The secure maintenance and transmission of personally identifiable information of our users is a critical element of our operations. Our information technology and other systems that maintain and transmit user information, or those of our customers, service providers, business partners, or employees may be compromised by a malicious third-party penetration of our network security, or that of a third-party service provider or business partner or impacted by intentional or unintentional actions or inactions by our employees, or those of a third-party service provider or business partner. As a result, our users' information may be lost, disclosed, accessed, or taken without our users' consent. We have experienced attempts to breach our systems and other similar incidents in the past and anticipate that it may occur in the future. For example, we expect that we will be subject to attempts to gain unauthorized access to or through our information systems, whether by our employees or third parties, including cyber-attacks by computer programmers and hackers who may develop and deploy viruses, worms or other malicious software programs. To date, attempts to breach our systems have not had a material impact on our business, operations, or financial results, but we cannot provide assurance that they will not have a material impact in the future.
We rely on encryption and authentication technology licensed from third parties in an effort to securely transmit confidential and sensitive information, including payment card information. Advances in computer capabilities, new technological discoveries, or other developments may result in the whole or partial failure of this technology to protect transaction data or other confidential and sensitive information from being breached or compromised. In addition, apps and websites are often attacked through compromised credentials, including those obtained through phishing and credential stuffing. Our security measures, and those of our third-party service providers, may not detect or prevent all attempts to breach our systems, denial-of-service attacks, viruses, malicious software, break-ins, phishing attacks, social engineering, security breaches, or other attacks and similar disruptions that may jeopardize the security of information stored in or transmitted by our apps, websites, networks, and systems or that we or such third parties otherwise maintain, including payment card systems, which may subject us to fines or higher transaction fees or limit or terminate our access to certain payment methods. We and such third parties may not anticipate or prevent all types of attacks until after they have already been launched. Further, techniques used to obtain unauthorized access to or sabotage systems change frequently and may not be known until launched against us or our third-party service providers.
In addition, distributed ledger technology is an emerging technology that offers new capabilities that are not fully proven in use. As with other novel software products, the computer code underpinning the distributed ledger technology used in our Platform may contain errors, or function in unexpected ways and may cause the software to break or function incorrectly.
Furthermore, security breaches can also occur as a result of non-technical issues, including intentional or inadvertent breaches by our employees or by third parties. These risks may increase over time as the complexity and number of technical systems and applications we use also increases. Breaches of our security measures or those of our third-party service providers or cybersecurity incidents could result in unauthorized access to our sites, networks, and systems; unauthorized access to and misappropriation of user information, including users' personally identifiable information, or other confidential or proprietary information of ourselves or third parties; viruses, worms, spyware, or other malware being served from our sites, networks, or systems; deletion or modification of content or the display of unauthorized content on our sites; interruption, disruption, or malfunction of operations; costs relating to breach remediation, deployment of additional personnel and protection technologies, response to governmental investigations, and media inquiries and coverage; engagement of third-party experts and consultants; or litigation, regulatory action, and other potential liabilities. In the past, we have experienced social engineering, phishing, malware, and similar attacks and threats of denial-of-service attacks, none of which to date has been material to our business; however, such attacks could in the future have a material adverse effect on our operations, business, and financial condition. If any of these breaches of security should occur and be material, our reputation and brand could be damaged, our business may suffer, we could be required to expend significant capital and other resources to alleviate problems caused by such breaches, and we could be exposed to a risk of loss, litigation, or regulatory action and possible liability. We cannot guarantee that recovery protocols and backup systems will be sufficient to prevent data loss. Actual or anticipated attacks may cause us to incur increasing costs, including costs to deploy additional personnel and protection technologies, train employees, and engage third-party experts and consultants.
In addition, any party who is able to illicitly obtain access to a user's account could access the user's transaction data or personal information, resulting in the perception that our systems are insecure. Any compromise or breach of our security measures, or those of our third-party service providers, could violate applicable privacy, data protection, data security, network, and information systems security and other laws and cause significant legal and financial exposure, adverse publicity, negative impact to our brand and reputation, and a loss of confidence in our security measures, which could have a material adverse effect on our business, financial condition, and results of operations and could cause the value of our securities to decline or become worthless. We plan to continue to devote significant resources to protect against security breaches or we may need to in the future to address problems caused by breaches, including notifying affected users in accordance with regulatory requirements and responding to any resulting litigation, which in turn, diverts resources from the growth and expansion of our business.