We use information technology systems, infrastructure and networks and other operational systems to store, retrieve, evaluate and use customer, employee, and company data and information. Our business is highly dependent on our ability to access these systems to perform necessary business functions. In the event of a natural disaster, a computer virus, unauthorized access, a terrorist attack, cyber-attack or other disruption, our systems and networks may be inaccessible to our employees, customers or business partners for an extended period of time, and we may be unable to meet our business obligations for an extended period of time if our data or systems are disabled, manipulated, destroyed or otherwise compromised. Additionally, some of our systems and networks are older, legacy-type systems that are less efficient, more susceptible to cybersecurity risks and require an ongoing commitment of significant resources to maintain or upgrade. Supply chain disruptions or delays could prevent us from maintaining and implementing changes, updates and upgrades to our systems and networks in a timely manner or at all. System and network failures or outages could compromise our ability to perform business functions in a timely manner, which could harm our ability to conduct business, hurt our relationships with our business partners and customers and expose us to legal claims as well as regulatory investigations and sanctions, any of which could have a material adverse effect on our business, results of operations, financial condition and liquidity.
Some of these systems and networks also rely upon third-party systems and services, which themselves may rely on the systems and services of other third parties. Problems caused by, or occurring in relation to, our third-party providers' systems and services, including those resulting from breakdowns or other disruptions in information security and technology services provided by our third-party providers and the other third-parties on which they rely, our inability to acquire third-party services on commercially acceptable terms, failure of a third-party provider to perform as anticipated or in compliance with applicable laws or regulations, inability of a third-party provider to provide the required volumes of services or third-party providers experiencing cyber-attacks, security breaches or data breaches continue to potentially, and could in the future materially and adversely affect our business, results of operations, financial condition and liquidity. See "Cybersecurity-Cybersecurity Risk Management-Board Oversight and Governance" below.
Like other companies, the systems and networks we maintain and third-party systems and networks we use have in the past been, and will likely in the future be, subject to or targets of unauthorized or fraudulent access, including physical or electronic break-ins or unauthorized tampering, as well as attempted cyber and other security threats and other attacks such as "denial of service" attacks, phishing, untargeted but sophisticated and automated attacks, ransomware and other disruptive software. Also, like other companies, we face an increasing challenge of attracting and retaining highly qualified security personnel to assist us in combating these security threats. Cybersecurity threats can originate from a broad range of sources including terrorists, nation states, state-sponsored actors, financially motivated actors, internal actors, or third-parties (including third-party providers), and the techniques used in these attacks may change, develop and evolve rapidly, including the use of emerging technologies, such as broader forms of artificial intelligence, and are frequently or are often not recognized until after they have been launched.
The frequency and sophistication of such threats continue to increase and often become further heightened in connection with geopolitical tensions. In light of these geopolitical events and dynamics, state-sponsored parties or their supporters have in the past and may in the future, launch cyberattacks, and attempt to cause supply chain disruptions, or carry out other geopolitically motivated actions that may adversely disrupt or degrade our operations and may result in data compromise.
There is no assurance that our security measures, including information security and technology policies and standards, administrative, technical and physical controls, and other actions by us or contracted third-parties designed as preventative, will provide fully effective protection from threats to our data, systems and networks, including malware and computer virus attacks, ransomware, unauthorized access, business e-mail compromise, misuse, denial-of-service attacks, ransomware, system failures and disruptions, both independently and through contracts with third parties. There is no assurance that our security measures, including information security and technology policies and standards, administrative, technical and physical controls, and other actions designed as preventative, will provide fully effective protection from such events. We maintain insurance to cover operational risks, such as cyber risk and technology outages, but this insurance may not cover all costs associated with the consequences of information systems or personal, confidential or proprietary information being compromised. We cannot be certain that insurance coverage will continue to be available to us on economically reasonable terms, or at all, or that any insurer will not deny coverage of a future claim.
In the case of a successful ransomware or extortion attack in which our data and information systems are compromised and applicable restore control processes to restore access are not effective, our information could be held hostage until a ransom, which may be significant, is paid. In some cases, such a compromise may not be immediately detected, which may make it difficult to restore critical services, mitigate damage to assets and maintain the integrity and security of data, including our policyholder, employee, agent and other confidential information processed through our systems and networks. Additionally, since we rely heavily on information technology and systems and on the integrity and timeliness of data to run our businesses and service our customers, any such security event and resulting compromise of systems or data may impede or interrupt our business operations and our ability to offer products to and service our customers, and otherwise may materially and adversely affect our business, results of operations, financial condition and liquidity.
There can be no assurance that any actions taken by us to evaluate and enhance our information security and technology systems (which increasingly will include the use of artificial intelligence technology) and processes, including third-party systems and services on which we rely, as well as changes designed to update and enhance our protective measures to address new threats, will decrease the risk of a system or process failure, and there could be a gap in the associated security measures during the change period. Any such system or process failure or security measures gap could materially and adversely affect our business, results of operations, financial condition and liquidity.
We routinely transmit, receive and store personal, confidential and proprietary information by email and other electronic means. Although we attempt to keep such information confidential and secure, we may be unable to do so in all events, especially with clients, vendors, service providers, counterparties and other third parties who may not have or use appropriate controls to protect personal, confidential or proprietary information. Failure by us or any of our third party vendors to secure or appropriately handle personal, confidential or proprietary information could cause a loss of data or compromised data integrity, give rise to remediation or other expenses, expose us to liability under U.S. and international laws and regulations, and subject us to litigation, investigations, sanctions, and regulatory and law enforcement action, and result in reputational harm and loss of business, which could have a material adverse effect on our business, results of operations, financial condition and liquidity.
Furthermore, certain of our business lines are subject to laws and regulations enacted by U.S. federal and state governments, foreign governments, data protection authorities or other jurisdictions or enacted by various self-regulatory organizations or exchanges relating to the privacy and security of personal data of clients, employees or others and the security of information systems and non-public information ("Privacy and Information Security Laws"). The variety of applicable Privacy and Information Security Laws exposes us to heightened regulatory scrutiny and requires us to incur significant technical, legal and other expenses in an effort to ensure and maintain compliance and will continue to impact our business in the future by increasing legal, operational and compliance costs. While we have taken steps to comply with current Privacy and Information Security Laws, we cannot guarantee that our efforts will meet the evolving standards imposed by enforcement agencies and by courts in private rights of action and that in the future we will be able to timely comply with rapidly changing Privacy and Information Security Laws worldwide that may require significant technical, operational and administrative changes. If we are found not to be in compliance with current or future Privacy and Information Security Laws, we may be subject to potential private consumer, business partner or securities litigation, regulatory inquiries and governmental investigations and proceedings, including class-actions, and we may incur damage to our reputation. Any such developments may subject us to remediation expenses, governmental fines and other monetary penalties and damages, divert management's time and attention and lead to enhanced regulatory oversight, any of which could have a material adverse effect on our business, results of operations, financial condition and liquidity. Additionally, we expect that increased political and social focus on privacy and cybersecurity risks globally will increase the financial and reputational implications should we or any of our third-party suppliers experience a significant security incident or data breach. New and currently unforeseen laws and regulatory issues could also arise from the increased use of emerging technologies, data analytics and digital services. If we are found not to be in compliance with these laws and regulations concerning emerging technology, data analytics and digital services, we could be subjected to significant civil and criminal liability and exposed to financial and reputational harm.
For additional information on data protection and cybersecurity regulations, see "Business-Regulation-U.S. Regulation-Privacy, Data Protection and Cybersecurity."