Our information and technology systems are vulnerable to damage or interruption from computer viruses, network failures, computer and telecommunications failures, infiltration by unauthorized persons and security breaches, usage errors by our employees, power outages and catastrophic events such as fires, tornadoes, floods, hurricanes and earthquakes. A security breach of the Company's computer systems could also interrupt or damage its operations or harm its reputation. In addition, the Company could be subject to liability if confidential customer information is misappropriated from its computer systems. Any compromise of security, including security breaches perpetrated on persons with whom the Company has commercial relationships, that result in the unauthorized release of its users' personal information, could result in a violation of applicable privacy and other laws, significant legal and financial exposure, damage to the Company's reputation, and a loss of confidence in the Company's security measures, which could harm its business. Any compromise of security could deter people from entering into transactions that involve transmitting confidential information to the Company's systems and could harm relationships with the Company's suppliers, which could have a material adverse effect on the Company's business. Actual or anticipated attacks may cause the Company to incur increasing costs, including costs to deploy additional personnel and protection technologies, train employees, and engage third-party experts and consultants. Despite the implementation of security measures, these systems may still be vulnerable to physical break-ins, computer viruses, programming errors, attacks by third parties or similar disruptive problems. The Company may not have the resources or technical sophistication to anticipate or prevent rapidly evolving types of cyber-attacks.
Most of the Company's customers provide personal information when applying for financing. The Company relies on encryption and authentication technology to provide security to effectively store and securely transmit confidential information. Advances in computer capabilities, new discoveries in the field of cryptography or other developments may result in the technology used by the Company to protect transaction data being breached or compromised.
In addition, many of the third parties who provide products, services, or support to the Company could also experience any of the above cyber risks or security breaches, which could impact the Company's customers and its business and could result in a loss of customers, suppliers, or revenue.