Numerous state and federal laws and regulations govern the collection, dissemination, use, privacy, confidentiality, security, availability and integrity of personally identifiable information (PII), including protected health information (PHI). HIPAA establishes a set of basic national privacy and security standards for the protection of PHI, by health plans, healthcare clearinghouses and certain healthcare providers, referred to as covered entities, and the businesses with which covered entities contract for services, which includes us. HIPAA requires companies like us to develop and maintain policies and procedures with respect to PHI, including the adoption of administrative, physical and technical safeguards to protect such information. HIPAA imposes mandatory penalties for certain violations which can be significant. HIPAA mandates that the Secretary of Health and Human Services, or HHS conduct periodic compliance audits of HIPAA covered entities or business associates. It also tasks HHS with establishing a methodology whereby individuals who were the victims of breaches of unsecured PHI may receive a percentage of the Civil Monetary Penalty fine paid by the violator. HIPAA further requires that patients and, in some instances, HHS be notified of any unauthorized acquisition, access, use or disclosure of their unsecured PHI that compromises the privacy or security of such information, with certain exceptions. Numerous other federal and state laws protect the confidentiality, privacy, availability, integrity and security of PHI. These laws in many cases are more restrictive than, and may not be preempted by, HIPAA, creating complex compliance issues for us and our clients potentially exposing us to additional expense, adverse publicity and liability. If we do not comply with existing or new laws and regulations related to PHI, we could be subject to criminal or civil sanctions. Because of the extreme sensitivity of the PHI we store and transmit, the security features of our technology platform are very important. If our security measures, some of which are managed by third parties, are breached or fail, unauthorized persons may obtain access to sensitive client and patient data, including HIPAA-regulated PHI. As a result, our reputation could be severely damaged, adversely affecting client and patient confidence. Clients may curtail their use of or stop using our services or our client base could decrease, which would cause our business to suffer. In addition, we could face litigation, damages for contract breach, penalties and regulatory actions for violation of HIPAA and other applicable laws or regulations and significant costs for remediation, notification to individuals and for measures to prevent future occurrences. Any security breach could also result in increased costs associated with liability for stolen assets or information, repairing system damage that caused by such breaches, incentives offered to clients or other business partners in an effort to maintain business relationships after a breach and implementing measures to prevent future occurrences, including organizational changes, deploying additional personnel and protection technologies, training employees and engaging third-party experts and consultants. While we maintain insurance covering certain security and privacy damages and claim expenses, we may not carry insurance or maintain coverage sufficient to compensate for all liability and in any event, insurance coverage would not address the reputational damage that could result from a security incident. We outsource important aspects of the storage and transmission of client and patient information, and thus rely on third parties to manage functions that have material cyber-security risks. We attempt to address these risks by requiring outsourcing subcontractors who handle client and patient information to sign business associate agreements contractually requiring those subcontractors to adequately safeguard personal health data to the same extent that applies to us and in some cases by requiring such outsourcing subcontractors to undergo third-party security examinations. However, we cannot assure you that these contractual measures and other safeguards will adequately protect us from the risks associated with the storage and transmission of client and patient proprietary and protected health information.