As a company with a remote-friendly operating model, our business is highly dependent on our information technology and telecommunications systems, including our underwriting systems. We rely on these systems to interact with brokers and insureds, to underwrite business, to prepare policies and process premiums, to perform actuarial and other modeling functions, to process claims and make claims payments and to prepare internal and external financial statements. We also rely on our information and telecommunications systems for employees to interact with each other within the company, as most employees work on a remote basis a majority of their time as opposed to in physical offices. Some of these systems may include or rely on third-party systems provided by third party service providers and/or not located on our premises or under our control.
We and our service providers face numerous and evolving cybersecurity risks that threaten the confidentiality, integrity and availability of systems and confidential information, including vulnerabilities that could be exploited by threat actors in commercial software that is integrated into our (or our suppliers' or service providers') IT systems, products or services. The risk of a data security breach or a disruption has generally increased in frequency, intensity and sophistication. Techniques used to compromise or sabotage systems change frequently, may originate from less regulated and remote areas of the world and be difficult to detect and generally are not recognized until launched against a target. Events such as natural catastrophes, terrorist attacks, industrial accidents, computer viruses, ransomware, a security breach by an unauthorized person, employee error, malfeasance, faulty password management or other irregularity and other cyber-attacks may cause our systems to fail or be inaccessible for extended periods of time. We have implemented management, operational, and technical security controls designed to identify, protect, detect, respond to and recover from breaches of security, such as business contingency plans and other reasonable plans to protect our systems, whether housed internally or through third-party cloud services. In addition, while we generally monitor vendor risk, including the security and stability of our critical vendors, we may fail to properly assess and understand the risks and costs involved in the third-party relationships. However, we cannot guarantee that these measures will be effective and sustained or repeated system failures or service denials could severely limit our ability to write and process new and renewal business, provide customer service, pay claims in a timely manner or otherwise operate in the ordinary course of business. Even if the vulnerabilities that may lead to the foregoing are identified, we may be unable to adequately investigate or remediate due to attackers using tools and techniques that are designed to circumvent controls, avoid detection and remove or obfuscate forensic evidence.
As have many companies, we, and our third-party service providers, have been impacted by breaches in the past and will likely continue to experience cybersecurity incidents of varying degrees. Any such event may result in operational disruptions as well as unauthorized access to, the disclosure of, or loss of our proprietary information or our customers' data and information, which in turn may result in legal claims, regulatory scrutiny and liability, reputational damage, the incurrence of costs to eliminate or mitigate further exposure, an increase in our annual cybersecurity insurance premiums, the loss of customers or affiliated advisors, or other damage to our business. In addition, the trend toward general public notification of such incidents could exacerbate the harm to our business, financial condition and results of operations. Even if we successfully protect our technology infrastructure and the confidentiality of sensitive data, we could suffer harm to our business and reputation if attempted security breaches are publicized. We cannot be certain that advances in criminal capabilities, discovery of new vulnerabilities,attempts to exploit vulnerabilities in our systems, data thefts, physical system or network break-ins, inappropriate access, or other developments will not compromise or breach the technology or other security measures protecting the networks and systems used in connection with our business.
In addition, as part of our normal business activities, we handle information related to individuals including, but not limited to, employees, claimants, individual third-party brokers or agents and individual vendors. As such, we are subject to various federal, state and local laws, regulations and industry standards. The regulatory environment surrounding information security and privacy is increasingly demanding, with frequent imposition of new and changing requirements that are subject to differing interpretations. In the United States, there are numerous federal and state data privacy and security laws, rules and regulations governing the collection, use, storage, sharing, transmission and other processing of personal information, including federal and state data privacy laws, data breach notification laws and consumer protection laws.
Any failure or perceived failure by us to comply with laws, regulations, policies or regulatory guidance relating to privacy or data security may result in governmental investigations and enforcement actions, litigation, fines and penalties or adverse publicity, and could cause our customers and consumers to lose trust in us, which could have an adverse effect on our reputation and business.