Our IT networks and related systems are essential to the operation of our business and our ability to perform day-to-day operations (including managing our building systems) and, in some cases, may be critical to the operations of certain of our tenants. We face risks associated with security breaches, whether through cyber attacks or cyber intrusions over the Internet, malware, ransomware, computer viruses, phishing, attachments to e-mails, persons who access our systems from inside or outside our organization, and other significant disruptions of our IT networks and related systems. The risk of a security breach or disruption, particularly through a cyber attack or cyber intrusion, including by computer hackers, foreign governments and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased, including through the use of artificial intelligence. Although we have not experienced cyber incidents that are individually, or in the aggregate, material, we have experienced cyber attacks in the past, which have thus far been mitigated by preventative, detective, and responsive measures that we have put in place. Although we make efforts to maintain the security and integrity of these types of IT networks and related systems, and we have implemented various measures to manage the risk of a security breach or disruption, there can be no assurance that our security efforts and measures will be effective or that attempted security breaches or disruptions would not be successful or damaging. Unauthorized parties, whether within or outside our company, may disrupt or gain access to our systems, or those of third parties with whom we do business, through human error, misfeasance, fraud, trickery, or other forms of deceit, including break-ins, use of stolen credentials, social engineering, phishing, computer viruses or other malicious codes, and similar means of unauthorized and destructive tampering. Even the most well protected information, networks, systems and facilities remain potentially vulnerable because the techniques used in such attempted security breaches evolve and generally are not recognized until launched against a target, and in some cases are designed to not be detected and, in fact, may not be detected. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, and thus it is impossible for us to entirely mitigate this risk.
A security breach or other significant disruption involving our IT networks and related systems could disrupt the proper functioning of our networks and systems and therefore our operations and/or those of certain of our tenants; result in the unauthorized access to, and destruction, loss, theft, misappropriation or release of, proprietary, confidential, sensitive or otherwise valuable information of ours or others, which others could use to compete against us or which could expose us to damage claims by third-parties for disruptive, destructive or otherwise harmful purposes and outcomes; result in our inability to maintain the building systems relied upon by our tenants for the efficient use of their leased space; require significant management attention and resources to remedy any damages that result; may require payments to the attackers; subject us to litigation claims for breach of contract, damages, credits, fines, penalties, governmental investigations and enforcement actions or termination of leases or other agreements; or damage our reputation among our tenants and investors generally. Any or all of the foregoing could have a material adverse effect on our results of operations, financial condition and cash flows.
A cyber attack or systems failure could interfere with our ability to comply with financial reporting requirements, which could adversely affect us. A cyber attack could also compromise the confidential information of our employees, tenants, customers and vendors. A successful attack could disrupt and materially affect our business operations, including damaging relationships with tenants, customers and vendors. Any compromise of our information security systems could also result in a violation of applicable privacy and other laws, significant legal and financial exposure, damage to our reputation, loss or misuse of the information (which may be confidential, proprietary and/or commercially sensitive in nature) and a loss of confidence in our security measures, which could harm our business.
For additional information on our cybersecurity risk management process, see "Item 1C. Cybersecurity" in this Annual Report on Form 10-K.