We face cybersecurity risks and risks associated with security breaches or disruptions, such as through physical or electronic break-ins, cyber-attacks or cyber intrusions over the Internet, malware, computer viruses, attachments to emails, social engineering and phishing schemes or persons inside our organization. The risk of a security breach or disruption, particularly through cyber-attacks or cyber intrusions, including by computer hackers, nation-state affiliated actors, and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. These incidents may result in disruption of our operations, delays or interruptions to our ability to meet tenant needs, material harm to our financial condition, cash flows and the market price of our common shares, misappropriation of assets, compromise or corruption of confidential information collected in the course of conducting our business, liability for stolen information or assets, increased cybersecurity protection and insurance costs, regulatory enforcement, litigation, inability to access or rely upon critical business records and damage to our stakeholder relationships. These risks require continuous and likely increasing attention and other resources from us to, among other actions, identify and quantify these risks, upgrade and expand our technologies, systems and processes to adequately address them and provide periodic training for our employees and contractors to assist them in detecting phishing, malware and other schemes. Such attention diverts time and other resources from other activities and there is no assurance that our efforts will be effective. There can be no assurance that our security efforts and measures will be effective or that attempted security breaches or disruptions would not be successful or damaging. Even the most well protected information, networks, systems and facilities remain potentially vulnerable because the techniques used in such attempted security breaches evolve and generally are not recognized until launched against a target, and in some cases, are designed to not be detected and, in fact, may not be detected. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, and thus it is impossible for us to entirely mitigate this risk. Additionally, we rely on third-party service providers in our conduct of day-to-day property management, leasing and other activities at our properties and we can provide no assurance that the networks and systems that our third-party vendors have established or used will be effective.
In the normal course of business, we and our service providers (including service providers engaged in providing property management, leasing, accounting and/or payroll services) collect and retain certain personal information provided by our tenants, employees and vendors. We also rely extensively on computer systems to process transactions and manage our business. We can provide no assurance that the data security measures designed to protect confidential information on our systems established by us and our service providers will be able to prevent unauthorized access to this personal information. We maintain cyber liability insurance; however, this insurance may not be sufficient to cover the financial, legal, business, or reputational losses that may result from an interruption or breach of our systems. Some of our employees also work remotely, which could introduce additional cybersecurity risks. There can be no assurance that our efforts to maintain the security and integrity of the information we and our service providers collect and our and their computer systems will be effective or that attempted security breaches or disruptions would not be successful or damaging with the potential for disruption in our operations, material harm to our financial condition, cash flows and the market price of our common shares, increased cybersecurity protection and insurance costs, regulatory enforcement, litigation and damage to our stakeholder relationships.