In the ordinary course of our business, we and our customers, consultants, contractors and business associates collect and store petabytes of sensitive data, including legally protected health information, personally identifiable information, intellectual property and proprietary business information owned or controlled by ourselves or our customers, payers, providers and partners. We manage and maintain our applications and data by utilizing a combination of on-site systems, managed data center systems, and cloud-based data center systems. These applications and data encompass a wide variety of business-critical information, including research and development information, commercial information and business and financial information. We face risks relative to protecting this critical information, including loss of access risk, inappropriate disclosure risk, inappropriate modification risk and the risk of being unable to adequately monitor our controls.
The secure processing, storage, maintenance and transmission of this critical information is vital to our operations and business strategy, and we devote significant resources to protecting such information. Although we take measures to protect sensitive information from unauthorized access or disclosure, our information technology and infrastructure, and that of our third-party billing and collections provider and other third parties that maintain or otherwise process such information for us, are vulnerable to attacks by hackers or viruses, breaches, security incidents, employee error, malfeasance or other events. For example, in August 2022, we became aware of unauthorized activity in a customer's account, which involved payments issued to a fraudulent account, unauthorized access to certain protected health information, and caused us to incur costs to respond to the incident. Any such breach or incident could result in a disruption or interruption to, or compromise, our networks and systems or those of our third-party service providers or partners, and the information stored or otherwise processed there could be publicly disclosed, accessed, rendered unavailable, used, modified, disclosed or otherwise processed without authorization, lost or stolen. Any such event, or the perception that any such event has occurred, could result in legal claims or proceedings (including regulatory investigations and enforcement actions), liability under laws that protect the privacy of personal information, such as the Health Insurance Portability and Accountability Act ("HIPAA"), regulatory penalties and other liabilities. Although we have implemented security measures and a formal, dedicated enterprise security program in an effort to prevent unauthorized access to patient data, there is no guarantee we can continue to protect our online portal or will be able to protect our mobile applications from breach. Unauthorized access to, or unavailability, loss or dissemination of data, or unauthorized access to, interruptions or other disruptions to systems, whether maintained by us or by third parties performing services for us, could also disrupt our operations, including our ability to conduct our analyses, bill payers, providers or patients, process claims and appeals, provide customer assistance services, conduct research and development activities, collect, process and prepare company financial information, provide information about our products and other patient and physician education and outreach efforts through our website, manage the administrative aspects of our business and damage our reputation, any of which could adversely affect our business.
Additionally, ransomware attacks, including these from organized criminal threat actors, nation-states and nation-state supported actors, are becoming increasingly prevalent and severe and can lead to significant interruptions, delays, or outages in our operations, disruptions in our services, loss or unavailability of data, loss of income, significant extra expense to restore data or systems, reputational loss and the diversion of funds. Furthermore, there may be heightened risk of potential attacks by state actors or others since the escalation of the situation in Ukraine. To alleviate the financial, operational and reputational impact of a ransomware attack, it may be preferable to make extortion payments, but we may be unwilling or unable to do so (including, for example, if applicable laws or regulations prohibit such payments).
The U.S. Office of Civil Rights may impose penalties on us if we do not fully comply with requirements of HIPAA. Penalties will vary significantly depending on factors such as whether we knew or should have known of the failure to comply, or whether our failure to comply was due to willful neglect. These penalties include civil monetary penalties of $100 to $50,000 per violation, up to an annual cap of $1,500,000 for identical violations. A person who knowingly obtains or discloses individually identifiable health information in violation of HIPAA may face a criminal penalty of up to $50,000 per violation and up to one-year imprisonment. The criminal penalties increase to $100,000 per violation and up to five years imprisonment if the wrongful conduct involves false pretenses, and to $250,000 per violation and up to 10 years imprisonment if the wrongful conduct involves the intent to sell, transfer, or use identifiable health information for commercial advantage, personal gain, or malicious harm. The U.S. Department of Justice is responsible for criminal prosecutions under HIPAA. Furthermore, in the event of a breach as defined by HIPAA, we have specific reporting requirements to the Office of Civil Rights under the HIPAA regulations as well as to affected individuals, and we may also have additional reporting requirements to other state and federal regulators, including the Federal Trade Commission, and/or to the media. Issuing such notifications can be costly, time and resource intensive, and can generate significant negative publicity. Breaches of HIPAA may also constitute contractual violations, and such contractual violations or any other contractual violations relating to a security breach or incident, could lead to claims, damages, legal proceedings, and contractual damages, other liability or terminations.
In addition, the interpretation and application of consumer, healthcare privacy, data protection and cybersecurity laws in the United States, Europe and elsewhere are often uncertain, contradictory and in flux. It is possible that these laws may be interpreted and applied in a manner that is inconsistent with our practices. If so, this could result in claims, proceedings, damages, and liabilities, including government-imposed fines, and orders requiring that we change our practices, which could adversely affect our business. In addition, these laws and regulations vary between states, countries and other jurisdictions, and may vary based on whether services or operations are performed in the jurisdiction. Complying with these various laws and regulations could cause us to incur substantial costs or require us to change our business practices and compliance procedures in a manner adverse to our business.