We rely on IT networks and systems, including the Internet, to process, transmit and store electronic information and to manage or support a variety of our business processes, including financial transactions and maintenance of records, which may include confidential information of tenants and lease data. We rely on commercially available systems, software, tools and monitoring and third-party providers to provide security for processing, transmitting and storing confidential tenant information, such as individually identifiable information relating to financial accounts. It is possible that our security measures will not be able to prevent the systems' improper functioning, or the improper disclosure of personally identifiable information such as in the event of cyber-attacks. Security breaches, incidents, and compromises, including physical or electronic break-ins, computer viruses, attacks by hackers and similar breaches, can create system disruptions, shutdowns or unauthorized disclosure of confidential information. Any failure to maintain proper function, security and availability of our information systems could interrupt our operations, and those of our tenants; result in our inability to properly monitor our compliance with the rules and regulations regarding our compliance as a REIT; result in the unauthorized access to, and destruction, loss, theft, misappropriation or release of, proprietary, confidential, sensitive or otherwise valuable information of ours or others; result in our inability to maintain the building systems relied upon by our tenants for the efficient use of their leased space; require significant management attention and resources to remedy any damages that may result; damage our reputation among our tenants and investors, or subject us to liability claims or regulatory penalties. Additionally, third-party security events at our vendors or other service providers could also impact our data and operations via unauthorized access to information or disruption of services. Any or all of the above could have a material adverse effect on our business, financial condition and results of operations.
The risk of a security breach, incident, compromise or disruption, particularly through cyber-attack or cyber intrusion, including by computer hackers, foreign governments and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased, which, in turn, may lead to increased costs to protect our network, data and systems. Although we make efforts to maintain the security and integrity of our IT networks and related systems, and we have implemented various measures to manage the risk of a security breach, incident, compromise, or disruption, there can be no assurance that our security efforts and measures will be effective or that attempted security breaches or disruptions would not be successful or damaging. Even the most well protected information, networks, systems and facilities remain potentially vulnerable because the techniques used in such attempted security breaches, incidents, and compromises evolve and generally are not recognized until launched against a target, and in some cases, are designed to not be detected and, in fact, may not be detected. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures or to adequately address or mitigate any security breach, incident, or compromise, and thus it is impossible for us to entirely mitigate this risk.