In the ordinary course of business, we rely on electronic communications and information systems to conduct our business and to store sensitive data, including financial information regarding customers. Our electronic communications and information systems infrastructure, as well as the systems infrastructures of the vendors we use to meet our data processing and communication needs, could be susceptible to cyber-attacks, such as denial of service attacks, hacking, terrorist activities or identity theft. Financial services institutions and companies engaged in data processing have reported breaches in the security of their websites or other systems, some of which have involved sophisticated and targeted attacks intended to obtain unauthorized access to confidential information, destroy data, disable or degrade service or sabotage systems, often through the introduction of computer viruses or malware, cyber-attacks and other means. Denial of service attacks have been launched against a number of large financial services institutions. Hacking and identity theft risks, in particular, could cause serious reputational harm. Cyber threats are rapidly evolving and we may not be able to anticipate or prevent all such attacks. Although to date we have not experienced any material losses relating to cyber-attacks or other information security breaches, there can be no assurance that we will not suffer such losses in the future. No matter how well designed or implemented our controls are, we will not be able to anticipate all security breaches of these types, and we may not be able to implement effective preventive measures against such security breaches in a timely manner. A failure or circumvention of our security systems could have a material adverse effect on our business operations and financial condition.
We regularly assess and test our security systems and disaster preparedness, including back-up systems, but the risks are substantially escalating. As a result, cyber-security and the continued enhancement of our controls and processes to protect our systems, data and networks from attacks, unauthorized access or significant damage remain a priority. Accordingly, we may be required to expend additional resources to enhance our protective measures or to investigate and remediate any information security vulnerabilities or exposures. Any breach of our system security could result in disruption of our operations, unauthorized access to confidential customer information, significant regulatory costs, litigation exposure and other possible damages, loss or liability. Such costs or losses could exceed the amount of available insurance coverage, if any, and would adversely affect our earnings. Also, any failure to prevent a security breach or to quickly and effectively deal with such a breach could negatively impact customer confidence, damaging our reputation and undermining our ability to attract and keep customers.