We use software and related technologies throughout our business and also utilize third-party vendors who use software and related technologies to provide services to us and the Hennessy Funds. We are dependent on the effectiveness of our information and cybersecurity policies, procedures, and capabilities we maintain to protect our computer and telecommunications systems and the data that resides on or is transmitted through them, including data provided by third parties that is significant to our business. An information security incident, such as a cyber-attack involving a phishing scam, business email compromise, malware, or ransomware attack, or an internally caused incident or disruption, such as misuse or a failure to control access to sensitive systems, could materially interrupt our business operations or cause disclosure or modification of sensitive or confidential investor or competitive information. Moreover, our growing reliance on mobile and cloud technology and any failure by mobile technology and cloud service providers to adequately safeguard their systems and prevent cyber-attacks could disrupt our operations and result in misappropriation, corruption, or loss of personal, confidential, or proprietary information or third-party data. Additionally, although we take precautions to password protect and encrypt our laptops and other mobile electronic hardware, if such hardware is stolen, misplaced, or left unattended, it may become vulnerable to hacking or other unauthorized use, creating a possible security risk and resulting in potentially costly actions. Furthermore, there is a risk that encryption and other protective measures may be circumvented, particularly to the extent that new computing technologies increase the speed and computing power available.
The financial services industry has been the subject of cyber-attacks involving the dissemination, theft, and destruction of corporate information or other assets as a result of failure to follow procedures by employees or as a result of actions by third parties, including actions by terrorist organizations and nation state actors. Although we have implemented policies and controls to prevent and address potential data breaches, inadvertent disclosures, increasingly sophisticated cyber-attacks, and cyber-related fraud, there can be no assurance that any of these measures will prove effective. Because the techniques used to obtain unauthorized access, disable, or degrade service or sabotage systems change frequently and often are not recognized until launched against a target, we may be unable to anticipate these techniques, to implement adequate preventative measures, or to address them until they are discovered. In addition, a successful cyber-attack may persist for an extended period of time before being detected, and it may take a considerable amount of time for an investigation to be completed and the severity and potential impact to be known. While such an investigation is ongoing, we may not necessarily know the extent of the harm or how best to remediate it, certain errors or actions could be repeated or compounded before they are discovered and remediated, and communication to the public, regulators, shareholders, and investors in the Hennessy Funds may be inaccurate, any or all of which could further increase the costs and consequences of an information security incident.
If material information security incidents occur in the future, we could experience financial losses, business disruptions, liability to the Hennessy Funds and their investors, regulatory intervention, or reputational damage, any of which could be material and could materially adversely affect our business, results of operations, and financial condition. We also may be required to expend significant additional resources to strengthen our protective measures or to investigate and remediate vulnerabilities or other exposures. In addition, our cybersecurity insurance may not cover all losses and damages from such events and our ability to maintain or obtain sufficient insurance coverage in the future may be limited.
Finally, cybersecurity and data privacy are priorities for many regulators worldwide, and many jurisdictions have enacted laws and regulations in these areas. Compliance with evolving privacy laws and cybersecurity regulations has resulted, and may continue to result, in additional costs of compliance or potential litigation exposure. While we strive to comply with applicable laws and regulations, any failure to do so could result in regulatory investigations, penalties, or negative publicity, any of which could materially adversely affect our business, results of operations, and financial condition.