Our business, including our ability to provide products and services to and manage our Members, depends on the performance and availability of our information technology infrastructure, including our core transactional systems. The most important aspect of our information technology infrastructure is the system through which we record and track Member sales, Volume Points, royalty overrides, bonuses, and other incentives. The failure of our information systems to operate effectively, or a breach in security of these systems, could adversely impact the promptness and accuracy of our product distribution and transaction processing. While we continue to invest in our information technology infrastructure, there can be no assurance that there will not be any significant interruptions to such systems, that the systems will be adequate to meet all of our business needs, or that the systems will keep pace with continuing changes in technology, legal and regulatory standards. Further, as discussed in Part II, Item 7, Management's Discussion and Analysis of Financial Condition and Results of Operations, we recently commenced a Digital Technology Program to develop Herbalife One, a new enhanced platform to provide enhanced digital capabilities and experiences to our Members.
Our information technology infrastructure, as well as that of our Members and the other third parties with which we interact, may be damaged, disrupted, or breached or otherwise fail for a number of reasons, including power outages, computer and telecommunication failures, internal design, manual or usage errors, workplace violence or wrongdoing, or catastrophic events such as natural disasters, severe weather conditions, or acts of war or terrorism. In addition, numerous and evolving cybersecurity threats, including advanced and persistent cyberattacks, such as unauthorized attempts to access, disable, improperly modify, exfiltrate, or degrade our information technology infrastructure, or the introduction of computer viruses, malware, "phishing" emails, and other destructive software, and social engineering schemes, could compromise the confidentiality, availability, and integrity of our information technology infrastructure as well as those of the third parties with which we interact. These attacks may come from external sources, such as governments or hackers, or may originate internally from an employee or a third party with which we interact. We have been the target of, and may be the target of in the future, malicious cyberattacks, although to date none of these attacks have had a meaningful adverse impact on our business, financial condition, or operating results. The potential risk of cyberattacks may increase as we introduce new technology systems and services. Additionally, many of our employees work remotely, which may increase our exposure to significant systems interruptions, cybersecurity attacks, and otherwise compromise the integrity and reliability of our information technology infrastructure and our internal controls.
Any disruptions to, or failures or inadequacies of, our information technology infrastructure that we may encounter in the future may result in substantial interruptions to our operations, expose us to significant liability, and may damage our reputation and our relationships with, or cause us to lose, our Members, especially if the disruptions, failures, or inadequacies impair our ability to track sales and pay royalty overrides, bonuses, and other incentives, any of which would harm our business, financial condition, and operating results. Any such disruptions, failures, or inadequacies could also create compliance risks under the Consent Order and result in penalties, fines, or sanctions under any applicable laws, regulations or impact our internal control over financial reporting. Furthermore, it may be expensive or difficult to correct or replace any aspect of our information technology infrastructure in a timely manner, if at all, and we may have little or no control over whether any malfunctioning information technology services supplied to us by third parties are appropriately corrected, if at all. We have encountered, and may encounter in the future, errors in our software and our enterprise network, and inadequacies in the software and services supplied by certain of our vendors, although to date none of these errors or inadequacies have had a meaningful adverse impact on our business, financial condition or operating results.
In addition, developments in technology are continuing to evolve and affecting all aspects of our business, including how we effectively manage our operations, interact with our Members and their customers, and commercialize opportunities that accompany the evolving digital and data driven economy. Therefore, one of our top priorities is to modernize our technology and data infrastructure by, among other things, creating more relevant and more personalized experiences wherever our systems interact with Members and their customers; and developing ways to create more powerful digital tools and capabilities for Members to enable them to grow their businesses. These initiatives to modernize our technology and data infrastructure are expected to be implemented over the course of many years and to require significant investments. If these initiatives are not successful, our ability to attract and retain Members and their customers, increase sales, and reduce costs may be negatively affected. Further, these initiatives may be subject to cost overruns and delays, may not operate as designed and may cause disruptions in our operations. These cost overruns and delays and disruptions could adversely impact our business, financial condition, and operating results.