Our business is highly dependent on the security, controls and efficacy of our information systems, and the information systems of our customers, third parties, the financial services industry and financial data aggregators with whom we interact, on whom we rely or who have access to our customers' personal or account information. We rely on effective access management and the secure collection, processing, maintenance, use, sharing, dissemination and disposition of information in our and our third parties' information systems. Our cybersecurity risk and exposure remains heightened because of, among other things, our prominent size and scale, high-profile brand, geographic footprint and international presence and role in the financial services industry and the broader economy. The proliferation of third-party financial data aggregators and emerging technologies, including our and our third parties' use of automation, artificial intelligence (AI) and robotics, increases our cybersecurity risks and exposure.
We, our employees, customers, regulators and third parties are ongoing targets of an increasing number of cybersecurity threats and cyberattacks. The tactics, techniques and procedures used in cyberattacks are pervasive, sophisticated and designed to evade security measures, including computer viruses, malicious or destructive code (such as ransomware), social engineering (including phishing, vishing and smishing), denial of service or information or other security breach tactics that have and in the future could result in disruptions to our businesses and operations and the loss of funds, including from attempts to defraud us and/or our customers, and impact the confidentiality, integrity or availability of our information, including intellectual property, or that of our employees, customers and third parties. Cyberattacks are carried out on a worldwide scale and by a growing number of actors, including organized crime groups, hackers, terrorist organizations, extremist parties, hostile foreign governments, state-sponsored actors, activists, disgruntled employees and other persons or entities, including those involved in corporate espionage.
Cybersecurity threats and the tactics, techniques and procedures used in cyberattacks change, develop and evolve rapidly, including from emerging technologies, such as AI, machine learning and quantum computing. Despite substantial efforts to protect the integrity and resilience of our information systems and implement controls, processes, policies, employee training and other protective measures, we are not able to anticipate and/or detect all cybersecurity threats and incidents and/or develop or implement effective preventive or defensive measures designed to prevent, respond to or mitigate all cybersecurity threats and incidents. Internal access management failures could impact the confidentiality, integrity or availability of data. Additionally, the failure of our employees to exercise sound judgment and vigilance when targeted with social engineering or other cyberattacks increases our vulnerability.Our risk from and exposure to cybersecurity threats and incidents, information and security breaches and technology failures continues to increase due to the acceptance and use of digital banking and other digital products and services, including mobile banking products, and reliance on remote access tools and technology, which have increased our reliance on virtual or digital interactions and a larger number of access points to our information systems that must be secured, and results in greater amounts of information being available for access. Greater demand on our information systems and security tools and processes will likely continue.We also face significant third-party technology, cybersecurity and operational risks relating to the large number of customers and third parties with whom we do business, the financial services industry, upon whom we rely to facilitate or enable our business activities or upon whom our customers rely, including the secure collection, processing, maintenance, use, sharing, dissemination and disposition of customer and other sensitive information, providers of products and/or services, financial counterparties, financial data aggregators, financial intermediaries, such as clearing agents, exchanges and clearing houses, regulators, providers of outsourced infrastructure, such as internet access, cloud service providers and electrical power, and retailers for whom we process transactions. Such third-party information systems extend beyond our security and control systems, and such third parties have varying levels of security and cybersecurity resources, expertise, safeguards, controls and capabilities. Threat actors may actively seek to exploit security and cybersecurity weaknesses at our third parties and the relationships of our third parties with us may increase the risk that they are targeted by the same threats we face, and such third parties may be less prepared for such threats. We are also at additional risk resulting from critical third-party information security and open-source software vulnerabilities. We must rely on our third parties to adequately detect and promptly report cybersecurity incidents, and their failure to do so could adversely affect our ability to report or respond to cybersecurity incidents effectively or timely.Due to increasing consolidation, interdependence and complexity of financial entities and technology and information systems, a cybersecurity threat or incident, information or security breach or technology failure that significantly exposes, degrades, destroys or compromises the information systems or information of one or more financial entities or third parties could adversely impact us and increase the risk of operational failure and loss, as disparate systems need to be integrated, often on an accelerated basis. Similarly, any cybersecurity threat or incident, information or security breach or technology failure that significantly exposes, degrades, destroys or compromises our information systems or information could adversely impact third parties and the critical infrastructure of the financial services industry, thereby creating additional risk for us.Cybersecurity incidents or information or security breaches could persist for an extended period of time before being detected, and it often takes additional time to determine the scope, extent, amount and type of impact, including information altered, destroyed or otherwise compromised, following which the measures to recover and restore to a business-as-usual state may be difficult to assess. We have spent and expect to continue to spend significant resources to modify and enhance management failures could impact the confidentiality, integrity or availability of data. Additionally, the failure of our employees to exercise sound judgment and vigilance when targeted with social engineering or other cyberattacks increases our vulnerability.
Our risk from and exposure to cybersecurity threats and incidents, information and security breaches and technology failures continues to increase due to the acceptance and use of digital banking and other digital products and services, including mobile banking products, and reliance on remote access tools and technology, which have increased our reliance on virtual or digital interactions and a larger number of access points to our information systems that must be secured, and results in greater amounts of information being available for access. Greater demand on our information systems and security tools and processes will likely continue.
We also face significant third-party technology, cybersecurity and operational risks relating to the large number of customers and third parties with whom we do business, the financial services industry, upon whom we rely to facilitate or enable our business activities or upon whom our customers rely, including the secure collection, processing, maintenance, use, sharing, dissemination and disposition of customer and other sensitive information, providers of products and/or services, financial counterparties, financial data aggregators, financial intermediaries, such as clearing agents, exchanges and clearing houses, regulators, providers of outsourced infrastructure, such as internet access, cloud service providers and electrical power, and retailers for whom we process transactions. Such third-party information systems extend beyond our security and control systems, and such third parties have varying levels of security and cybersecurity resources, expertise, safeguards, controls and capabilities. Threat actors may actively seek to exploit security and cybersecurity weaknesses at our third parties and the relationships of our third parties with us may increase the risk that they are targeted by the same threats we face, and such third parties may be less prepared for such threats. We are also at additional risk resulting from critical third-party information security and open-source software vulnerabilities. We must rely on our third parties to adequately detect and promptly report cybersecurity incidents, and their failure to do so could adversely affect our ability to report or respond to cybersecurity incidents effectively or timely.
Due to increasing consolidation, interdependence and complexity of financial entities and technology and information systems, a cybersecurity threat or incident, information or security breach or technology failure that significantly exposes, degrades, destroys or compromises the information systems or information of one or more financial entities or third parties could adversely impact us and increase the risk of operational failure and loss, as disparate systems need to be integrated, often on an accelerated basis. Similarly, any cybersecurity threat or incident, information or security breach or technology failure that significantly exposes, degrades, destroys or compromises our information systems or information could adversely impact third parties and the critical infrastructure of the financial services industry, thereby creating additional risk for us.
Cybersecurity incidents or information or security breaches could persist for an extended period of time before being detected, and it often takes additional time to determine the scope, extent, amount and type of impact, including information altered, destroyed or otherwise compromised, following which the measures to recover and restore to a business-as-usual state may be difficult to assess. We have spent and expect to continue to spend significant resources to modify and enhance our protective measures, investigate and remediate software and network vulnerabilities, and defend against, detect and respond to cybersecurity threats and incidents whether specific to us, a third party, the industry or businesses in general, and enhance our capabilities to respond and recover.While we and our third parties have experienced cybersecurity incidents, information and security breaches and technology failures, as well as adverse impacts from such events, including as described in this risk factor, we have not experienced material losses or other material consequences relating to cybersecurity incidents, information or security breaches or technology failures, whether directed at us or our third parties. However, we expect to continue to experience such events and impacts with increased frequency and severity due to the evolving threat environment, and there can be no assurance that future cybersecurity incidents, information and security breaches and technology failures, including as a result of cybersecurity incidents, information and security breaches and technology failures experienced by our third parties, will not have a material adverse impact on us, including our businesses, results of operations and financial condition.Any future cybersecurity incident, information or security breach or technology failure suffered by us or our third parties could result in disruption to our day-to-day business activities, an inability to effect transactions, execute trades, service our customers, manage our exposure to risk, expand our businesses, detect and prevent fraudulent or unauthorized transactions, including transactions impacting our customers, maintain information systems access and business operations and customer services, in the U.S. and/or globally. Additionally, we could experience the loss of customers and business opportunities, the withdrawal of customer deposits, the misappropriation, alteration or destruction of our or our third parties' intellectual property or confidential information, the unauthorized access to or temporary or permanent loss or theft of personally identifiable information, including of our employees and customers, significant lost revenue, losses and claims brought by third parties, violations of applicable privacy, cybersecurity and other laws, rules and regulations, litigation exposure, economic sanctions, enforcement actions, government fines, penalties or intervention and other negative consequences. Although we maintain cyber insurance, there can be no assurance that liabilities or losses we may incur will be covered under such policies or that the amount of insurance will be adequate. In addition, in the case of any cybersecurity incident, information or security breach or technology failure arising from third-party systems impacting us, any third-party indemnification may not be applicable or sufficient to address the impact of such cybersecurity incidents, information or security breaches or technology failures, including monetary losses of the Corporation. The occurrence of any of the events described above could adversely impact our businesses, results of operations, liquidity and financial condition, as well as cause reputational harm, whether such events are actual or perceived.Failure to satisfy our obligations as servicer for residential mortgage securitizations, loans owned by other entities and other related losses could adversely impact our reputation, servicing costs or results of operations.We service mortgage loans on behalf of third-party securitization vehicles and other investors. If we commit a material breach of our obligations as servicer or master servicer, we may be subject to termination if the breach is not cured within a specified period of time following notice, which could cause us to lose servicing income. We may also have liability for any failure by us, as a servicer or master servicer, for our protective measures, investigate and remediate software and network vulnerabilities, and defend against, detect and respond to cybersecurity threats and incidents whether specific to us, a third party, the industry or businesses in general, and enhance our capabilities to respond and recover.
While we and our third parties have experienced cybersecurity incidents, information and security breaches and technology failures, as well as adverse impacts from such events, including as described in this risk factor, we have not experienced material losses or other material consequences relating to cybersecurity incidents, information or security breaches or technology failures, whether directed at us or our third parties. However, we expect to continue to experience such events and impacts with increased frequency and severity due to the evolving threat environment, and there can be no assurance that future cybersecurity incidents, information and security breaches and technology failures, including as a result of cybersecurity incidents, information and security breaches and technology failures experienced by our third parties, will not have a material adverse impact on us, including our businesses, results of operations and financial condition.
Any future cybersecurity incident, information or security breach or technology failure suffered by us or our third parties could result in disruption to our day-to-day business activities, an inability to effect transactions, execute trades, service our customers, manage our exposure to risk, expand our businesses, detect and prevent fraudulent or unauthorized transactions, including transactions impacting our customers, maintain information systems access and business operations and customer services, in the U.S. and/or globally. Additionally, we could experience the loss of customers and business opportunities, the withdrawal of customer deposits, the misappropriation, alteration or destruction of our or our third parties' intellectual property or confidential information, the unauthorized access to or temporary or permanent loss or theft of personally identifiable information, including of our employees and customers, significant lost revenue, losses and claims brought by third parties, violations of applicable privacy, cybersecurity and other laws, rules and regulations, litigation exposure, economic sanctions, enforcement actions, government fines, penalties or intervention and other negative consequences. Although we maintain cyber insurance, there can be no assurance that liabilities or losses we may incur will be covered under such policies or that the amount of insurance will be adequate. In addition, in the case of any cybersecurity incident, information or security breach or technology failure arising from third-party systems impacting us, any third-party indemnification may not be applicable or sufficient to address the impact of such cybersecurity incidents, information or security breaches or technology failures, including monetary losses of the Corporation. The occurrence of any of the events described above could adversely impact our businesses, results of operations, liquidity and financial condition, as well as cause reputational harm, whether such events are actual or perceived.