The efficient operation of our business is dependent on information systems and technology, including computer hardware and software systems, as well as data processing systems and the secure processing, storage and transmission of information, all of which are potentially vulnerable to security incidents and cyber-attacks. These attacks may be an intentional attack or an unintentional event, either of which, could involve gaining unauthorized access to our information systems or those of our borrowers for purposes of misappropriating assets, stealing confidential information, corrupting data or causing operational disruption. The risk of a security breach or disruption, particularly through cyber-attacks or cyber intrusions, including by computer hackers, nation-states or nation-state affiliated actors and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. Our Manager's employees have been and expect to continue to be the target of fraudulent calls, emails and other forms of potentially malicious or otherwise negatively impacting activities and attempts to gain unauthorized access to confidential, personal or other sensitive information, which are becoming more sophisticated and difficult to detect, particularly as threat actors use artificial intelligence technologies to deploy these attacks. Artificial intelligence tools may also be susceptible to new forms of cyber-attacks, such as prompt injection attacks, which may increase our cybersecurity risks where we implement artificial intelligence technologies in our business. Cybersecurity risks are also exacerbated by the rapidly increasing volume of highly sensitive data, including our proprietary business information and intellectual property, personal information of our Manager's employees, our borrowers and others, and other sensitive information that our Manager collects, processes and stores in its data centers and on its networks or those of its third-party service providers. Many jurisdictions have also enacted laws requiring companies to notify individuals of data security breaches involving certain types of personal information, with which we and our Manager must comply in the event of a security incident or cyber-attack.
The result of any security incident or cyber-attack may include disrupted operations, including our, our Manager's, our counterparties' or third-parties' operations, misstated or unreliable financial data, fraudulent transfers or requests for transfers of money, liability for stolen assets or improperly accessed information (including personal information), fines or penalties,investigations, increased cybersecurity protection and insurance costs, litigation, or damage to our business relationships and reputation, in each case, causing our business and results of operations to suffer or otherwise causing interruptions or malfunctions in our, our Manager's employees', its affiliates' employees', our counterparties' or third parties' operations. The costs related to cyber-attacks or other security incidents or disruptions may not be fully insured or indemnified by other means. As our and our borrowers' reliance on technology has increased, so have the risks posed to our information systems, both internal and those provided by Ares Management and third party service providers, and the information systems of our borrowers.
Ares Management is dependent on third-party vendors for hosting hardware, software and data processing systems that they do not control. While we rely on the cybersecurity strategy and policies implemented by Ares Management, which includes the performance of risk assessments on third-party providers, our reliance on them and their potential reliance on third-party providers removes certain cybersecurity functions from outside their immediate control, and cyber-attacks on us, our Manager, Ares Management or on third-party service providers could adversely affect us, our business and our reputation. We cannot guarantee that Ares Management's networks and its partners' networks have not been compromised or that they do not contain exploitable defects or bugs that could result in a breach of or disruption to Ares Management's information technology systems or the third-party information technology systems that support services. Ares Management's ability to monitor these third parties' information security practices is limited, and they may not have adequate information security measures in place.
Security incidents and cyber-attacks may originate from a wide variety of sources, and while Ares Management has implemented processes, procedures and internal controls designed to mitigate cybersecurity risks and cyber-attacks, these measures do not guarantee that a security incident or cyber-attack will not occur or that our financial results or operations will not be negatively impacted by such an incident, especially because the techniques of threat actors change frequently and are often not recognized until launched, and may be enhanced by artificial intelligence technologies. Ares Management relies on industry accepted security measures and technology to securely maintain confidential and proprietary information maintained on their information systems, as well as on policies and procedures to protect against the unauthorized or unlawful disclosure of confidential, personal or other sensitive information. Although Ares Management takes protective measures and endeavors to strengthen its computer systems, software, technology assets and networks to prevent and address potential security incidents and cyber-attacks, there can be no assurance that any of these measures prove effective. Ares Management expects to be required to devote increasing levels of funding and resources, which may in part be allocated to us, to comply with evolving cybersecurity and privacy laws and regulations and to continually monitor and enhance its cybersecurity procedures and controls.
Even the most well-protected information, networks, systems and facilities remain potentially vulnerable because the techniques used in such attempted security breaches evolve and generally are not recognized until launched against a target, and may be enhanced by artificial intelligence technologies, and in some cases are designed to not be detected and, in fact, may not be detected. Moreover, our systems, servers and platforms and those of our third party service providers may be vulnerable to computer viruses or physical or electronic break-ins and similar disruptions that our or their security measures may not detect, which could cause system interruptions, website slowdown or unavailability, delays in communication or loss of data. Accordingly, we and our service providers may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, and thus it is impossible for us and our service providers to entirely mitigate this risk. We may need to expend significant resources and make significant capital investment to protect against security breaches or to mitigate the impact of any such breaches. There can be no assurance that we or our third party service providers will be successful in preventing cyber-attacks or successfully mitigate their effects. Cybersecurity risks require continuous and increasing attention and other resources from us to, among other actions, identify and quantify these risks, upgrade and expand our technologies, systems and processes to adequately address such risks. Such attention diverts time and other resources from other activities and there is no assurance that our efforts will be effective.
In addition, cybersecurity is a priority for regulators around the world. State and federal laws and regulations related to cybersecurity compliance continue to evolve and change, which may require substantial investments in new technology, software and personnel, which could affect our profitability. The SEC requires public companies to disclose material cybersecurity incidents on Form 8-K and provide periodic disclosure regarding their cybersecurity risk management, strategy, and governance in annual reports.
With the SEC particularly focused on cybersecurity, we expect increased scrutiny of our, our Manager's and Ares Management's policies and systems designed to manage cybersecurity risks and related disclosures. We also expect to face increased costs to comply with SEC rules, including increased costs for cybersecurity training and management. Many jurisdictions in which we operate have laws and regulations relating to data privacy, cybersecurity and protection of personal information, including, the California Consumer Privacy Act and the New York SHIELD Act. The SEC has also indicated that one of its examination priorities for the Office of Compliance Inspections and Examinations is to continue to examine cybersecurity procedures and controls, including testing the implementation of these procedures and controls. If we fail to comply with the relevant laws and regulations, we could suffer financial loss, a disruption of our business, liability to investors, regulatory intervention or reputational damage.