We use information technology systems, infrastructure and networks and other operational systems to store, retrieve, evaluate and use customer, employee and company data and information. Our business is highly dependent on our ability to access these systems and networks to perform necessary business functions. In the event of a natural disaster, unauthorized access, a terrorist attack, a major cyber attack or other disruption, our systems, networks, and data may be inaccessible to our employees, customers or business partners for an extended period of time, and we may be unable to meet our business obligations and regulatory requirements for an extended period of time if our data or systems are disabled, manipulated, destroyed or otherwise compromised. Additionally, some of our technology systems are older, legacy-type systems that are less efficient and require an ongoing commitment of significant resources to maintain or upgrade. Some of these systems cannot be fully protected because of the inability to implement the latest security patches. Supply chain disruptions or delays could prevent us from maintaining and implementing changes, updates and upgrades to our systems and networks in a timely manner or at all. System and network failures or outages could compromise our ability to perform business functions in a timely manner, which could harm our ability to conduct business, hurt our relationships with our business partners and customers and expose us to legal claims as well as regulatory investigations and sanctions, any of which could have a material adverse effect on our business, results of operations, financial condition and liquidity.
Some of these technology systems also rely upon third-party systems and services, which themselves may rely on the systems and services of other third parties. Problems caused by, or occurring in relation to, our third-party providers' systems and services, including those resulting from breakdowns or other disruptions in information technology services provided by our third-party providers and the other third-parties on which they rely, our inability to acquire third-party services on commercially acceptable terms, failure of a third-party provider to perform as anticipated or in compliance with applicable laws or regulations, inability of a third-party provider to provide the required volumes of services or our third-party providers experiencing cyberattacks or data breaches, could materially and adversely affect our business, results of operations, financial condition and liquidity.
Like other global companies, the systems and networks we maintain and third-party systems and networks we use have in the past been, and may in the future be, subject to or targets of unauthorized or fraudulent access, including physical or electronic break-ins or unauthorized tampering, as well as attempted cybersecurity threats such as "denial of service" attacks, phishing, automated attacks, and other disruptive attacks, including ransomware. Cyber threats are constantly evolving and the techniques used in these attacks change, develop and evolve rapidly, including the use of emerging technologies, such as broader forms of artificial intelligence and quantum computing by nation state threat actors and criminal organizations. The new cyber risks introduced by these changes in technology require us to devote significant attention to identification, assessment and analysis of the risks and implementation of corresponding preventative measures. Additionally, the frequency and sophistication of such threats continue to increase and often become further heightened in connection with geopolitical tensions. Also, like other global companies, we have an increasing challenge of retaining and attracting highly qualified personnel to assist us in combatting these security threats.
There is no assurance that our cybersecurity measures, including information security and technology policies and standards, administrative, technical and physical controls and other actions by us or contracted third-parties designed as preventative, will provide fully effective protection from threats to our data, systems and networks, including malware and computer virus attacks, ransomware, unauthorized access, business e-mail compromise, misuse, denial-of-service attacks, system failures and other disruptions. AIG maintains insurance to cover operational risks, such as cyber risk and technology outages, but this insurance may not cover all costs associated with the consequences of information systems or personal, confidential or proprietary information being compromised. In the case of a successful ransomware attack in which our data and information systems are compromised and applicable restore control processes to restore access are not effective, our information could be held hostage until a ransom, which may be significant, is paid. In some cases, such a compromise may not be immediately detected which may make it difficult to restore critical services, mitigate damage to assets and maintain the integrity and security of data including our policyholder, employee, agent, and other confidential information processed through our systems and networks.
Additionally, since we rely heavily on information technology and systems (which increasingly will include the use of artificial intelligence) and on the integrity and timeliness of data to run our businesses and service our customers, any such security event and resulting compromise of systems or data may impede or interrupt our business operations and our ability to service our customers, and otherwise may materially and adversely affect our business, results of operations, financial condition and liquidity.
There can be no assurance that any actions taken by us to evaluate and enhance our information security and technology systems and processes, including third-party systems and services on which we rely, as well as changes designed to update and enhance our protective measures to address new threats, will decrease the risk of a system or process failure or may create a gap in the associated security measures during the change period. Any such system or process failure or security measures gap could materially and adversely affect our business, results of operations, financial condition and liquidity.
We routinely transmit, receive and store personal, confidential and proprietary information by secured email and other electronic means. Although we attempt to keep such information confidential and secure, we may be unable to do so in all events, especially with clients, vendors, service providers, counterparties and other third parties who may not have or use appropriate controls to protect personal, confidential or proprietary information. Failure to secure or appropriately handle personal, confidential or proprietary information could cause a loss of data or compromised data integrity, give rise to remediation or other expenses, expose us to liability under U.S. and international laws and regulations, and subject us to litigation, investigations, sanctions, and regulatory and law enforcement action, and result in reputational harm and loss of business, which could have a material adverse effect on our business, results of operations, financial condition and liquidity.
Furthermore, certain of our businesses are subject to compliance with laws and regulations enacted by U.S. federal and state governments, the EU or other jurisdictions or enacted by various regulatory organizations or exchanges relating to the privacy and security of the information of clients, employees or others. The variety of applicable privacy and information security laws and regulations exposes us to heightened regulatory scrutiny, requires us to incur significant technical, legal and other expenses in an effort to ensure and maintain compliance and will continue to impact our business in the future by increasing legal, operational and compliance costs. While we have taken steps to comply with privacy and information security laws, we cannot guarantee that our efforts will meet the evolving standards imposed by data protection authorities. If we are found not to be in compliance with these privacy and security laws and regulations, we may be subject to additional potential private consumer, business partner or securities litigation, regulatory inquiries, and governmental investigations and proceedings, including class-actions. Any such developments may damage our reputation and subject us to material fines and other monetary penalties and damages, divert management's time and attention, and lead to enhanced regulatory oversight, any of which could have a material adverse effect on our business, results of operations, financial condition and liquidity. Additionally, we expect that developments in privacy and cybersecurity worldwide will increase the financial and reputational implications following a significant breach of our or our third-party suppliers' information technology systems. For additional information on data protection and cybersecurity regulations, see Item 1. Business – Regulation – Privacy, Data Protection, Cybersecurity and Artificial Intelligence Requirements, and Part II, Item 7. MD&A – Enterprise Risk Management – Operational Risk Management – Cybersecurity Risk.