniques or to implement adequate preventative measures. Despite our efforts and processes to prevent breaches, our products and services, as well as our servers, computer systems, and those of third parties that we use in our operations are vulnerable to cybersecurity risks, including cyber-attacks such as viruses and worms, phishing attacks, denial-of-service attacks, physical or electronic break-ins, third-party or employee theft or misuse, and similar disruptions from unauthorized tampering with our servers and computer systems or those of third parties that we use in our operations, which could lead to interruptions, delays, loss of critical data, unauthorized access to customer data, and loss of consumer confidence. In addition, we may be the target of email scams that attempt to acquire personal information or company assets.
Security breaches, including by hackers or insiders, or any other types of data security or privacy-related incidents could expose confidential or personal information, which could result in mandatory public disclosures, potential regulatory investigations, fines, penalties, compliance orders, liability, litigation, and remediation costs, as well as reputational harm, any of which could materially adversely affect our business and financial results. It could also trigger claims by affected third parties. Further, even if we do not ourselves experience a cyber-incident, hacking against our competitors or other companies could create the perception among our customers or potential customers that our digital platform is not safe to use.
If we experience compromises to our security that result in technology performance, integrity, or availability problems, the complete shutdown of our website or the loss or unauthorized disclosure, access, acquisition, alteration, or use of confidential information, customers may lose trust and confidence in us, and customers may decrease the use of our website or stop using our services entirely. Further, outside parties may attempt to fraudulently induce employees or customers to disclose sensitive information in order to gain access to our information or customers' information. A significant impact on the performance, reliability, security, and availability of our systems, software, or services may harm our reputation, impair our ability to operate, impair our ability to retain existing customers or attract new customers, and expose us to legal claims and government action, each of which could have a material adverse impact on our financial condition, results of operations, and growth prospects.
Cyber-incidents are expected to accelerate on a global basis in both frequency and magnitude, and threat actors are increasingly sophisticated in using techniques that circumvent controls, evade detection, and remove forensic evidence, which means that we and our third-party providers may be unable to anticipate, contain or recover from future attacks or incidents in a timely or effective manner. The COVID-19 pandemic increased cybersecurity risk as a result of global remote working arrangements that are likely to continue and which present opportunities for threat actors to engage in social engineering (for example, phishing) and to exploit vulnerabilities in non-corporate networks. In addition, according to U.S. Government sources and others, the conflict involving Russia and Ukraine has resulted in a heightened risk of cyber-incidents against companies, supply chain vendors and others based in the U.S. or in U.S.-allied regions.