We rely on the reasonably secure processing, storage and transmission of confidential and other sensitive information in our computer systems and networks, and those of our service providers and their vendors. We are subject to various risks and costs associated with the collection, handling, storage and transmission of personally identifiable information and other sensitive information, including those related to compliance with U.S. and foreign data collection and privacy laws and other contractual obligations, as well as those associated with the compromise of our systems processing such information. In the ordinary course of our business, we collect, store a range of data, including our proprietary business information and intellectual property, and personally identifiable information of our employees, our fund investors and other third parties, in our cloud applications and on our networks, as well as our services providers' systems. The secure processing, maintenance and transmission of this information are critical to our operations. We, our service providers and their vendors face various security threats on a regular basis, including ongoing cybersecurity threats to and attacks on our and their information technology infrastructure that are intended to gain access to our proprietary information, destroy data or disable, degrade or sabotage our systems. Cyber-incident techniques change frequently, may not immediately be recognized and can originate from a wide variety of sources. There has been an increase in the frequency, sophistication and ingenuity of the data security threats we and our service providers face, with attacks ranging from those common to businesses generally to those that are more advanced and persistent. Although we and our services providers take protective measures and endeavor to modify them as circumstances warrant, our computer systems, software and networks may be vulnerable to unauthorized access, theft, misuse, computer viruses or other malicious code, including malware, and other events that could have a security impact. We may be the target of more advanced and persistent attacks because, as an alternative asset manager, we hold a significant amount of confidential and sensitive information about, among other things, our fund investors, portfolio companies and potential investments. We may also be exposed to a more significant risk if these acts are taken by state actors. Any of the above cybersecurity threats, fraudulent activities or security breaches suffered by our service providers and their vendors could also put our confidential and sensitive information at risk or cause the shutdown of a service provider on which we rely. We and our employees have been and expect to continue to be the target of fraudulent calls and emails, the subject of impersonations and fraudulent requests for money, including attempts to redirect material payment amounts in a transaction to a fraudulent bank account, and other forms of spam attacks, phishing or other social engineering, ransomware or other events. Cyber-criminals may attempt to redirect payments made at the closings of our investments to unauthorized accounts, which we or our services providers we retain, such as paying agents and escrow agents, may be unable to detect or protect against. The COVID-19 pandemic has exacerbated these risks due to heavier reliance on online communication and the remote working environment, which may be less secure, and there has been a significant increase in hacking attempts by cyber-criminals. The costs related to cyber or other security threats or disruptions may not be fully insured or indemnified by others, including by our service providers. If successful, such attacks and criminal activity could harm our reputation, disrupt our business, cause liability for stolen assets or information and have a material adverse effect on our results of operations, financial condition and cash flow.
We rely heavily on our back office informational technology infrastructure, including our data processing systems, communication lines, and networks. Although we have back-up systems and business-continuation plan in place, our back-up procedures and capabilities in the event of a failure or interruption may not be adequate. Any interruption or failure of our informational technology infrastructure could result in our inability to provide services to our clients, other disruptions of our business, corruption or modifications to our data and fraudulent transfers or requests for transfers of money. Further consequences could include liability for stolen assets or information, increased cybersecurity protection and insurance costs and litigation. We expect that we will need to continue to upgrade and expand our back-up and procedures and capabilities in the future to avoid disruption of, or constraints on, our operations. We may incur significant costs to further upgrade our data processing systems and other operating technology in the future.
Our technology, data and intellectual property and the technology, data and intellectual property of our funds' portfolio companies are also subject to a heightened risk of theft or compromise to the extent that we and our funds' portfolio companies engage in operations outside the United States, particularly in those jurisdictions that do not have comparable levels of protection of proprietary information and assets, such as intellectual property, trademarks, trade secrets, know-how and customer information and records. In addition, we and our funds' portfolio companies may be required to forgo protections or rights to technology, data and intellectual property in order to operate in or access markets in a foreign jurisdiction. Any such direct or indirect loss of rights in these assets could negatively impact us, our funds and their investments.
A significant actual or potential theft, loss, corruption, exposure or fraudulent, unauthorized or accidental use or misuse of investor, employee or other personally identifiable or proprietary business data could occur, as a result of third-party actions, employee malfeasance or otherwise, non-compliance with our contractual or other legal obligations regarding such data or intellectual property or a violation of our privacy and security policies with respect to such data. If such a theft, loss, corruption, use or misuse of data were to occur, it could result in significant remediation and other costs, fines, litigation and regulatory actions against us by (i) the U.S. federal and state governments, (ii) the EU or other jurisdictions, (iii) various regulatory organizations or exchanges and (iv) affected individuals, as well as significant reputational harm.
Cybersecurity has become a top priority for regulators around the world. Many jurisdictions in which we operate have laws and regulations relating to data privacy, cybersecurity and protection of personal information and other sensitive information, including, without limitation the General Data Protection Regulation (Regulation (EU) 2016/679) (the "GDPR") in the EU and the Data Protection Act 2018 in the U.K. (the "U.K. Data Protection Act"), comprehensive privacy laws enacted in California, Colorado and Virginia, the Hong Kong Personal Data (Privacy) Ordinance, the Korean Personal Information Protection Act and related legislation, regulations and orders and the Australian Privacy Act. China and other countries have also passed cybersecurity laws that may impose data sovereignty restrictions and require the localization of certain information. We believe that additional similar laws will be adopted in these and other jurisdictions in the future, further expanding the regulation of data privacy and cybersecurity. Such laws and regulations strengthen the rights of individuals (data subjects), mandate stricter controls over the processing of personal data by both controllers and processors of personal data and impose stricter sanctions with substantial administrative fines and potential claims for damages from data subjects for breach of their rights, among other requirements. Some jurisdictions, including each of the U.S. states as well as the EU through the GDPR and the U.K. through the U.K. Data Protection Act, have also enacted laws requiring companies to notify individuals of data security breaches involving certain types of personal data, which would require heightened escalation and notification processes with associated response plans. We expect to devote resources to comply with evolving cybersecurity and data privacy regulations and to continually monitor and enhance our information security and data privacy procedures and controls as necessary. We or our fund's portfolio companies may incur substantial costs to comply with changes in such laws and regulations and may be unable to adapt to such changes in the necessary timeframe and/or at reasonable cost. Furthermore, if we experience a cybersecurity incident and fail to comply with the applicable laws and regulations, it could result in regulatory investigations and penalties, which could lead to negative publicity and may cause our fund investors and clients to lose confidence in the effectiveness of our security and privacy measures.
The materialization of one or more of these risks could impair the quality of our operations, harm our reputation, negatively impact our businesses and limit our ability to grow.