by, or in our decreased ability to export or sell subscriptions to our platform to, existing or potential learners internationally. Any decreased use of our platform or limitation on our ability to export or sell our platform would adversely affect our business, results of operations, and financial results.
We are also subject to various domestic and international anti-corruption laws, such as the U.S. Foreign Corrupt Practices Act and the U.K. Bribery Act, as well as other similar anti-bribery and anti-kickback laws and regulations. These laws and regulations generally prohibit companies and their employees and intermediaries from authorizing, offering, providing, and accepting improper payments or benefits for improper purposes. These laws also require that we keep accurate books and records and maintain compliance procedures designed to prevent any such actions. Although we take precautions to prevent violations of these laws, our exposure for violating these laws increases as our international presence expands and as we increase sales and operations in foreign jurisdictions.
We may become involved in claims, lawsuits, government investigations, and other proceedings that could adversely affect our business, financial condition, and results of operations.
From time to time, we may become involved in litigation matters, such as matters incidental to the ordinary course of our business, including intellectual property, commercial, employment, class action, whistleblower, accessibility, and other litigation and claims, and governmental and other regulatory investigations and proceedings. Such matters can be time-consuming, divert management’s attention and resources, cause us to incur significant expenses or liability, or require us to change our business practices. In addition, the expense of litigation and the timing of these expenses from period to period are difficult to estimate, subject to change, and could adversely affect our financial condition and results of operations. Because of the potential risks, expenses, and uncertainties of litigation, we may, from time to time, settle disputes, even where we have meritorious claims or defenses, by agreeing to settlement agreements. Any of the foregoing could adversely affect our business, financial condition, and results of operations.
Risks Related to Privacy, Cybersecurity, and Infrastructure
If sensitive information about our partners, their employees, or our learners is disclosed, or if we or our third-party providers are subject to cyber-attacks, use of our platform could be curtailed, we may be exposed to liability and our reputation would suffer.
Although we do not directly collect, transmit, and store financial information such as credit cards and other payment information, we utilize third-party payment processors who provide these services on our behalf. We also collect and store certain personally identifiable information provided by our partners and learners, such as names and email addresses. The collection, transmission and storage of such information is subject to stringent legal and regulatory obligations. Some of our third-party service providers, such as identity verification and payment processing providers, also regularly have access to personal data. In an effort to protect sensitive information, we rely on a variety of security measures, including encryption and authentication technology licensed from third parties. However, advances in computer capabilities, increasingly sophisticated tools and methods used by hackers and cyber terrorists, new discoveries in the field of cryptography, or other developments may result in our failure or inability to adequately protect sensitive information.
Our platform is vulnerable to power outages, telecommunications failures, and catastrophic events, as well as computer viruses, worms, malicious code, break-ins, phishing attacks, denial-of-service attacks, and other cyber-attacks. Any of these incidents could lead to interruptions or shutdowns of our platform, loss of data, or unauthorized disclosure of personally identifiable or other sensitive information. Cyber-attacks could also result in the theft of our intellectual property. If we gain greater visibility, we may face a higher risk of being targeted by cyber-attacks. Advances in computer capabilities, new technological discoveries, or other developments may result in cyber-attacks becoming more sophisticated and more difficult to detect.
42