We are exposed to many types of operational risks, some of which are outside of our control, including, but not limited to, the risk of fraud or theft by employees and outsiders, clerical and record-keeping errors, computer/telecommunications systems malfunctions, and risks regarding the operations of our third party vendors. Our business is dependent on our ability to process a large number of increasingly complex transactions. If any of our financial, accounting or other data processing or technological systems fail or have other significant shortcomings, our business could be affected. We depend on internal systems and outsourced technology to support these data storage and processing operations, as well as harm our reputation amongst our customers. Our inability to use or access these information systems at critical points in time could unfavorably impact the timeliness and efficiency of our business operations. In recent years, some banks have experienced denial of service attacks in which individuals or organizations flood a bank's website with extraordinarily high volumes of traffic, with the goal and effect of disrupting the ability of the bank to process and/or communicate information about transactions. These, and similar types of attacks and/or breaches of data, could result in losses in the form of lost revenues, costs to remediate, reputational harm, litigation losses and other impacts to our financial condition and results of operations.
Additionally, we could be affected if one of our employees or a third-party service provider causes a significant operational breakdown or failure, either as a result of human error or where an individual purposefully sabotages or fraudulently manipulates our operations or systems. We are also at risk of an impact on our systems and operations from natural disasters, accidents outside of our control, terrorism, international hostilities, and other exceptional or outlier events outside of our control. Increasing electricity demand, including from data centers and industrial activity, is placing pressure on regional power grid operators, including PJM Interconnection LLC, which serves many of the markets in which we operate, and prolonged or widespread power disruptions could adversely affect our facilities, third-party service providers, customers, and business continuity. Such events can impact operational systems operated by us or others on which we rely and can result in an impact to our business operations and subsequent impacts to our financial condition and results of operations.
In addition, continuing cyberattacks and current geopolitical tensions highlight the importance of heightened threat monitoring and safeguarding against disruptive attacks targeting the financial sector. There have been instances where financial institutions have been victims of fraudulent activity in which criminals pose as customers to initiate wire and automated clearinghouse transactions out of customer accounts. There have also been increased instances of scammers who target and socially engineer clients to gain access to their accounts to conduct transactions or induce customers to authorize fraudulent transactions for the scammers' benefit. Although we have commercially reasonable policies and procedures in place to verify the authenticity of our customers, we cannot assure that such policies and procedures will prevent all fraudulent transfers. AI tools may also be utilized by bad actors to increase the sophistication and speed of cyberattacks and fraud attempts. For more information on the risks associated with AI, see the Risk Factor titled ""
The fraudulent activity and cybersecurity risks can result in financial liability and litigation risk to us and/or our customers, as well as harm to our reputation and negative impacts on our financial condition, results of our operations, business and prospects.
The use and capacity of AI, Generative AI, LLMs and AI agents has increased in the past year and is being employed by customers, competitors, and vendors at increased rates. Many of these tools can increase cybersecurity risks, require specific technical expertise to operate, or expose information through open source code. These tools are being used by parties in various capacities, and employing these tools without sufficient knowledge or expertise of the power and risks associated with the tools can increase risks for the users. These tools are relatively new and there is potential of continued and/or increased adoption of legal and regulatory frameworks governing the use of these tools, by law, our primary banking regulators, other federal or state regulatory bodies, or other self-regulatory organizations.
The use of these tools by customers can increase the risk of exposure to their personal information and/or banking credentials which can result in increased opportunities for bad actors to initiate fraudulent activity with respect to a customer's account(s). While we have implemented commercially reasonable policies and procedures to protect against fraudulent activity on the accounts of our customers, we cannot assure that such policies and procedures will prevent all fraudulent activity or capture activity that has been inadvertently been authorized by the customer. Such activity can result in financial liability and litigation risk to us and/or our customers, as well as harm to our reputation and negative impacts on our financial condition, results of our operations, business and prospects.
The use of these tools by vendors engaged by us can increase the risk of unauthorized use or disclosure of sensitive or confidential client or customer information and cyberattacks. In conducting due diligence of our vendors, we request detailed information regarding how the vendor uses these tools and attempt to mitigate risks related to exposure by agreement with vendors. While these processes seek to mitigate risks associated with vendor use of these tools, we cannot eliminate this risk. Vendors may employ tools without realizing the risks associated with the tools, may have employees that use unauthorized technology tools that were not disclosed to us during our diligence process, or the tools that were disclosed may implement new services, features, or technologies that increase the exposure to cybersecurity risks. If a vendor engaged by us experienced a cyberattack related to use of these tools, or deliberately or inadvertently exposed sensitive or confidential client or customer information, we may experience financial liability and litigation risk to us and/or our customers, as well as harm to our reputation and negative impact on our financial condition, results of operations and business. Additionally, if any vendors incur additional costs related to any legal or regulatory framework adopted governing the use of such tools, we may face increased costs to engage such vendor, which could impact or financial condition and results of operations if we continue to use such vendor or as a result of costs incurred to find an alternative vendor.
The use of these tools by competitors may impair our ability to attract or retain business if our competitors are successful in their implementation. Failure to keep pace with these evolving technologies can have a negative impact on our financial condition, results of operations, business and prospects. In addition, if our competitors suffer any reputational harm as a result of the implementation of these evolving technologies, it could have a negative effect on the financial services industry as a whole and have a negative impact on our financial condition, results of operations, business and prospects. The increased use of these tools by competitors may also increase pressure to impose legal or regulatory frameworks regarding these tools, which could impact the financial services industry as a whole and cause us to incur increased costs to comply with such legal or regulatory frameworks, which may result in a negative impact on our financial condition, results of operations and business.