We rely on computer systems, hardware, software, technology infrastructure and online sites and networks for both internal and external operations that are critical to our business (collectively, "IT Systems"). We own and manage some of these IT Systems but also rely on the third parties that provide services to the Company (collectively, "Service Providers") for a range of IT Systems and related products and services, including but not limited to cloud computing services. And we collect, maintain and process confidential, sensitive, and proprietary information about investors, tenants, partners, businesses, our employees, and others, including personal information (collectively, "Confidential Information").
We face numerous and evolving cybersecurity risks that threaten the confidentiality, integrity and availability of our IT Systems and Confidential Information. The risk of a cyber incident has generally increased as the number, intensity and sophistication of attempted attacks have increased globally, especially given the use of increasingly sophisticated, automated and evolving tools and techniques – including artificial intelligence. Cyber incidents may be carried out by a wide range of actors, including opportunistic hackers, organized criminal groups, hacktivists, foreign actors, or other third parties, and may occur through diverse attack vectors, such as social engineering/phishing, malware (including ransomware), malfeasance by insiders, human or technological error, and as a result of bugs, misconfigurations or exploited vulnerabilities in software or hardware. Techniques used in cyber incidents evolve frequently, may originate from less regulated and remote areas of the world and be difficult to detect and may not be recognized until launched against a target. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, making it impossible for us to entirely eliminate this risk. For example, unauthorized parties, whether within or outside the Company, may disrupt or gain access to our IT Systems, or those of third parties with whom we do business, through human error, misfeasance, fraud, trickery, or other forms of deceit, including break-ins, use of stolen credentials, social engineering, phishing, computer viruses or other malicious codes, and similar means of unauthorized and destructive tampering.
As our reliance on technology increases, so do the risks posed to our IT Systems, both internal and external, and our Confidential Information. Key risks that could directly result from the occurrence of a cyber incident are theft of assets; operational interruption; regulatory enforcement, lawsuits and other legal proceedings; damage to our relationships with our tenants; compromise of our IT Systems, and exposure of Confidential Information. A significant or prolonged cyber incident could damage our business or reputation, cause a loss of revenue, have an adverse effect on tenant relations, cause an unintended or unauthorized public disclosure, or lead to the misappropriation or unauthorized disclosure of Confidential Information, any of which could result in significant costs, expenses and other adverse consequences. Our security measures may not be sufficient to protect our IT Systems and the Confidential Information we maintain due to attackers using tools and techniques that are designed to circumvent controls, avoid detection and remove or obfuscate forensic evidence.
As have many companies, our Service Providers have been impacted by security incidents in the past and will likely continue to experience security incidents of varying degrees. We have limited ability to control or monitor the cybersecurity practices of our Service Providers, particularly those that provide shared or cloud-based services to multiple customers. A cybersecurity incident affecting such a Service Provider could impact us even if our own systems are not directly compromised.
We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have had a material adverse effect on us. However, future cybersecurity incidents, whether involving us or our Service Providers, could be material to our business, financial condition or results of operations. While we do not believe these incidents have had a material impact to date, as our reliance on technology increases, so do the risks of a security incident. The Service Providers that provide cloud services and store our information are critical to our operations and could experience security incidents resulting in downtime, data breaches, data loss, or operational shutdown. The occurrence of any of the foregoing risks could have a material adverse effect on us.
In addition, our processing of personal information subjects us to various federal, state and local laws, regulations and industry standards governing the collection, use, storage, sharing, transmission and other processing of personal information. The regulatory environment surrounding information security and privacy is increasingly demanding, with frequent imposition of new and changing requirements that are subject to differing interpretations. Any failure or perceived failure by us to comply with laws, regulations, policies or regulatory guidance relating to privacy or data security may result in governmental investigations and enforcement actions, litigation (including class actions), fines and penalties or adverse publicity and could cause our investors to lose trust in us, which could have an adverse effect on our reputation as well as our business, financial condition and results of operations.
There can be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our systems and information. While we maintain insurance coverage for certain cybersecurity risks, such coverage may be insufficient to cover all losses or may not be available on acceptable terms in the future.