We rely extensively on information technology to process transactions and manage our business. In the ordinary course of our business, we collect and store sensitive data, including our business information and that of our tenants, clients, vendors and employees on our network. This data is hosted on internal, as well as external, computer systems. Our external systems are hosted by third-party service providers that may have access to such information in connection with providing necessary information technology and security and other business services to us. This information may include personally identifiable information such as social security numbers, banking information and credit card information. We employ a number of measures to prevent, detect and mitigate potential breaches or disclosure of this confidential information. We have established a Cybersecurity Subcommittee of our Audit Committee to review and provide high level guidance on cybersecurity related issues of importance to the Company. We also maintain cyber risk insurance to provide some coverage for certain risks arising out of data and network breaches. While we continue to improve our cybersecurity and take measures to protect our business, we and our third-party service providers may be vulnerable to attacks by hackers (including through malware, ransomware, computer viruses, and email phishing schemes) or breached due to employee error, malfeasance, fire, flood or other physical event, or other disruptions. Any such breach or disruption could compromise the confidential information of our employees, customers and vendors to the extent such information exists on our systems or on the systems of third-party service providers.
Even the most well-protected information, networks, systems and facilities remain potentially vulnerable to security breaches as the techniques used in attempted security breaches evolve and generally are not recognized until launched against a target, and in some cases may not be detected. The risk of a data breach or security failure, particularly through cyber-attacks or cyber-intrusion, has generally increased due to the rise in new technologies, such as ransomware and generative artificial intelligence and other machine learning techniques ("AI"), and the increasing sophistication and activities of the perpetrators of attempted attacks and intrusions, including as a result of the intensification of state-sponsored cybersecurity attacks during periods of geopolitical conflict. The rapid evolution and increased adoption of AI by us and our third-party service providers may also heighten our cybersecurity risks by making cyber-attacks more difficult to detect, contain and mitigate.
Such an incident could result in potential liability or a loss of confidence and legal claims or proceedings; damage our reputation, competitiveness, stock price and long-term value; increase remediation, cybersecurity protection and insurance premium costs; disrupt and affect our business operations; or have material adverse effects on our business. Further, we may be required to expend significant additional resources to continue to enhance information security measures and internal processes and procedures or to investigate and remediate any information security vulnerabilities. There can be no assurance that our security measures taken to manage the risk of a security breach, cyber-attack or disruption will be effective or that attempted security breaches, cyber-attacks or disruptions would not be successful or damaging.
As new technologies, including tools that harness AI, rapidly develop and become accessible, the use of such new technologies by us will present additional known and unknown risks, including, among others, the risk that confidential information may be stolen, misappropriated or disclosed and the risk that we may rely on incorrect, unclear or biased outputs generated by such technologies, any of which could have an adverse impact on us and our business.