We rely heavily on communications and information systems to conduct our business and face the risk of operational disruption, failure, termination or capacity constraints of any of the third parties that facilitate our business activities, including exchanges, clearing agents, clearing houses or other financial intermediaries. Any failure or interruption of these systems could result in failures or disruptions in our customer relationship management, general ledger, deposit, loan and other systems. While we have policies and procedures designed to prevent or limit the effect of the failure or interruption of these information systems, there can be no assurance that any such failures or interruptions will not occur or, if they do occur, that they will be adequately addressed. The occurrence of any failures or interruptions of these information systems could damage our reputation, result in a loss of customer business, subject us to additional regulatory scrutiny, or expose us to civil litigation and possible financial liability, any of which could have a material adverse effect on our financial condition and results of operations.
We rely on the secure processing, storage and transmission of confidential and other information on our computer systems and networks. Although we take numerous protective measures to maintain the confidentiality, integrity and availability of our and our clients' information across all geographic and product lines, and endeavor to modify these protective measures as circumstances warrant, the nature of the threats continues to evolve. As a result, our computer systems, software and networks and those of our customers may be vulnerable to unauthorized access, loss or destruction of data (including confidential client information), account takeovers, unavailability of service, computer viruses or other malicious code, cyber-attacks and other events that could have an adverse security impact and result in significant losses by us and/or our customers. Despite the defensive measures we take to manage our internal technological and operational infrastructure, these threats may originate externally from third parties, such as foreign governments, organized crime and other hackers, and outsource or infrastructure-support providers and application developers, or the threats may originate from within our organization. Given the increasingly high volume of our transactions, certain errors may be repeated or compounded before they can be discovered and rectified.
We are inherently exposed to risks caused by the use of computer, internet and telecommunications systems, and susceptible to fraudulent activity that may be committed against us or our clients, which may result in financial losses to us or our clients, privacy breaches against our clients or damage to our reputation. These risks include fraud by employees, customers and other outside entities targeting us and/or our customers, and such fraudulent activity may take many forms, including internet fraud, check fraud, electronic fraud, wire fraud, phishing, and other dishonest acts. In recent periods, there has been a rise in electronic fraudulent activity within the financial services industry, especially in the commercial banking sector, due to cyber criminals targeting commercial bank accounts. Consistent with industry trends, we have also experienced an increase in attempted electronic fraudulent activity in recent periods. Given such increase in electronic fraudulent activity and the growing level of use of electronic, internet-based and networked systems to conduct business directly or indirectly with our clients, certain fraud losses may not be avoidable regardless of the preventative and detection systems in place.
Although, to date, we have not experienced any material losses relating to cyber-attacks or other information security breaches, there can be no assurance that we will not suffer such losses in the future. Our risk and exposure to these matters remains heightened because of, among other things, the evolving nature of these threats, the outsourcing of some of our business operations and the continued uncertain global economic environment. As cyber threats continue to evolve, we may be required to expend significant additional resources to continue to modify or enhance our protective measures or to investigate and remediate any information security vulnerabilities.
We maintain an insurance policy which we believe provides sufficient coverage at a manageable expense for an institution of our size and scope with similar technological systems. However, we cannot assure that this policy will afford coverage for all possible losses or would be sufficient to cover all financial losses, damages, penalties, including lost revenues, should we experience any one or more of our or a third party's systems failing or experiencing attack.