We rely on information technology and systems, including the Internet and cloud-based infrastructures, commercially available software and our internally developed applications, to process, transmit, store and safeguard information and to manage or support a variety of our business processes, including financial transactions and maintenance of records, which may include personal identifying information of employees, tenants, borrowers and guarantors and lease data. If we experience material failures, inadequacies or interruptions or security breaches of our information technology, we could incur material costs and losses. Further, third party vendors could experience similar events with respect to their information technology and systems that impact the products and services they provide to us or our clients. We rely on commercially available systems, software, tools and monitoring, as well as our internally developed applications and internal procedures and personnel, to provide security for processing, transmitting, storing and safeguarding confidential tenant, customer, borrower, guarantor and vendor information, such as personally identifiable information related to our employees and others and information regarding our and our clients' financial accounts. We take various actions, and we incur significant costs, to maintain and protect the operation and security of our information technology and systems, including the data maintained in those systems. However, it is possible that these measures will not prevent the systems' improper functioning or a compromise in security, such as in the event of a cyberattack or the improper disclosure of personally identifiable information. Security breaches, computer viruses,attacks by hackers, online fraud schemes and similar breaches can create significant system disruptions, shutdowns, fraudulent transfer of assets or unauthorized disclosure of confidential information. The risk of a security breach or disruption, particularly through cyberattack or cyber intrusion, including by computer hackers, foreign governments and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased.
The cybersecurity risks to us, our clients and third party vendors are heightened by, among other things, the evolving nature of the threats faced, advances in computer capabilities, new discoveries in the field of cryptography and new and increasingly sophisticated methods used to perpetrate illegal or fraudulent activities against us, including cyberattacks, email or wire fraud and other attacks exploiting security vulnerabilities in our or other third parties' information technology networks and systems or operations. The COVID-19 pandemic may adversely impact our ability to maintain the security, proper function and availability of our information technology and systems since a continued period of remote working by our employees or individuals with whom we work outside of our organization could strain our technology resources and introduce operational risk, including heightened cybersecurity risk. Remote working environments may be less secure and more susceptible to hacking attacks, including phishing and social engineering attempts that seek to exploit the COVID-19 pandemic. Although most of our office-based employees and those of our clients have returned to the office, the ongoing transition to in person work arrangements, or any return to remote work in light of the resurgence of the COVID-19 pandemic may result in the continuation of many of the risks of offsite work arrangements. In addition, our data security, data privacy, investor reporting and business continuity processes could be impacted by a third party's inability to perform due to the COVID-19 pandemic or by the failure of, or attack on, their information systems and technology. Any failure to maintain the security, proper function and availability of our information technology and systems, or certain third party vendors' failure to similarly protect their information technology and systems that are relevant to our or our clients' operations, or to safeguard our or our clients' business processes, assets and information could result in financial losses, interrupt our operations, damage our reputation, cause us to be in default of material contracts and subject us to liability claims or regulatory penalties, any of which could materially and adversely affect us.