As a regular part of our business operations, we rely on information technology systems and network infrastructure, including the internet, to process, transmit and store electronic information and to manage or support a variety of our business processes, including financial transactions and maintenance of records. We rely on our own systems and also outsource some of our business requirements through service providers and other business partners pursuant to agreements. The risk of a security breach or disruption, particularly through cyber attack or cyber intrusion, including by internal actors, computer hackers, foreign governments and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. Our IT networks and related systems and infrastructure – and those of our providers/partners – are essential to the operation of our business and our ability to perform day-to-day operations (including managing our building systems) and, in some cases, may be critical to the operations of certain of our tenants.
We have experienced adverse security incidents. All incidents experienced to date have been minor in scope and impact, were resolved quickly, had no material impact on the Company's reputation, financial performance, customer or vendor relationships, and posed no material risk of potential litigation or regulatory investigations or actions. We expect unauthorized parties to continue to attempt to gain access to our systems or information, and/or those of our business partners and service providers. Cyber attacks targeting our infrastructure could result in a full or partial disruption of our operations, as well as those of our tenants.
A security incident, breach or other significant disruption involving our information technology networks and related systems could occur due to a virus or other harmful circumstance, intentional penetration or disruption of our information technology resources by a third party, natural disaster, hardware or software corruption or failure or error or poor product or vendor/developer selection (including a failure of security controls incorporated into or applied to such hardware or software), telecommunications system failure, service provider error or failure, intentional or unintentional personnel actions (including the failure to follow our security protocols), or lost connectivity to our networked resources. Such occurrences could disrupt the proper functioning of our networks and systems; result in disruption of business operations and loss of service to our tenants and customers; result in significantly decreased revenues; result in increased costs associated in obtaining and maintaining cybersecurity investigations and testing, as well as implementing protective measures and systems; result in increased insurance premiums and operating costs; result in misstated financial reports and/or missed reporting deadlines; result in our inability to properly monitor our compliance with the rules and regulations regarding our qualification as a REIT; result in the unauthorized access to, and destruction, loss, theft, misappropriation or release of proprietary, confidential, sensitive or otherwise valuable information of ours or others, which others could use to compete against us or for disruptive, destructive or otherwise harmful purposes and outcomes; result in our inability to maintain the building systems relied upon by our tenants for the efficient use of their leased space; require significant management attention and resources to remedy any damages that result; subject us to claims for breach of contract, damages, credits, penalties or termination of leases or other agreements; subject us to regulatory investigations and actions; cause harm to our competitive position and business value; and damage our reputation among our tenants and investors generally. Moreover, cyber attacks perpetrated against our Anchors and tenants, including unauthorized access to customers' credit card data and other confidential information, could subject us to significant litigation, liability and costs, adversely impact our reputation, or diminish consumer confidence and consumer spending and negatively impact our business.
The compromise of our or our business partners' or service providers' technology systems resulting in the loss, disclosure, misappropriation of, or access to, our information or that of our tenants, employees or business partners or failure to comply with ever-evolving regulatory obligations or contractual obligations with respect to such information could result in legal claims or proceedings, liability or regulatory penalties under laws protecting the privacy of personal information, disruption to our operations and damage to our reputation, any or all of which could adversely affect our business. The costs to remediate breaches and similar system compromises that do occur could be material. In addition, as cybercriminals become more sophisticated, the cost of proactive defensive measures continues to increase.
Although we and our service providers/business partners have implemented processes, procedures and controls to help mitigate these risks, there can be no assurance that these measures, as well as our increased awareness of the risk of cyber incidents, will be effective or that attempted or actual security incidents, breaches or system disruptions that could be damaging to us or others will not occur. Even the most well protected information, networks, systems and facilities remain potentially vulnerable because the techniques used in such attempted security breaches evolve and generally are not recognized until launched against a target, and in some cases are designed not to be detected and, in fact, may not be detected. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, and thus it is impossible for us to entirely mitigate this risk. Lastly, while we have cybersecurity insurance, damages and claims arising from such incidents may not be covered, or may exceed the amount of any insurance coverage.