Trustmark is dependent upon communications and information systems to conduct business as such systems are used to manage virtually all aspects of Trustmark's business. Trustmark's operations rely on the secure processing, storage and transmission of confidential and other information within its computer systems and networks. Any failure, interruption or breach in security of these systems could result in significant disruption to Trustmark's operations. Trustmark has taken protective measures, which are continuously monitored and modified as warranted; however, Trustmark's computer systems, software and networks may fail to operate properly or become disabled or damaged as a result of a number of factors, including events that are wholly or partially beyond Trustmark's control. There could be sudden increases in customer transaction volume; electrical, telecommunications or other major physical infrastructure outages; natural disasters; and events arising from local or larger scale political or social matters, including terrorist acts.
Further, Trustmark's operational and security systems and infrastructure may be vulnerable to breaches and cybersecurity-related incidents including, but not limited to, attempts to access information, including customer and company information, malicious code, computer viruses and denial of service attacks that could result in unauthorized access, theft, misuse, loss, release or destruction of data (including confidential customer information), account takeovers, unavailability of service or other events. These types of threats may derive from human error, fraud or malice on the part of external or internal parties, or may result from accidental technological failure. If one or more of these events were to occur, Trustmark's or its customers' confidential and other information would be jeopardized, or such an event could cause interruptions or malfunctions in Trustmark's or its customers' or counterparties' operations. Any failures related to upgrades and maintenance of Trustmark's technology and information systems could further increase its information and system security risk. Trustmark's increased use of cloud and other technologies, such as remote work technologies, also increases its risk of being subject to a cyber-attack. The risk of a security breach or disruption, particularly through cyber-attack or cyber intrusion, has increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. Trustmark may be required to expend significant additional resources to modify its protective measures or to investigate and remediate vulnerabilities or other exposures in its computer systems and networks, and Trustmark may be subject to litigation and financial losses that are either not insured against or not fully covered through any insurance maintained by Trustmark. Any such losses, which may be difficult to detect, could adversely affect Trustmark's financial condition or results of operations. In addition, the occurrence of such a loss could expose Trustmark to reputational risk, the loss of customer business and additional regulatory scrutiny.
Security breaches in Trustmark's internet and mobile banking activities (myTrustmark) could further expose Trustmark to possible liability and reputational risk. Any compromise in security could deter customers from using Trustmark's internet and mobile banking services that involve the transmission of confidential information. Trustmark relies on standard internet security systems to provide the security and authentication necessary to effect secure transmission of data. However, these precautions may not protect Trustmark's systems from compromise or breaches of security, which could result in significant legal liability and significant damage to Trustmark's reputation and business.
Trustmark relies upon certain third-party vendors to provide products and services necessary to maintain day-to-day operations. Accordingly, Trustmark's operations are exposed to the risk that these vendors might not perform in accordance with applicable contractual arrangements or service level agreements or that the security of the third-party vendors' computer systems, software and networks may be vulnerable to compromises that could impact information system security. Trustmark maintains a system of policies and procedures designed to monitor vendor risks. While Trustmark believes these policies and procedures effectively mitigate risk, the failure of an external vendor to perform in accordance with applicable contractual arrangements or service level agreements or any compromise in the security of an external vendor's information systems could be disruptive to Trustmark's operations, which could have a material adverse effect on its financial condition or results of operations.
As of the date of this Annual Report on Form 10-K, Trustmark has seen no material adverse impact on its business or operations from cyber-attacks or events. Trustmark's customers, employees and third parties that it does business with have been, and will continue to be, targeted by parties using fraudulent e-mails and other communications in attempts to misappropriate passwords, bank account information or other personal information or to introduce viruses or other malware programs to its information systems, the information systems of its merchants or third-party service providers and/or its customers' personal devices, which are beyond Trustmark's security control systems. Though Trustmark endeavors to mitigate these threats through product improvements, use of encryption and authentication technology and customer and employee education, such cyber-attacks against Trustmark, its merchants, third-party service providers and customers remain a serious issue and have been successful in the past.
Although Trustmark makes significant efforts to maintain the security and integrity of its information systems and has implemented various measures to manage the risks of a security breach or disruption, there can be no assurance that its security efforts and measures will be effective or that attempted security breaches or disruptions would not be successful or damaging. Even well protected information, networks, systems and facilities remain potentially vulnerable to attempted security breaches or disruptions because the techniques used in such attempts are constantly evolving and generally are not recognized until launched against a target, and in some cases are designed not to be detected and, in fact, may not be detected. Accordingly, Trustmark may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, and thus it is virtually impossible for Trustmark to entirely mitigate this risk. Furthermore, in the event of a cyber-attack, Trustmark may be delayed in identifying or responding to the attack, which could increase the negative impact of the cyber-attack on its business, financial condition and results of operations. A security breach or other significant disruption of Trustmark's information systems or those related to its customers, merchants or third-party vendors, including as a result of cyber-attacks, could (i) disrupt the proper functioning of its networks and systems and therefore its operations and/or those of its customers; (ii) result in the unauthorized access to, and destruction, loss, theft, misappropriation or release of confidential, sensitive or otherwise valuable information of Trustmark or its customers; (iii) result in a violation of applicable privacy, data breach and other laws, subjecting Trustmark to additional regulatory scrutiny and exposing it to civil litigation, enforcement actions, governmental fines and possible financial liability; (iv) require significant management attention and resources to remedy the damages that result; or (v) harm Trustmark's reputation or cause a decrease in the number of customers that choose to do business with Trustmark. The occurrence of any of the foregoing could have a material adverse effect on Trustmark's business, financial condition and results of operations.