Overall, the Group is subject to cybersecurity risks, including those related to cyber-attacks, security breaches and other similar incidents with respect to its and its service providers' information technology systems, the occurrence of which could result in regulatory scrutiny, legal liability or reputational harm, and we may incur increasing costs to minimize those risks.
Cybersecurity threats and incidents have increased in recent years in frequency, levels of persistence, sophistication and intensity, and we may be subject to heightened cyber-related risks. The Group has previously experienced attempts by cyber-criminals to compromise its IT infrastructure and personnel (e.g., through social engineering attempts), but to date, no such incident has resulted in any material impact on our business, results of operations or financial condition. The Group regularly monitors and updates its information and cyber security safeguards and controls to counter the ever-evolving cyber threat, and to ensure such safeguards and controls continue to protect the confidentiality, integrity and availability of the Group's information and information technology systems. This has included making necessary changes to cybersecurity training and awareness initiatives. Despite such efforts, there can be no assurance that these steps will in fact prevent future attacks.
The Group's business depends on the proper functioning and availability of our information technology platform, including communications and data processing systems, proprietary systems (including those we license through TFP), and systems of our third party service providers. The Group relies on information technology systems and infrastructure to process, transmit, store and protect the electronic information, financial data and proprietary models (including as licensed) that are critical to the Group's business. Furthermore, a significant portion of the communications between the Group's employees and the Group's business, banking and investment partners depends on information technology and electronic information exchange architecture that may be outside our direct control. We are required to effect electronic transmissions with third parties, including brokers, clients, service providers and others with whom we do business, as well as with our Board. In addition, we collect, store and otherwise process personal information (including sensitive personal information) of our clients, employees and service providers. We have implemented and maintain what we believe to be reasonable security measures, but we cannot guarantee that the controls and procedures we or third parties have in place to protect or recover our respective systems and the information stored on such systems will be effective, successful or sufficiently responsive to avoid harm to our business.
Like all companies, the Group's information technology systems are vulnerable to data breaches, interruptions or failures due to events that may be beyond the control of the Group, including, but not limited to, natural disasters, theft, terrorist attacks, computer viruses, hackers and general technology failures. Cybersecurity threats are evolving in nature and becoming increasingly difficult to detect, and may come from a variety of sources, including organized criminal groups, "hacktivists," terrorists, nation states and nation state-supported actors. These threats include, among other things, computer viruses, worms, malware, ransomware, denial of service attacks, credential stuffing, social engineering, phishing attacks, human error, fraud, theft, malfeasance or improper access by employees or service providers, and other similar threats. Cyber-attacks, security breaches, and other similar incidents, including with respect to third party systems that have access to or process our, our clients' or our employees' personal, proprietary and confidential information, could expose us to a risk of loss, disclosure or misuse of such information, litigation and enforcement action, potential liability and reputational harm. In addition, cybersecurity incidents, such as ransomware attacks, that impact the availability, integrity, confidentiality, reliability, performance, accuracy or other proper functioning of our systems could have a significant impact on our operations and financial results. We may not be able to anticipate all cyber-attacks, security breaches or other similar incidents, detect or react to such incidents in a timely manner, or adequately remediate any such incident.
Although we maintain processes, policies, procedures and technical safeguards that are designed to protect the security, confidentiality, integrity, availability, and privacy of personal, proprietary and confidential information, and our IT and cybersecurity arrangements are subject to periodic assessment through audits and penetration testing, we cannot eliminate the risk of human error or guarantee our safeguards against employee, service provider or third party malfeasance. It is possible that the measures we implement may not prevent improper access to, disclosure or misuse of the personal, proprietary or confidential information in our possession or control. Moreover, while we generally perform cybersecurity due diligence on our key service providers, we cannot ensure the cybersecurity measures they take will be sufficient to protect any information we share with them. Due to applicable laws, regulations, rules, standards and contractual obligations, we may be held liable for cyber-attacks, security breaches or other similar incidents attributed to our service providers as they relate to the information we share with them. This could cause harm to our reputation, create legal exposure, or otherwise subject us to liability under laws that protect personal data, resulting in increased costs or loss of revenue.
Despite safeguards, the Group has in the past experienced cybersecurity incidents (that were not deemed material), and may yet experience further incidents that may negatively impact (possibly even to a material extent) the Group's business. Any cybersecurity incident, including system failure, cyber-attacks, security breaches, disruption by malware or other damage, with respect to our or our service providers' information technology systems, could interrupt or delay our operations, result in a violation of applicable cybersecurity, privacy, data protection or other laws, regulations, rules, standards or contractual obligations, damage our reputation, cause a loss of customers or expose sensitive customer data, give rise to civil litigation, injunctions, damages, monetary fines or other penalties, subject us to additional regulatory scrutiny or notification obligations, and/or increase our compliance costs, any of which could adversely affect our business, financial condition and results of operations.
We cannot ensure that any limitations of liability provisions in our agreements with clients, service providers and other third parties with which we do business would be enforceable or adequate or otherwise protect us from any liabilities or damages with respect to any particular claim in connection with a cyber-attack, security breach or other similar incident. In addition, while we maintain insurance that would mitigate the financial loss under such scenarios, providing what we believe to be appropriate policy limits, terms and conditions, we cannot guarantee that our insurance coverage will be adequate for all financial and non-financial consequences from a cybersecurity event, that insurance will continue to be available to us on economically reasonable terms, or at all, or that our insurer will not deny coverage as to any future claim.