We rely heavily on our information technology ("IT") and enterprise resource planning systems ("ERP"), many of which are proprietary, for many functions across our operations, including managing our supply chain and inventory, processing customer transactions in our stores, allocating orders to the appropriate laboratories, our financial accounting and reporting, compensating our employees, and operating our website, mobile applications and in-store systems, including point-of-sale systems. We continuously evaluate our systems landscape and we may have to upgrade our IT systems or implement new technology systems from time to time in order to support the needs of our business. Costs and potential problems and interruptions associated with such upgrades and implementations, or with maintenance or adequate support of existing IT systems, could disrupt or reduce the efficiency of our operations.
Our ability to effectively manage our business and coordinate the manufacturing, sourcing, distribution, and sale of our products depends significantly on the reliability and capacity of these systems. We are critically dependent on the availability, integrity, security, and consistent operations of these systems, which are highly reliant on the coordination of our internal business and engineering teams. We and certain of our third party providers also collect, process, and store sensitive, personal and confidential information, including our proprietary business information and that of our customers, employees, suppliers, and business partners. The secure processing, maintenance, and transmission of this information is critical to our operations.
Our and our third party providers' IT and ERP systems may be subject to damage or interruption from power outages or damages, telecommunications problems, data corruption, software errors, network failures, acts of war or terrorist attacks, fire, flood, global pandemics, and natural disasters; and our existing safety systems, data backup, access protection, user management, and information technology emergency planning may not be sufficient to prevent data loss or long-term network outages.
Our IT and ERP systems and the IT systems of our third-party service providers and business partners may be vulnerable to security incidents, attacks by hackers, acts of vandalism, computer viruses, misplaced or lost data, human or technological errors or other similar events. If unauthorized parties gain access to our networks, databases, or other IT systems, or those of our third-party service providers or business partners, they may be able to steal, publish, delete, use inappropriately, or modify our private and sensitive third-party information including health information, credit card and other payment card information, and personal information. In addition, employees may intentionally or inadvertently cause data or security incidents that result in unauthorized access to or release of sensitive, personal or confidential information. Because the techniques used to circumvent security systems can be highly sophisticated, change frequently, are often not recognized until launched against a target, and may originate from less regulated and remote areas around the world, we may be unable to proactively anticipate or address all possible techniques or implement adequate preventive measures for all situations.
Security incidents compromising the confidentiality, integrity, and availability of this information and the security of our IT systems could result from cyber-attacks, computer malware, viruses, social engineering (including spear phishing and ransomware attacks), credential stuffing, supply chain attacks, efforts by individuals or groups of hackers and sophisticated organizations, including state-sponsored organizations, errors or malfeasance of our personnel, malicious code embedded in open-source software, misconfigurations, "bugs", and other security vulnerabilities in the software or systems on which we rely. We anticipate that these threats will continue to grow in scope and complexity over time and such incidents have occurred in the past, and may occur in the future, resulting in unauthorized, unlawful, or inappropriate access to, inability to access, disclosure of, or loss of the sensitive, proprietary, personal and confidential information that we handle. For example, in 2018, we experienced a credential stuffing attack in which malicious third parties likely used credentials compromised in data breaches suffered by other, unaffiliated companies to access accounts on our platform. In 2019, we received notice from the Office for Civil Rights, or OCR, of the U.S. Department of Health and Human Services indicating that OCR would begin an investigation regarding the incident and our compliance with the Health Insurance Portability and Accountability Act ("HIPAA") Privacy, Security, and Breach Notification Rules and requesting certain information related to the incident and our compliance with such rules. The Company paid a civil monetary penalty to OCR in December 2024 and the investigation was formally closed in February 2025.
While we employ a number of security measures designed to prevent, detect, and mitigate the potential for harm to our business or to our users from security incidents, such as from malicious cyber attacks or theft or misuse of user credentials on our network, these measures may not be effective in every instance. Moreover, while we maintain cyber insurance that may help provide coverage for these types of incidents, we cannot assure you that our insurance will be adequate to cover costs and liabilities related to these incidents or that applicable insurance will be available to us in the future on economically reasonable terms or at all. Any such breach, attack, virus, or other event could result in additional costly investigations and litigation exceeding applicable insurance coverage or contractual rights available to us, civil or criminal penalties, operational changes or other response measures, loss of consumer confidence in our security measures, and negative publicity that could adversely affect our business, financial condition, and results of operations.
We also rely on a number of third-party service providers to operate our critical business systems, provide us with software, and process confidential, sensitive and personal information, such as the payment processors that process customer credit card payments, which expose us to security risks outside of our direct control and our ability to monitor these third-party service providers' data security is limited. Certain of our vendors have experienced security incidents in the past, and we expect that other vendors or third-party service providers will experience security incidents in the future that could compromise the confidentiality, integrity, or availability of the systems they operate for us or the information they process on our behalf. Cybercrime and hacking techniques are constantly evolving, and we or our third-party service providers may be unable to anticipate attempted security breaches, react in a timely manner, or implement adequate preventative measures, particularly given the increasing use of hacking techniques designed to circumvent controls, avoid detection, and remove or obfuscate forensic artifacts. While we have taken measures designed to protect the security of the IT systems and confidential and personal information under our control, we cannot ensure that any security measures that we or our third-party service providers have implemented will be effective against current or future security threats. Moreover, we or our third-party service providers may be more vulnerable to such attacks in remote work environments, which have increased since the COVID-19 pandemic. Because we make extensive use of third-party suppliers and service providers, such as cloud services that support our internal and customer-facing operations, successful cyberattacks that disrupt or result in unauthorized access to third party IT systems can materially impact our operations and financial results. There can be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our systems and information.
A security breach may also cause us to breach our contractual obligations. Our agreements with certain customers, business partners, or other stakeholders may require us to use industry-standard or reasonable measures to safeguard confidential, sensitive and personal information. As a healthcare provider and to the extent we provide services to healthcare providers, we are also subject to laws and regulations such as the HIPAA Security Rule that require us to adhere to specific technical safeguards, or to use industry-standard or reasonable security measures to safeguard certain information. A security incident could lead to claims by our customers, business partners, or other relevant stakeholders that we have failed to comply with such legal or contractual obligations. In addition, our inability to comply with data privacy or security obligations in our contracts or our inability to flow down such obligations to our vendors, collaborators, other contractors, or consultants may cause us to breach our contracts. As a result, we could be subject to legal action or our customers or business partners could end their relationships with us. There can be no assurance that the limitations of liability in our contracts would be enforceable or adequate or would otherwise protect us from liabilities or damages.
In addition, any access, disclosure or other loss or unauthorized use of information or data, whether actual or perceived, could result in legal claims or proceedings, regulatory investigations or actions, negative reputational impacts that cause us to lose existing or future customers, significant incident response, system restoration or remediation and future compliance costs, and other types of liability under laws that protect the privacy and security of personal information, including federal, state and foreign data protection and privacy regulations, violations of which could result in significant penalties and fines in the EU, UK, Canada, and United States. In addition, although we seek to detect and investigate all data security incidents, security breaches, and other incidents of unauthorized access to our information technology systems and data can be difficult to detect and any delay in identifying such breaches or incidents may lead to increased harm and legal exposure of the type described above.
The cost of investigating, mitigating, and responding to potential security breaches and complying with applicable breach notification obligations to individuals, regulators, partners, and others can be significant. Further, defending a suit, regardless of its merit, could be costly, divert management attention, and harm our reputation. The successful assertion of one or more large claims against us that exceed available insurance coverage, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or co-insurance requirements, could adversely affect our reputation, business, financial condition, revenues, results of operations, or cash flows. Any material disruption or slowdown of our systems or those of our third-party service providers and business partners, could have a material adverse effect on our business, financial condition, and results of operations. Our risks are likely to increase as we continue to expand, grow our customer base, and process, store, and transmit increasing amounts of confidential, proprietary and sensitive information.