We receive, retain, and transmit personal information about our Members and employees and entrust that information to third-party business associates, including cloud service-providers that perform activities for us. In addition, we and our third-party service providers store and maintain health-related personal information, pharmacy, and medical records in connection with our health and wellness and pharmacy businesses. We also utilize third-party service providers for a variety of reasons, including, without limitation, cloud services, back-office support, and other functions. In addition, our online operations depend upon the secure transmission of confidential information over public networks, including information permitting cashless payments. Each year, computer hackers, cyber terrorists, and others make numerous attempts to access the information stored in companies' information systems. The increased use of remote work infrastructure has also increased cybersecurity risk, as remote work continues even post COVID-19. Additionally, the rapid evolution of artificial intelligence and integration of machine learning technologies into our internal systems may intensify our cybersecurity risks and create new risks to our business, operations, and financial condition.
The use of data by our business and our business associates is regulated in all of our operating countries. Privacy and information-security laws and regulations change, and compliance with them may result in cost increases due to, among other things, systems changes and the development of new processes. If we or those with whom we share information fail to comply with these laws and regulations, we could be subjected to legal risk as a result of non-compliance.
We or our third-party service providers may be unable to anticipate one or more of the rapidly evolving and increasingly sophisticated means by which computer hackers, cyber terrorists and others may attempt to defeat our security measures or those of our third-party service providers and breach our or our third-party service providers' information systems. Cyber threats are rapidly evolving and are becoming increasingly sophisticated. As cyber threats evolve and become more difficult to detect and successfully defend against, one or more hackers, cyber terrorists or others might defeat our security measures or those of our third-party service providers and obtain the personal information of Members, employees and vendors that we hold or to which our third-party service providers have access, and we or our third-party service providers may not discover any security breach and loss of information for a significant period of time after the security breach occurs. We or one of our third-party service providers also may be subject to a ransomware or cyber-extortion attack, which could significantly disrupt our operations. In the enterprise context, ransomware attacks involve restricting access to computer systems or vital data until a ransom is paid. Error or malfeasance by our employees and consultants, faulty password management or other irregularities may result in a defeat of our or our third-party service providers' security measures and breach our or our third-party service providers' information systems (whether digital or otherwise).
Any breach of our security measures or those of our third-party service providers and loss of our confidential information, which could be undetected for a period of time, or any failure by us to comply with applicable privacy and information security laws and regulations, could cause us to incur significant costs to protect any Members and/or employees whose personal data was compromised and to restore Member and employee confidence in us and to make changes to our information systems and administrative processes to address security issues and compliance with applicable laws and regulations.
In addition, such events could have a material adverse effect on our reputation with our Members, employees, vendors and stockholders, as well as our results of operations, financial condition and liquidity; could result in the release to the public of confidential information about our operations and financial condition and performance; and could result in litigation against us or the imposition of penalties or liabilities. Moreover, a security breach could require us to devote significant management resources to address the problems created by the security breach and to expend significant additional resources to upgrade further the security measures that we employ to guard such important personal information against cyberattacks and other attempts to access such information, resulting in a disruption of our operations.
We regularly reassess these risks in response to the evolving cybersecurity landscape, and any significant changes are promptly communicated to executive management and our Board or Audit Committee. There are no assurances that our cybersecurity risk management program, policies, controls, or procedures will be fully implemented, complied with, or effectively protect our systems and information. We have not identified and are not aware of any risks from cybersecurity threats, including as a result of any prior cybersecurity incidents, which have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. Despite our security measures, however, there can be no assurance that we, or third parties with which we interact, will not experience a cybersecurity incident in the future that will materially affect us.