In addition, from time to time, we make modifications and upgrades to the information technology systems for point-of-sale, e-commerce, merchandising, planning, sourcing, logistics, inventory management and support systems including human resources and finance. Modifications involve replacing legacy systems with successor systems, making changes to legacy systems or acquiring new systems with new functionality. We are aware of inherent risks associated with replacing these systems, including not accurately capturing data and system disruptions. Information technology system disruptions, if not anticipated and appropriately mitigated, could have a material adverse effect on our operations, financial condition and cash flows.
Our ability to maintain the security of customer, associate, third-party or company information could have an impact on our reputation and our results.
Information systems are susceptible to an increasing threat of continually evolving cybersecurity risks. Any significant compromise or breach of our data security could significantly damage our reputation with our customers, associates, investors and other third parties; cause the disclosure of confidential customer, associate, third-party or company information; cause our customers to stop shopping with us; and result in significant legal, regulatory and financial liabilities and lost revenues. While we train our associates and have implemented systems and processes to protect against unauthorized access to our information systems and prevent data loss, there is no guarantee that these procedures are adequate to safeguard against all data security breaches. In addition to our own networks and databases, we use third-party service providers to store, process and transmit certain of this information on our behalf. Although we contractually require these service providers to implement and use reasonable security measures, we cannot control third parties and cannot guarantee that a security breach will not occur in their systems. We have confidential security measures in place to protect our physical facilities and information technology systems from attacks. Despite these measures, we may be vulnerable to targeted or random security breaches, phishing attacks, denial of service attacks, acts of vandalism, computer viruses, misplaced or lost data, programming and/or human errors or similar events.
The regulatory environment related to information security, data collection and privacy is increasingly rigorous, with new and constantly changing requirements applicable to our business, and compliance with those requirements could result in additional costs, such as costs related to organizational changes, implementing additional protection technologies, training associates and engaging consultants. Additionally, we could incur lost revenues and face increased litigation as a result of any potential cybersecurity breach.
These risks could have a material adverse effect on our results of operations, financial condition and cash flows.
We may be impacted by our ability to comply with regulatory requirements.
We are subject to numerous regulatory requirements. Our policies, procedures and internal controls are designed to comply with all applicable foreign and domestic laws and regulations, including those required by the Sarbanes-Oxley Act of 2002, the U.S. Foreign Corrupt Practices Act, the U.K. Bribery Act, the SEC and the New York Stock Exchange (the “NYSE”), among others. Although we have put in place policies and procedures aimed at ensuring legal and regulatory compliance, our associates, subcontractors, vendors, licensees, franchisees and other third parties could take actions that violate these laws and regulations. Any violations of such laws or regulations could have an adverse effect on our reputation, market price of our common stock, results of operations, financial condition and cash flows.
It can be difficult to comply with sometimes conflicting regulations in local, national or foreign jurisdictions as well as new or changing regulations. Also, changes in such laws could make operating our business more expensive or require us to change the way we do business. For example, changes in product safety or other consumer protection laws could lead to increased costs for certain merchandise, or additional labor costs associated with readying merchandise for sale. It may be difficult for us to oversee regulatory changes impacting our business and our responses to changes in the law could be costly and may negatively impact our operations.
We may be adversely impacted by certain compliance or legal matters.
We, along with third parties we do business with, are subject to complex compliance and litigation risks. Actions filed against us from time to time include commercial, tort, intellectual property, customer, employment, wage and hour, data privacy, securities, anti-corruption and other claims, including purported class action lawsuits. The cost of defending against these types of claims against us or the ultimate resolution of such claims,