Information technology systems are critical to the Company's business. The Company uses various technology systems to manage customer relationships, general ledger, securities, deposits and loans. The Company has established policies and procedures to prevent or limit the effect of system failures, interruptions and security breaches, but such events may still occur or may not be adequately addressed if they do occur. In addition, any compromise of the Company's systems could deter customers from using its products and services. Security systems may not protect systems from security breaches.
In addition, the Company outsources some of its data processing to certain third-party providers. If these third-party providers encounter difficulties, or if the Company has difficulty communicating with them, the Company's ability to adequately process and account for transactions could be affected, and business operations could be adversely affected. Threats to information security also exist in the processing of customer information through various other vendors and their personnel.
The occurrence of any system failures, interruption or breach of security could damage the Company's reputation and result in a loss of customers and business thereby, subjecting it to additional regulatory scrutiny, or could expose it to litigation and possible financial liability. Although the Company has not experienced any system failures, interruption or breach of security to date, any of these events could have a material adverse effect on its financial condition and results of operations.
The Company is constantly relying upon the availability of technology, the Internet and telecommunication systems to enable financial transactions by clients, to record and monitor transactions and transmit and receive data to and from clients and third parties. Information security risks have increased significantly due to the use of online, telephone and mobile banking channels by clients and the increased sophistication and activities of organized crime, hackers, terrorists and other external parties. Our technologies, systems, networks and our clients' devices have been subject to, and are likely to continue to be the target of, cyberattacks, computer viruses, malware, phishing attacks or information security breaches that could result in the unauthorized release, gathering, monitoring, misuse, loss or destruction of our or our clients' confidential, proprietary and other information, the theft of client assets through fraudulent transactions or disruption of our or our clients' or other third parties' business operations. Any of the foregoing could have a material adverse effect on the Company's business, financial condition and results of operations.