Our business is highly dependent upon the effective operation of our computer systems. We also have arrangements in place with our partners and other third-party service providers through which we share and receive information. We rely on these systems throughout our business for a variety of functions, including processing claims and applications, providing information to customers and distributors, performing actuarial analyses and maintaining financial records. We have implemented and maintain what we believe to be reasonable security controls and back-up measures, but despite this, our computer systems and those of our partners and third-party service providers have been, and may be in the future, vulnerable to physical or electronic intrusions, computer malware, malicious code or other attacks, system failures, programming errors, employee and third-party errors or wrongdoing, and similar disruption or adverse outcomes. The failure of these systems for any reason could cause significant interruptions to our operations, which could result in a material adverse effect on our business, financial condition or results of operations.
Technology continues to evolve and plays an ever-increasing role in our business. While it is our goal to safeguard information assets from physical theft and cybersecurity threats including by preventing cybersecurity incidents, our information security measures may not detect, and protect information assets from, or fully mitigate, these ever-increasing risks. Information assets include both information itself in the form of computer data, written materials, knowledge and supporting processes, and the information technology systems, networks, other electronic devices and storage media used to store, process, retrieve and transmit that information. As more information is used and shared by our employees, customers and suppliers, both within and outside our company, cybersecurity threats become expansive in nature. Additionally, cybersecurity threats have continued to grow in sophistication, in part through the deployment of artificial intelligence technologies. The confidentiality, integrity, security and availability of information are essential to maintaining our reputation and ability to conduct our operations. Although we have implemented controls and continue to train our employees and conduct cybersecurity-related due diligence on third-party service providers, a cybersecurity event could still occur and could go undetected for an extended period of time, either of which would cause damage to our reputation with our customers, distributors and other stakeholders, could have a material adverse effect on our business, financial condition or results of operations, or expose us to litigation or other enforcement actions.
For example, during the second quarter of 2023, we were notified by PBI Research Services ("PBI"), one of our third-party vendors, that PBI was subject to the widely reported security events involving the MOVEit file transfer system (the "MOVEit Cybersecurity Incident"), which PBI uses in the performance of its services. Following an investigation, as discussed in our Form 8-K filed on June 22, 2023 and our Annual Report on Form 10-K filed on February 29, 2024, we determined that approximately 2.5 million to 2.7 million of our policyholders' or other customers' personal information, including social security numbers, was exposed to and obtained by the threat actor as a result of the MOVEit Cybersecurity Incident. We do not believe this incident has had or will have a material adverse effect on our business, results of operations or financial condition. However, we could suffer a material adverse effect in the future, especially if the amount of insurance coverage we maintain is not sufficient to cover claims or liabilities from a future incident.
We retain confidential information in our computer systems, and we rely on commercial technologies to maintain the security, integrity and availability of those systems, including computers or mobile devices. Anyone who is able to circumvent our security measures and penetrate our computer systems or misuse authorized access could access, view, misappropriate, alter, delete or disclose any information in the systems, including personal information, personal health information and proprietary business information. Our employees, distribution partners and other vendors use portable computers or mobile devices which may contain similar information to that in our computer systems, and these devices have been and can be lost, stolen or damaged, and therefore subject to the same risks as our other computer systems. In addition, an increasing number of states and foreign countries require that affected parties be notified or other actions be taken (which could involve significant costs to us) if a security breach results in the unlawful disclosure of personal information. We have experienced occasional, actual or attempted breaches of our cybersecurity, although to date, none of these breaches has had a material effect on our business, operations or reputation. Any compromise of the security of our computer systems or those of our partners and third-party service providers that results in the unauthorized disclosure of customer personal information could damage our reputation in the marketplace, deter people from purchasing our products, subject us to regulatory scrutiny and significant civil and criminal liability and require us to incur significant technical, legal and other expenses.
Cybersecurity, data privacy and artificial intelligence risks and uncertainties have come under increased scrutiny in recent years, with various countries, government agencies and insurance regulators introducing and/or passing legislation in an attempt to safeguard personal information from escalating cybersecurity threats and other unknown risks and uncertainties, as well as to ensure the responsible use of artificial intelligence. For additional details, see "Regulation-Other Laws and Regulations-Privacy and cybersecurity." We have implemented internal policies, practices and controls designed to comply with applicable data privacy and security laws. Moreover, artificial intelligence technologies offer numerous potential benefits (e.g., creating or increasing operational efficiencies), but deployment of such technologies also poses certain risks, including that they may be misused, or the models or datasets on which the models are trained may be flawed or otherwise may function in an unexpected manner. Failure, by us or any third-party on which we rely, to comply with these data privacy and data protection laws, regulations and rules may result in enforcement action, litigation, monetary fines or other penalties, which could have a material adverse effect on our business, financial condition and reputation. For additional details on our cybersecurity risk management, strategy and governance, see "Item 1C-Cybersecurity." With respect to artificial intelligence, the relative newness of the technology, the speed at which it is being adopted, and the paucity of artificial intelligence-specific regulations and standards increases these risks.
In addition, unanticipated problems with, or failures of, our disaster recovery systems and business continuity plans could have a material adverse impact on our ability to conduct business and on our results of operations and financial condition, particularly if those problems affect our information technology systems and destroy, lose or otherwise compromise the integrity or availability of valuable data. Furthermore, in the event that a significant number of our employees were unavailable in the event of a disaster or a pandemic, our ability to effectively conduct business could be severely compromised. The failure of our disaster recovery systems and business continuity plans could adversely impact our profitability and our business.