We rely heavily on communications and information systems to conduct our business. Any failure, interruption or breach in security of these systems could result in failures or disruptions in our customer-relationship management, general ledger, deposit, loan and other systems. While we have policies and procedures designed to prevent or limit the effect of the failure, interruption or security breach of our information systems, there can be no assurance that any such failures, interruptions or security breaches will not occur; or, if they do occur, that they will be adequately addressed. The occurrence of any failures, interruptions or security breaches of our information systems could disrupt our business, increase our costs, result in the disclosure of confidential client information, damage our reputation, result in a loss of customer business, subject us to additional regulatory scrutiny or expose us to civil litigation and possible financial liability; any of which could have a material adverse effect on our financial condition and results of operations.
Our computer systems, software and networks have been and will continue to be vulnerable to unauthorized access, loss or destruction of data (including confidential client information), account takeovers, unavailability of service, computer viruses or other malicious code, cyber-attacks and other events. These threats may derive from human error, fraud or malice on the part of employees or third parties, or may result from accidental technological failure. Information security risks for financial institutions such as ours have generally increased in recent years in part because of the proliferation of new technologies, the use of the Internet and digital technologies to conduct financial transactions, and the increased sophistication and activities of organized crime, hackers, terrorists, activists and other external parties. Some of our operations rely on the secure processing, transmission and storage of confidential information in our computer systems and networks. Our business relies on our digital technologies, computer and email systems, software and networks to conduct its operations. In addition, to access our products and services, our customers may use personal smartphones, tablets, personal computers and other mobile devices that are beyond our control systems. Although we have information security procedures and controls in place, our technologies, systems, networks and our customers' devices may become the target of cyber-attacks or information security breaches that could result in the unauthorized release, gathering, monitoring, misuse, loss or destruction of our or our customers' confidential, proprietary and other information, or otherwise disrupt our or our customers' or other third parties' business operations.
Although we maintain safeguards to protect against these risks, we have suffered losses in the past and there can be no assurance that we will not suffer losses in the future that may be material in amount or nature.