Failures in, or breaches of, our computer systems and network infrastructure, or those of our third-party vendors or other service providers, including as a result of cyber-attacks, cybersecurity breaches, and other disruptions, could disrupt our business, result in the disclosure or misuse of confidential or proprietary information, result in supervisory liability or regulatory enforcement action, damage our reputation, result in a loss of customers and business, result in a loss of confidence in the security of our systems, products, and services, increase our costs, and cause losses. Our operations are dependent upon our ability to protect our computer equipment against damage from fire, power loss, telecommunications failure, or a similar catastrophic event. Any damage or failure that causes an interruption in our operations could have an adverse effect on our business, financial condition, and results of operations. In addition, our operations are dependent upon our ability to protect our computer systems and network infrastructure, including our internet banking activities, against damage from physical break-ins, cybersecurity breaches, and other disruptive problems caused by the internet or other users. Cybersecurity breaches and other disruptions would jeopardize the security of information stored in and transmitted through our computer systems and network infrastructure, which may result in business disruptions, significant liability to us, and damage to our reputation and may discourage current and potential customers from using our internet banking services. Our security measures, including firewalls and penetration testing, as well as oversight by our board of directors and the Audit Committee as well as management's assessment, identification, and management of cybersecurity risks, may not prevent or detect future potential losses from system failures or cybersecurity breaches, attacks, or other disruptions. While we seek to continuously monitor for and react to any and all such malicious cyber activity and develop our systems to protect our technology infrastructure and data, such monitoring and systems development may not be effective in preventing misuse, misappropriation, or corruption. In the ordinary course of business, our board of directors receives quarterly cybersecurity risk management updates and members of the Audit Committee of our board of directors also attend the meetings of our information technology steering committee on a quarterly basis. Cybersecurity risk management is incorporated into our overall enterprise risk management model, which is updated on a quarterly basis and subject to oversight by our board of directors.
In the normal course of business, we collect, process, and retain sensitive and confidential information regarding our customers. Although we devote significant resources, oversight by our board of directors, and management focus to ensuring the integrity of our systems through information security and business continuity programs, our facilities and systems, and those of our third-party service providers, are vulnerable to external or internal security breaches, acts of vandalism, computer viruses, malware, misplaced or lost data, programming or human errors, or other similar events. We and our third-party service providers have experienced these types of events in the past and expect to continue to experience them in the future. These events could interrupt our business or operations or result in significant legal and financial exposure (including costs associated with remediating any security breaches), supervisory liability, regulatory enforcement action, damage to our reputation, loss of customers and business, or a loss of confidence in the security of our systems, products, and services. Although the impact to date from these events has not had an adverse effect on us, we cannot be sure this will be the case in the future. Any of these occurrences could have an adverse effect on our business, financial condition, and results of operations. We are not able to anticipate or implement effective preventive measures against all security breaches of these types, especially because attacks are increasingly sophisticated, change frequently, often are not recognized until launched, and can originate from a wide variety of sources. Our early detection and response mechanisms could fail to detect, mitigate, or remediate these risks in a timely manner. Despite our implementation of protective measures and endeavoring to modify them as circumstances warrant, our computer systems, software, and networks may be vulnerable to human error, equipment failure, natural disasters, power loss, unauthorized access, supply chain attacks, distributed denial of service attacks, computer viruses and other malicious code, and other events that could result in significant liability and damage to our reputation, and have an ongoing impact on the security and stability of our operations. In addition, although we maintain insurance coverage that may, subject to terms and conditions, cover certain aspects of cyber and information security risks, such insurance coverage may be insufficient to cover all losses, such as litigation costs or financial losses that exceed our policy limits or are not covered under any of our current insurance policies.
Information security risks for financial institutions like us have increased recently in part because of new technologies, the use of the internet, cloud, and telecommunications technologies (including mobile devices) to conduct financial and other business transactions, and the increased sophistication and activities of organized crime, perpetrators of fraud, hackers, terrorists, and others. Additionally, like many large enterprises, we have introduced more remote work arrangements for our employees. The increase in remote work arrangements over the past few years has introduced potential new vulnerabilities to cyber threats. We also face increased cybersecurity risk as we deploy additional technologies and digital solutions, including our website and digital banking platform with complementary treasury management solutions. Moreover, any cyber-attack or other security breach may persist for an extended period of time without detection. We endeavor to design and implement policies and procedures to identify such cyber-attacks or breaches as quickly as possible; however, we expect that any investigation of a cyber-attack or breach would take substantial amounts of time, and that there may be extensive delays before we obtain full and reliable information. During such time we would not necessarily know the extent of the harm or how best to remediate it, and certain errors or actions could be repeated or compounded before they are discovered and remediated, all of which would further increase the costs and consequences of such an attack or breach.
In addition to cyber-attacks or other security breaches involving the theft of sensitive and confidential information, hackers recently have engaged in attacks against large financial institutions that are designed to disrupt key business services, such as consumer-facing web sites. We are not able to anticipate or implement effective preventive measures against all security breaches of these types, especially because the techniques used change frequently and because attacks can originate from a wide variety of sources. Our early detection and response mechanisms may be thwarted by sophisticated attacks and malware designed to avoid detection.
Banking organizations are required to notify their primary federal regulator of significant computer security incidents within 36 hours of determining that such an incident has occurred. Failure to comply with this requirement in the event of such an incident could result in sanctions by regulatory agencies, civil money penalties, and/or damage to our reputation, all of which could have an adverse effect on our business, financial condition, and results of operations.
The SEC enacted rules, effective as of December 18, 2023, requiring public companies to disclose material cybersecurity incidents that they experience on Form 8-K within four business days of determining that a material cybersecurity incident has occurred and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance. If we fail to comply with these new requirements we could incur regulatory fines in addition to other adverse consequences to our reputation, business, financial condition, and results of operations.
We may also be subject to liability under various data protection laws. In the normal course of business, we collect, process, and retain sensitive and confidential information regarding our customers and employees, including personal data. As a result, we are subject to numerous laws and regulations designed to protect this information, such as U.S. federal, state, and international laws governing the protection of personally identifiable information. These laws and regulations are increasing in complexity and number. If any person, including any of our employees, negligently disregards or intentionally breaches our established controls with respect to client or employee data, or otherwise mismanages or misappropriates such data, we could be subject to significant monetary damages, regulatory enforcement actions, fines and/or criminal prosecution. In addition, unauthorized disclosure of sensitive or confidential client or employee data, whether through system failure, employee negligence, fraud, or misappropriation, could damage our reputation and cause us to lose clients and related revenue. Potential liability in the event of a security breach of client data could be significant. Depending on the circumstances giving rise to the breach, this liability may not be subject to a contractual limit or an exclusion of consequential or indirect damages.