We depend heavily on computer systems, mathematical algorithms and data to perform necessary business functions. There are threats that could impact our ability to protect our data and systems; if the threats materialize, they could impact confidentiality, integrity and availability:
- Confidentiality - protecting our data from disclosure to unauthorized parties - Integrity - ensuring data is not changed accidentally or without authorization and is accurate - Availability - ensuring our data and systems are accessible to meet our business needs
We collect, use, store or transmit a large amount of confidential, proprietary and other information (including personal information of customers, claimants or employees) in connection with the operation of our business. Systems are subject to increased cyberattacks and unauthorized access, such as physical and electronic break-ins or unauthorized tampering.
We constantly defend against threats to our data and systems, including malware and computer virus attacks, unauthorized access, system failures and disruptions. We have experienced breaches of our data and systems, although to date none of these breaches has had a material effect on our business, operations or reputation. Events like these jeopardize the information processed and stored in, and transmitted through, our computer systems and networks and otherwise cause interruptions or malfunctions in our operations, which could result in damage to our reputation, financial losses, litigation, increased costs, regulatory penalties or customer dissatisfaction.These risks may increase in the future as threats become more sophisticated and we continue to expand internet and mobile strategies, develop additional remote connectivity solutions to serve our employees and customers, develop and expand products and services designed to protect customers' digital footprint, and build and maintain an integrated digital enterprise.Our increased use of third-party services (e.g., cloud technology and software as a service) can make it more difficult to identify and respond to cyberattacks in any of the above situations. Although we may review and assess third-party vendor cyber security controls, our efforts may not be successful in preventing or mitigating the effects of such events. Third parties to whom we outsource certain functions are also subject to cybersecurity risks. Personal information is subject to an increasing number of federal, state, local and international laws and regulations regarding privacy and data security, as well as contractual commitments. Any failure or perceived failure by us to comply with such obligations may result in governmental enforcement actions and fines, litigation or public statements against us by consumer advocacy groups or others and could cause our employees and customers to lose trust in us, which could have an adverse effect on our reputation and business. Our integrated operational risk and return management processes and practices may not be sufficient to timely detect and mitigate operational risks, including those posed by third-party service providers, that could have an adverse effect on our reputation and business. See the Regulation section, Privacy Regulation and Data Security, for additional information.The occurrence of a disaster or event that results in the shut-down, disruption, degradation or unavailability of one or more of our systems or facilities, unanticipated problems with our disaster recovery processes, or a support failure from external providers, could have an adverse effect on our ability to conduct business and on our results of operations and financial condition, particularly if those events affect our computer-based data processing, transmission, storage, and retrieval systems or destroy data. If a significant number of employees were unavailable or unable to access our systems in the
We constantly defend against threats to our data and systems, including malware and computer virus attacks, unauthorized access, system failures and disruptions. We have experienced breaches of our data and systems, although to date none of these breaches has had a material effect on our business, operations or reputation. Events like these jeopardize the information processed and stored in, and transmitted through, our computer systems and networks and otherwise cause interruptions or malfunctions in our operations, which could result in damage to our reputation, financial losses, litigation, increased costs, regulatory penalties or customer dissatisfaction.
These risks may increase in the future as threats become more sophisticated and we continue to expand internet and mobile strategies, develop additional remote connectivity solutions to serve our employees and customers, develop and expand products and services designed to protect customers' digital footprint, and build and maintain an integrated digital enterprise.
Our increased use of third-party services (e.g., cloud technology and software as a service) can make it more difficult to identify and respond to cyberattacks in any of the above situations. Although we may review and assess third-party vendor cyber security controls, our efforts may not be successful in preventing or mitigating the effects of such events. Third parties to whom we outsource certain functions are also subject to cybersecurity risks.
Personal information is subject to an increasing number of federal, state, local and international laws and regulations regarding privacy and data security, as well as contractual commitments. Any failure or perceived failure by us to comply with such obligations may result in governmental enforcement actions and fines, litigation or public statements against us by consumer advocacy groups or others and could cause our employees and customers to lose trust in us, which could have an adverse effect on our reputation and business.
Our integrated operational risk and return management processes and practices may not be sufficient to timely detect and mitigate operational risks, including those posed by third-party service providers, that could have an adverse effect on our reputation and business.
See the Regulation section, Privacy Regulation and Data Security, for additional information.
The occurrence of a disaster or event that results in the shut-down, disruption, degradation or unavailability of one or more of our systems or facilities, unanticipated problems with our disaster recovery processes, or a support failure from external providers, could have an adverse effect on our ability to conduct business and on our results of operations and financial condition, particularly if those events affect our computer-based data processing, transmission, storage, and retrieval systems or destroy data. If a significant number of employees were unavailable or unable to access our systems in the event of a disaster, our ability to effectively conduct business could be severely compromised.Losses from changing climate and weather conditions may adversely affect our financial condition, profitability or cash flowsClimate change affects the occurrence of certain natural events, such as increasing the frequency or severity of wind, tornado, hailstorm and thunderstorm events due to increased convection in the atmosphere. There could also be more frequent wildfires in certain geographies, more flooding and the potential for increased severity of hurricanes. As a result, incurred losses from such events and the demand, price and availability of reinsurance coverages for automobile and homeowners insurance may be affected.Climate change may also impact insurability by impairing our ability to identify and quantify potential hazards that will result in losses and offer our customers products at an affordable price. Our investment portfolio is also subject to the effects of climate change as economic shifts alter the return dynamic of long-term investments and increase valuation risk.Due to significant variability associated with future changing climate conditions, we are unable to predict the impact climate change will have on our businesses.Our efforts to meet evolving environmental, social, and governance standards may not meet stakeholders' expectationsSome of our existing or potential investors, customers, employees, regulators, and other stakeholders evaluate our business practices according to a variety of environmental, social and governance ("ESG") standards and expectations, including those related to climate change, inclusive diversity and equity, data privacy, and the well-being of our employees. Some regulators have proposed or adopted, or may propose or adopt, pro- or anti-ESG rules or standards applicable to our business.Our business practices and disclosures are evaluated against ESG standards which are continually evolving and not always well defined or readily measurable today. ESG-related expectations may also reflect contrasting or conflicting values or agendas. Our practices may not change in the particular ways or at the rate stakeholders expect. We may fail to meet our commitments or targets. Our policies and processes to evaluate and manage ESG priorities in coordination with other business priorities may not prove completely effective or fully satisfy our stakeholders. Customers and potential customers may choose not to do business with us based on our ESG practices and related policies and actions. We may face adverse regulatory, investor, media, or public scrutiny leading to business, reputational, or legal challenges.
event of a disaster, our ability to effectively conduct business could be severely compromised.