We rely extensively on our computer systems to manage clinical and financial data, communicate with our patients, payors, vendors and other third parties and summarize and analyze operating results. We have made investments in technology to protect our systems, equipment and medical devices and information from cybersecurity risks including continued development and enhancement of our controls, processes and practices designed to protect our systems, computers, software, data and networks from attack, damage or unauthorized access. Also in connection with any cyber-attack, we likely would be subject to one or more purported class action lawsuits, as well as government investigations by various State Attorneys General and the U.S. HHS Office for Civil Rights, and could be subject to additional litigation, potential governmental inquiries and potential reputation damages.
In spite of our security measures, there can be no assurance that we will not be subject to cyber-attacks or security breaches in the future. Additionally, where we agree to provide transition services to the buyer in connection with the sale of assets, including access to our legacy information systems, for a defined transition period, we are exposed to cyber-attacks or security breaches that originate outside of our processes and practices designed to prevent such threats from occurring. Any such cyber-attacks or security breaches could impact the integrity, availability or privacy of protected health information or other data subject to privacy laws or disrupt our information technology systems, devices or business, including our ability to provide various healthcare services. Additionally, growing cyber-security threats related to the use of ransomware and other malicious software threaten the access and utilization of critical information technology and data. As a result, cybersecurity and the continued development and enhancement of our controls, process and practices designed to protect our information systems from attack, damage or unauthorized access likely will be required. Our ability to recover from a ransomware or other cyber-attack is dependent on these practices, including successful backup systems and other recovery procedures. As cyber-threats continue to evolve, we may be required to expend significant additional resources to continue to modify or enhance our protective measures or to investigate and remediate any information security vulnerabilities. If we are subject to cyber-attacks or security breaches in the future, this could result in harm to patients; business interruptions and delays; the loss, misappropriation, corruption or unauthorized access of data; litigation and potential liability under privacy, security, breach notification and consumer protection laws or other applicable laws; reputational damage and Federal and state governmental inquiries, any of which could have an adverse effect on our business, financial condition or results of operations.