We use IT systems to support our business. Our IT systems and infrastructure, as well as those of third parties, are integral to our performance. The IT systems we use include support systems for financial reports, web-based tools, and an internal communication and data transfer network. We also use a variety of technological tools (online ordering system, electronic billing and online training tools) to assist us and enable us to communicate with our consultants. In the coming years, we plan to increase the use of IT tools to communicate with our consultants and representatives. We use third-party service providers in many instances to provide these IT systems. Over the last several years, we have undertaken initiatives to increase our reliance on IT systems, which has resulted in the outsourcing of certain services and functions, such as global human resources IT systems, call center support, sales representative support services and other IT processes. Any of our IT systems and infrastructure, or those of third-party service providers, is subject to failure or interruptions that are inherent in the complex scenario of localized applications and the system architecture. Incidents originating from legacy or non-integrated systems, or both, as well as fires, floods, power failure, telecommunication failure, terrorist attacks, break-ins, data corruption and similar events may also occur. Other risks and challenges could arise as we upgrade, modernize and standardize our IT systems. Our systems could also be vulnerable to computer viruses, data security failures, break-ins, data corruption and similar interruptions caused by unauthorized access to these systems. We rely on our employees, consultants, representatives, and third parties in our day-to-day and ongoing operations, which may, as a result of human error or malfeasance or failure, disruption, cyber incidents or other security breaches of third-party systems or infrastructure, expose us to risk. Furthermore, our ability to protect and monitor the practices of our third-party service providers is more limited than our ability to protect and monitor our own IT systems and infrastructure. The occurrence of these and other incidents could damage our IT systems and infrastructure, or those of third-party service providers, and adversely affect our business, financial condition and results of operations.
Our IT systems or those of our third-party service providers may be accessed by unauthorized users, such as cyber criminals, as a result of a failure, disruption, cyberattack or other security breach, exposing us to risk. As techniques used by cyber criminals change frequently, a failure, disruption, cyber incident or other security breach may go undetected for a period of time. A failure, disruption, cyber incident or other security breach of our IT systems or infrastructure, or those of our third-party service providers, could result in the theft, transfer, unauthorized access to, disclosure, modification, misuse, loss, or destruction of Company, employee, consultant and representatives, customer, vendor or other third-party data, including sensitive or confidential data, personal information and intellectual property. Moreover, as a result of the COVID-19 pandemic and consequent new ways of working, we have increased the number of employees working remotely and continue to allow remote and hybrid work even as the pandemic has receded. This will require us to continue relying on remote-access IT systems, which increases the risk of unavailability of our systems and infrastructure, disruption of telecommunications services, widespread system failures, and exposes us to increased vulnerability to cyberattacks. Any of these developments could adversely affect our ability to conduct our business, which may be adversely impacted.
We are investing in industry-standard solutions and protections and monitoring practices of our data and IT systems and infrastructure to reduce these risks and continue to monitor our IT systems and infrastructure on an ongoing basis for any current or potential threats. Such efforts and investments are costly, and as cyber threats continue to evolve, we may be required to expend significant additional resources to continue to modify or enhance our protective measures or to investigate and remediate any information security vulnerabilities. As a company that operates globally, we could be impacted by commercial agreements between us and processing organizations, existing and proposed laws and regulations, and government policies and practices related to cybersecurity, privacy and data protection.
Our and our third-party service providers' data, IT systems and infrastructure may be vulnerable. There can be no assurance that our efforts will prevent a failure, disruption, cyber incident or other security breach of our or our third-party service providers' IT systems or infrastructure, or that we will detect and appropriately respond if there is such a failure, disruption, cyber incident or other security breach. Any such failure, disruption, cyber incident or other security breach could adversely affect our business, including our ability to expand our business, cause damage to our reputation, result in increased costs to address internal data, security, and personnel issues, and result in violations of applicable privacy laws and other laws and external financial obligations such as governmental fines, penalties, or regulatory proceedings, remediation efforts, such as breach notification and identity theft monitoring, and third-party private litigation with potentially significant costs. In addition, it could result in deterioration in our employees', consultants and representatives', customers' or vendors' confidence in us, which could cause them to discontinue business with us or result in other competitive disadvantages.