could undermine stakeholder support. Ultimately, the unpredictability regarding employee continuity and potential disruption stemming from employee losses pose a threat to our overall financial condition and operations.
Failure or significant disruption to our information technology systems/infrastructure or a cyber-security breach could adversely affect our operations.
Technology and computer systems are critical to many aspects of our pharmacy business, including, but not limited to, the drug supply chain, our dispensing of drugs, and our reimbursement. For instance, we rely extensively on computer systems used by Rite Aid, Elixir, Bartell Drugs, and Health Dialog, to manage our ordering, pricing, point-of-sale, inventory replenishment and other processes. Our computer systems are at risk for failures, security breaches, and natural disasters, and they have been subject to attack by perpetrators of random or targeted malicious technology-related events, such as cyberattacks, computer viruses, worms, bot attacks or other destructive or disruptive software and attempts to misappropriate customer information, including credit card information. These sorts of attacks could subject our systems to damage or interruption from power outages, computer and telecommunications failures, computer viruses, cyber security breaches, vandalism, coordinated cyber security attacks, severe weather conditions, catastrophic events and human error, and our disaster recovery planning cannot account for all eventualities. Although we deploy an information security program designed to protect confidential information against data security breaches through a multi-layered approach to address information security threats and vulnerabilities, including ones from a cyber-security standpoint, a compromise of our information security controls or of those businesses with whom we interact, which results in confidential information being accessed, obtained, damaged or used by unauthorized or improper persons, could harm our reputation and expose us to regulatory actions and claims from customers and clients, financial institutions, payment card associations and other persons, any of which could adversely affect our business, financial position and results of operations. Moreover, a data security breach could require that we expend significant resources related to our information systems and infrastructure, and could distract management and other key personnel from performing their primary operational duties. We could also be adversely impacted by any significant disruptions in, or security breaches of, the systems and technology of third party suppliers or processors we interact with, including key payors and vendors with whom we share information including PHI. If our systems are damaged, fail to function properly or otherwise become unavailable, we may incur substantial costs to repair or replace them, and may experience loss of critical data and interruptions or delays in our ability to perform critical functions, which could adversely affect our business and results of operations. Any compromise or breach of our data security, whether external or internal, or misuse of customer, associate, supplier or our data could also result in a violation of applicable privacy, information security, and other laws, significant legal and financial exposure, fines or lawsuits, damage to our reputation, loss or misuse of the information and a loss of confidence in our security measures, which could harm our business. Although we maintain cyber security insurance, we cannot assure you that the coverage limits under our insurance program will be adequate to protect us against future claims.
To effectively compete with our competitors and continue business partner relations, we must constantly invest in and update our technology and computer systems. In addition, as the regulatory environment related to information security, data collection and use, and privacy becomes increasingly rigorous, with new and constantly changing requirements applicable to our business, compliance with those requirements could also result in additional costs. We must ensure that our security operations are current and that our technology can properly interface with our business partners. These investments are costly, long-term, and unpredictable. There are risks that our technology investments will not be successful, will not provide a return on investment, and/or may fail or never be deployed. Oftentimes, we are implementing multiple updates or technology changes at the same time. We are currently in the process of changing our omni-channel distribution and there can be no assurance that we will be able to implement this technology on its intended timeline or that it will achieve its intended benefits.
We are subject to payment-related risks that could increase our operating costs, expose us to fraud or theft, subject us to potential liability and potentially disrupt our business.
We accept payments using a variety of methods, including cash, checks, credit and debit cards, gift cards and mobile payment technology, and we may accept new forms of payment over time. Acceptance of these payment options subjects us to rules, regulations, contractual obligations and compliance requirements including payment network rules and operating guidelines, data security standards and certification requirements, and rules governing electronic funds transfers. These requirements may change over time or be reinterpreted, making compliance more difficult or costly. For