In the ordinary course of our business, we collect, store, use, disclose and otherwise process sensitive data, including PHI, and other types of personal data or PII relating to our employees, customers, their members and patients, individuals and others. We also process and store, and use third-party service providers to process and store, sensitive information, including intellectual property, confidential information and other proprietary business information. We protect, manage and maintain such sensitive data and information utilizing a combination of security technologies, on-site systems, threat intelligence, managed data center systems and cloud-based computing and processing.
We have implemented multiple layers of security measures to protect confidential data that we collect and store through technology, processes, and our people, and our defenses are monitored and routinely tested internally and by external parties. We are highly dependent on information technology networks and systems, including the internet, to securely process, transmit and store this sensitive data and information. As a result, the continued development and enhancement of controls, processes, and practices designed to protect our information systems from attack, damage, or unauthorized access remain a priority for us. Despite these efforts, we cannot guarantee that our controls for processing, transmission and storage are sufficient. Security breaches of, or interruptions to, this infrastructure, including physical or electronic break-ins, computer viruses, attacks by hackers and similar breaches, or employee or contractor error, negligence or malfeasance, have in the past, and may in the future, create system disruptions or shutdowns, result in unauthorized access to, or disclosure, misuse, modification, or loss or destruction of, our or our customers' (or their members' and patients') or employees' data, or result in damage, disablement, or encryption of our data or our customers' (or their members and patients') or employees' data. Such data may include sensitive data or information, including PHI and other PII. In some cases, these risks may be heightened when employees are working remotely. Data incidents could result in interruptions, delays, loss, access, misappropriation, and disclosure or corruption of data which could damage our reputation and could otherwise adversely impact our business. We maintain back-up facilities and certain other redundancies for each of our major data centers to reduce the risk that any such event will interrupt our business operations. However, like many other organizations, we have experienced data incidents from time to time in the course of our business and handled these incidents in accordance with our internal policies and understanding of the applicable laws. There can be no assurance that we will not be subject to data incidents that bypass our security measures, result in loss of confidential information, or dispute our information systems or business.
We utilize third-party service providers for important aspects of the collection, storage, processing and transmission of employee and customer (and their members' and patients') information, and other confidential and sensitive information, and therefore rely on such third-party service providers to manage functions that have material cybersecurity risks. In some cases, these risks may be heightened when information is transferred, processed, collected or stored offshore. Because of the sensitivity of the information we and our service providers collect, store, use, transmit, and otherwise process, the security of our technology and other aspects of our services, including those provided or facilitated by our third-party service providers, are important to our operations and business strategy. We take certain administrative, physical and technological safeguards to address these risks, such as by requiring contractors and other third-party service providers who handle this sensitive information on our behalf to enter into agreements that contractually obligate them to use reasonable efforts to safeguard such sensitive information, and to comply with applicable laws regarding their collection, storage, processing, and transmission of such sensitive information. Measures taken to protect our systems, those of our contractors or third-party service providers, or the sensitive information we or our contractors or third-party service providers process or maintain, may not adequately protect us from the risks associated with the collection, storage, use, transmission and processing of such sensitive data and information. We have and may in the future be required to expend significant capital and other resources to protect against security breaches or to alleviate problems caused by security breaches, regardless of whether such breaches are of our systems or networks, or the systems or networks of our third-party service providers. Despite our implementation of data privacy and security measures in an effort to comply with applicable laws and regulations relating to privacy, data protection and information security, cyberattacks are becoming harder to detect and more sophisticated and frequent. As a result, we or our third-party service providers have and may in the future be unable to anticipate the techniques used to attack our or their systems or networks, or to implement adequate protective measures. These risks may be heightened in connection with employees working from remote work environments, as our dependency on certain service providers, such as video conferencing and web conferencing services, has significantly increased. In additional, to access our network, products and services, customers and other third parties may use personal mobile devices or computing devices that are outside of our network environment and subject to their own security risk. A breach or attack affecting any of these third parties could harm our business. We cannot assure that we can prevent all security breaches.
Information security risks for companies such as ours, and for our third-party service providers, have increased in recent years and can result in significant losses, in part because of the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of organized crime, hackers, terrorists, activists, malicious state actors, and other internal and external parties.
Security breaches, privacy violations, interruptions of systems or other security incidents that we or our third party service providers experience, or the perception that such incidents have occurred, have and could in the future harm our reputation, compel us to comply with breach notification and other laws, expose us to legal liabilities, including litigation, regulatory enforcement, sanctions, resolution agreements and orders, disputes, investigations, indemnity obligations, damages for contract breach or penalties for violation of applicable laws or regulations, cause us to incur significant costs for investigations and remediation, fines, penalties, notification to individuals and for measures intended to repair or replace systems or technology and to prevent future occurrences, and to potential increases in insurance premiums. Such an event may also require us to verify the accuracy of database contents, resulting in increased costs or loss of revenue. If we are unable to prevent or mitigate security breaches, privacy violations, interruptions of systems or other security incidents in the future, or to implement satisfactory remedial measures, or if it is perceived that we have been unable to do so, our operations could be disrupted, we may be unable to provide access to our systems, and we could suffer a loss of customers, and we may as a result suffer loss of reputation and individual and investor confidence. In addition, our customers may be adversely impacted, we may suffer financial losses, and could be subject to governmental investigations or other actions, regulatory or contractual penalties, or other claims and liability, including under laws and regulations that protect the privacy of individual health information or other information, such as HIPAA. We cannot ensure that any limitation of liability or indemnity provisions in our contracts, including with third-party vendors and service providers, for a security lapse or breach or other security incident would be enforceable or adequate, or would otherwise protect us from any liabilities or damages with respect to any particular claim. These risks may increase as we continue to grow and collect, store, use, transmit and process increasingly large amounts of data. In addition, security breaches and other unauthorized access to, or acquisition or processing of, data can be difficult to detect, and any delay in identifying such incidents or in providing any notification of such incidents may lead to increased harm to our business and our customers and could subject us to governmental investigations or other actions, including penalties and resolution agreements.
Any such breach could also result in the compromise of our trade secrets and other proprietary information, which could adversely affect our business and competitive position. Our business relies on its digital technologies, computer and email systems, software, and networks to conduct its operations. Although we have information security procedures and controls in place, our and our third-party service providers' technologies, systems and networks, as well as our customers' devices, may become the target of cyberattacks or information security breaches. In addition, hardware, software or applications we develop internally or procure from third parties may contain defects in design or manufacture, or other problems that could unexpectedly compromise information security.
While we maintain insurance covering certain business interruptions, security and privacy damages and claim expenses, we may not carry insurance or maintain coverage sufficient to compensate for all liability, or all types of liability, or cover all indemnification claims against us relating to a security incident or breach, disruption in information technology services, and in any event, insurance coverage would not address the reputational damage that could result from a security incident. Moreover, we cannot be certain that insurance will continue to be available to us on commercially reasonable terms, or at all, or that any insurer will not deny coverage as to any future claim. The successful assertion of one or more large claims against us that exceed available insurance coverage, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or co-insurance requirements, could adversely affect our business, financial condition and results of operations.