We use technology in substantially all aspects of our business operations, including internet and cloud-based systems and applications. We also use mobile devices, social networking, outside vendors, and various platforms to connect with our employees, suppliers, and residents. As we have incorporated and may continue to incorporate the use of generative artificial intelligence and other advancing technologies, any breach, interruption, or security failure of those technologies, or any non-compliance with applicable laws, could have a negative impact on our business operations, results of operations, financial condition, or reputation.
Information security risks have escalated as a result of these emerging technologies and the heightened sophistication and activity levels of cyber-attack perpetrators. Cyber-attacks can include third parties gaining unauthorized access to our data, including sensitive information about our residents, as well as our vendors' data or information technology systems. These attacks may occur through stolen credentials, computer malware, phishing attacks, ransomware, and other deliberate attempts to compromise information security.
Our business involves the storage and transmission of numerous classes of sensitive and confidential information and intellectual property, including residents' and suppliers' personal information, private information about employees, and financial and strategic information about us. As we pursue our strategy to grow through acquisitions and developments and new initiatives to improve our operations, we are also expanding our information technologies, resulting in a larger technological presence and corresponding exposure to cybersecurity risk. If we fail to assess and identify cybersecurity risks associated with our operations, we may become increasingly vulnerable to such risks and may be liable for consequential litigation and remediation costs. Additionally, the measures we have implemented to prevent security breaches and cyber incidents may not be effective and there can be no complete assurance of prevention or anticipation of such incidents. The theft, destruction, loss, misappropriation, or release of sensitive data, confidential information or intellectual property, or interference with our information technology systems or the technology systems of third parties on which we rely could result in business disruption, negative publicity, brand damage, violation of privacy laws, loss of residents, potential liability, and competitive disadvantage, any of which could result in a material adverse effect on our financial condition or results of operations.
We rely on, or may rely in the future on, certain third-party service and software providers to host systems, provide key software, and to supply and store our sensitive data in a secure manner. These third parties face potential risks relating to cybersecurity similar to ours which could disrupt their businesses and adversely impact us. While we provide guidance and specific requirements, in some cases, we do not directly control their information technology security operations or the amount of investment they place in guarding against cybersecurity threats. Accordingly, we are subject to any flaws or breaches in their information technology systems, or those which they operate for us, which could have a material adverse effect on our financial condition or results of operations.