Information technology, communication networks, and related systems are essential to the operation of our business. We use these systems to manage our resident and vendor relationships, internal communications, accounting and record-keeping systems, and many other key aspects of our business. Our operations rely on the secure processing, storage,and transmission of confidential and other information in our computer systems and networks, which also depend on the strength of our procedures and the effectiveness of our internal controls. Information security risks have generally increased in recent years due to the rise in new technologies and the increased sophistication and activities of perpetrators of cyberattacks.
Despite system redundancy, risk transfer, insurance, indemnification, the implementation of security measures, our required teammate awareness training, and the existence of a disaster recovery plan for our internal information technology systems, our systems, and systems maintained by third-party vendors with which we do business, are vulnerable to damage from any number of sources. We face risks associated with energy blackouts, natural disasters, terrorism, war, telecommunication failures, and cyberattacks and intrusions, such as computer viruses, malware, attachments to emails, intrusion, and unauthorized access, including from persons inside our organization or from persons outside our organization with access to our systems. We expend financial resources to protect against threats and cyberattacks and may be required to expend additional financial and other resources to address disruptions caused by cyberattacks. Although we make efforts to maintain the security and integrity of our systems and have implemented various measures to manage the risk of a security breach or disruption, there can be no assurance that our security efforts and measures will be effective or that attempted security breaches or disruptions would not be successful or damaging. Any compromise of our security could also result in a violation of applicable privacy and other laws, significant legal and financial exposure, damage to our reputation, loss or misuse of the information (which may be confidential, proprietary, or commercially sensitive in nature), and a loss of confidence in our security measures, which could harm our business. Additionally, if our information systems suffer severe damage, disruption or shutdown, we could experience delays in our financial results and we may lose revenue as a result of our inability to collect payments from residents.
We also are subject to laws, rules, and regulations in the United States, such as the California Consumer Protection Act, or CCPA (which became effective on January 1, 2020), relating to the collection, use, and security of employee and other data. Evolving compliance and operational requirements under the CCPA and the privacy and data security laws of other jurisdictions in which we operate impose significant costs that are likely to increase over time. Our failure to comply with laws, rules, and regulations related to privacy and data protection could harm our business or reputation.