The efficient operation of our business is dependent on information systems and technology, including computer hardware and software systems, as well as data processing systems and the secure processing, storage and transmission of information, all of which are potentially vulnerable to security incidents and cyber-attacks. These attacks may be an intentional attack or an unintentional event, either of which, could involve gaining unauthorized access to our information systems or those of our borrowers for purposes of misappropriating assets, stealing confidential information, corrupting data or causing operational disruption. The risk of a security breach or disruption, particularly through cyber-attacks or cyber intrusions, including by computer hackers, nation-states or nation-state affiliated actors and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. Our Manager's employees have been and expect to continue to be the target of fraudulent calls, emails and other forms of potentially malicious or otherwise negatively impacting activities and attempts to gain unauthorized access to confidential, personal or other sensitive information, which are becoming more difficult to detect. Cybersecurity risks are also exacerbated by the rapidly increasing volume of highly sensitive data, including our proprietary business information and intellectual property, personal information of our Manager's employees, our borrowers and others, and other sensitive information that our Manager collects, processes and stores in its data centers and on its networks or those of its third-party service providers. Many jurisdictions have also enacted laws requiring companies to notify individuals of data security breaches involving certain types of personal information, with which we and our Manager must comply in the event of a security incident or cyber-attack. The rapid evolution and increasing prevalence of artificial intelligence technologies may also increase our and our Manager's cybersecurity risks.
The result of any security incident or cyber-attack may include disrupted operations, including our, our Manager's, our counterparties' or third-parties' operations, misstated or unreliable financial data, fraudulent transfers or requests for transfers of money, liability for stolen assets or improperly accessed information (including personal information), fines or penalties, investigations, increased cybersecurity protection and insurance costs, litigation, or damage to our business relationships and reputation, in each case, causing our business and results of operations to suffer. The costs related to cyber-attacks or other security incidents or disruptions may not be fully insured or indemnified by other means. As our and our borrowers' reliance on technology has increased, so have the risks posed to our information systems, both internal and those provided by Ares Management and third party service providers, and the information systems of our borrowers. Ares Management has implemented processes, procedures and internal controls to help mitigate security incidents and cyber-attacks and endeavors to strengthen its computer systems, software, technology assets and networks to prevent and address potential security incidents and cyber-attacks, but these measures do not guarantee that a security incident or cyber-attack will not occur or that our financial results or operations will not be negatively impacted by such an incident.
In addition, Ares Management is dependent on third-party vendors for hosting hardware, software and data processing systems that they do not control. While we rely on the cybersecurity strategy and policies implemented by Ares Management, which includes the performance of risk assessments on third-party providers, our reliance on them and their potential reliance on third-party providers removes certain cybersecurity functions from outside their immediate control, and cyber-attacks on us, our Manager, Ares Management or on third-party service providers could adversely affect us, our business and our reputation. We cannot guarantee that Ares Management's networks and its partners' networks have not been compromised or that they do not contain exploitable defects or bugs that could result in a breach of or disruption to Ares Management's information technology systems or the third-party information technology systems that support services. Ares Management's ability to monitor these third parties' information security practices is limited, and they may not have adequate information security measures in place.
Even the most well-protected information, networks, systems and facilities remain potentially vulnerable because the techniques used in such attempted security breaches evolve and generally are not recognized until launched against a target, and may be enhanced by artificial intelligence technologies, and in some cases are designed to not be detected and, in fact, may not be detected. Moreover, our systems, servers and platforms and those of our third party service providers may be vulnerable to computer viruses or physical or electronic break-ins and similar disruptions that our or their security measures may not detect, which could cause system interruptions, website slowdown or unavailability, delays in communication or loss of data. Accordingly, we and our service providers may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, and thus it is impossible for us and our service providers to entirely mitigate this risk. We may need to expend significant resources and make significant capital investment to protect against security breaches or to mitigate the impact of any such breaches. There can be no assurance that we or our third party service providers will be successful in preventing cyber-attacks or successfully mitigate their effects. Cybersecurity risks require continuous and increasing attention and other resources from us to, among other actions, identify and quantify these risks, upgrade and expand our technologies, systems and processes to adequately address such risks. Such attention diverts time and other resources from other activities and there is no assurance that our efforts will be effective.
In addition, cybersecurity has become a top priority for regulators around the world. State and federal laws and regulations related to cybersecurity compliance continue to evolve and change, which may require substantial investments in new technology, software and personnel, which could affect our profitability. Recently, the SEC adopted rules requiring public companies to disclose material cybersecurity incidents on Form 8-K and periodic disclosure of a registrant's cybersecurity risk management, strategy, and governance in annual reports.
With the SEC particularly focused on cybersecurity, we expect increased scrutiny of our, our Manager's and Ares Management's policies and systems designed to manage cybersecurity risks and related disclosures. We also expect to face increased costs to comply with the new SEC rules, including increased costs for cybersecurity training and management. Many jurisdictions in which we operate have laws and regulations relating to data privacy, cybersecurity and protection of personal information, including, the California Consumer Privacy Act and the New York SHIELD Act. The SEC has also indicated that one of its examination priorities for the Office of Compliance Inspections and Examinations is to continue to examine cybersecurity procedures and controls, including testing the implementation of these procedures and controls. If we fail to comply with the relevant laws and regulations, we could suffer financial loss, a disruption of our business, liability to investors, regulatory intervention or reputational damage.