We collect, receive, store, generate, use, transfer, disclose, make accessible, protect, secure, dispose of, share, and otherwise process personal information, confidential information and other information, including proprietary and sensitive information, in order to provide our service, to operate our business, for legal and marketing purposes, and for other business-related purposes. This data may include personal, confidential, or proprietary information. We rely significantly on third-party service providers and sub-processors to support our operations and to help us deliver services to our customers. These third parties may store or otherwise process personal information and other information on our behalf.
Security breaches or incidents or unauthorized access to our systems, platform, or products, or the systems of our third-party service providers, could lead to interruptions and other disruptions to our platform and other aspects of our operations, damage or unauthorized access to, or the loss, destruction, unavailability, or unauthorized alteration, disclosure, or other processing of, our or our customers' data, and claims, demands, disputes, and litigation made or initiated by governmental authorities and private parties, investigations and other proceedings initiated by governmental authorities indemnity obligations, fines, penalties, and other liabilities. We have previously and may in the future become the target of cyber-attacks by third parties, including by third parties that may seek unauthorized access to our or our customers' data or to disrupt our ability to provide our services. In addition, many of our employees work remotely, which may pose additional data security risks (including, for example, an increase in phishing and spam emails experienced in recent years).
While we have taken steps to protect the confidential and personal information that we have access to, our security measures or those of our third-party service providers that store or otherwise process certain data on our behalf, including certain of our and our customers' data, could be breached or otherwise compromised or we or such service providers could suffer damage or unauthorized access to, or loss, destruction, unavailability, or unauthorized alteration, disclosure, or other processing of, our data or third-party data we or our service providers maintain or otherwise process, including customer data. Our ability to monitor our third-party service providers' data security is limited. Cyber-attacks, computer malware, viruses and other malicious code, employee and contractor mistakes, errors, or malfeasance, social engineering (including spear phishing attacks and certain attacks seeking to deploy ransomware on systems), supply chain attacks, and general hacking have become more prevalent in our industry, particularly against cloud services. If our security measures are or are believed to have been breached or otherwise compromised, or if we or any of our third-party service providers suffers or are believed to have suffered a security breach or incident, or if any data we or such service providers maintain or otherwise process is, or is believed to have been, damaged, accessed without authorization, or subject to loss, destruction, unavailability, or unauthorized alteration, disclosure, or other processing, whether as a result of third-party action, employee or contractor error, malfeasance, or otherwise, our reputation could be damaged, our business may suffer, and we could incur significant liability.
We use third-party technology, systems, and services in a variety of contexts, including, without limitation, storage of our imagery, encryption and authentication technology, employee email, content delivery to customers, back-office support, credit card processing, and other functions. Although we have developed systems and processes that are designed to protect customer data and prevent data loss and other security breaches and incidents, including systems and processes designed to reduce the impact of a security breach at a third-party service provider, such measures cannot provide absolute security and may not otherwise be effective. There can be no assurance that any security measures that we or our third-party service providers have implemented will be effective against current or future security threats.
Because many different security vulnerabilities exist and exploits of such vulnerabilities continue to evolve, we may be unable to anticipate cyberattacks and other means of attempting or effectuating security breaches or incidents, identify or detect any breach or incident, react in a timely manner, or implement adequate preventative measures. Among other things, our applications, systems, networks, software, or physical facilities could be breached or otherwise compromised, or the personal or confidential information that we store or otherwise process could be subject to unauthorized acquisition or other processing or otherwise compromised, due to employee error or malfeasance, if, for example, third parties fraudulently induce our employees or our members to disclose information or user names and/or passwords, or otherwise compromise the security of our networks, systems and/or physical facilities. Additionally, employees or service providers have in the past and may in the future inadvertently misconfigure resources or systems, or misdirect certain communications, in manners that lead to security incidents.
Third parties may also conduct attacks designed to deny customers access to our services or otherwise disrupt our platform or other aspects of our products, services, and operations. Third parties, including nation-state actors or their agents, may also conduct attacks designed to gain control over our systems, data and satellites. These and other cybersecurity risks we face may be heightened by conflicts, including the wars between Russia and Ukraine, and Israel and Hamas, respectively, and other geopolitical events. Further, these risks are heightened by the geopolitical relevance of our data, which may expose globally the sensitive operations of individuals, companies, rogue groups, terrorist organizations, governments, or affiliated actors. This is especially true with respect to countries known or suspected to have actively carried out offensive operations on their own.
Also, the use of artificial intelligence technologies may result in security incidents and our use of artificial intelligence technologies may create additional cybersecurity risks or increase cybersecurity risks, including risks of security breaches and incidents. Further, artificial intelligence technologies may be used in connection with certain cybersecurity attacks and may increase the intensity or effectiveness of such attacks or otherwise create heightened cybersecurity risks.
The costs to respond to and otherwise address a security breach or incident and/or mitigate any security vulnerabilities that may be identified could be significant, our efforts to address these matters may not be successful, and these matters could result in interruptions, delays, disruptions, cessation of service, negative publicity, harm to our reputation, and other harm to our business and our competitive position. For example, the SEC has adopted rules for mandatory disclosures of cybersecurity incidents suffered by public companies and cybersecurity governance and risk management. We could be required to fundamentally change our business activities and practices in response to a security breach or incident or related regulatory actions or claims, demands, or litigation (or in anticipation of a potential claim of breach or violation of laws, regulations, or other actual or asserted obligations, or of regulatory action or litigation), any of which could have an adverse effect on our business. Further, any security breach or other security incident, or the perception that one has occurred, could result in a loss of customer confidence in the security of our platform, the reliability of our imagery, and damage to our brand, reduce demand for our products and services, disrupt our platform and other aspects of our business operations, cause us to fail to meet our service level commitments, require us to spend material resources in efforts to investigate or correct the breach or incident and to prevent future security breaches and incidents, expose us to legal proceedings and liabilities, including litigation, regulatory enforcement, and indemnity obligations, result in our customers terminating contracts with us, and adversely affect our business, financial condition, and results of operations.
We cannot be certain that our insurance coverage will be adequate for fines, judgments, settlements, penalties, costs, attorney fees, or other impacts that arise out of privacy or security breaches or incidents. A privacy or security breach or incident, or the successful assertion of one or more large claims against us that exceeds our available insurance coverage, or results in changes to our insurance policies (including premium increases or the imposition of large deductible or co-insurance requirements), could have an adverse effect on our business. In addition, we cannot be sure that our existing insurance coverage will continue to be available on acceptable terms or that our insurers will not deny coverage as to any future claim. The successful assertion of one or more large claims against us that exceed available insurance coverage, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or co-insurance requirements, could adversely affect our reputation, business, financial condition and results of operations. Our risks are likely to increase as we continue to expand, grow our customer base, and use, store, transmit, and otherwise process increasingly large amounts of proprietary and sensitive data.