Information technology systems are critical to our business. Our business requires us to collect, process, transmit and store significant amounts of confidential information regarding our customers, employees and our own business, operations, plans and business strategies. We use various technology systems to manage our customer relationships, general ledger, securities investments, deposits, and loans. Our computer systems, data management and internal processes, as well as those of third parties, are integral to our performance. Our operational risks include the risk of malfeasance by employees or persons outside our company, errors relating to transaction processing and technology, systems failures or interruptions, breaches of our internal control systems and compliance requirements, and business continuation and disaster recovery. There have been increasing efforts by third parties to breach data security at financial institutions. Such attacks include computer viruses, malicious or destructive code, phishing attacks, denial of service or information or other security breaches that could result in the unauthorized release, gathering, monitoring, misuse, loss or destruction of confidential, proprietary and other information, damages to systems, or other material disruptions to network access or business operations. Although we take protective measures and believe that we have not experienced any of the data breaches described above, the security of our computer systems, software, and networks may be vulnerable to breaches, unauthorized access, misuse, computer viruses, or other malicious code and cyber-attacks that could have an impact on information security. Because the techniques used to cause security breaches change frequently, we may be unable to proactively address these techniques or to implement adequate preventative measures.
In the event of a breakdown in our internal control systems, improper operation of systems or improper employee actions, or a breach of our security systems, including if confidential or proprietary information were to be mishandled, misused or lost, we could suffer financial loss, loss of customers and damage to our reputation, and face regulatory action or civil litigation. Any of these events could have a material adverse effect on our financial condition and results of operations. Insurance coverage may not be available for such losses, or where available, such losses may exceed insurance limits.