We rely on information technology ("IT") systems and networks in our operations which are provided and maintained by third-party contractors. The availability, capacity, reliability and security of these IT systems could be subject to network disruptions caused by a variety of malicious sources, including computer viruses, security breaches, cyber-attacks and theft, as well as network and/or hardware disruptions resulting from unexpected failures such as human error, software or hardware defects, natural disasters, fire, flood or power loss. Our operations also depend on the timely maintenance, upgrade and replacement of networks, equipment, IT systems and software, as well as pre-emptive expenses to mitigate the risks of failures.
The ability of the IT function to support our business in the event of any such failure and the ability to recover key systems from unexpected interruptions cannot be fully tested. There is a risk that if such an event were to occur, our response may not be adequate to immediately address all of the potential repercussions of the incident. In the event of a disaster affecting our head office, key systems may be unavailable for a number of days, leading to inability to perform some business processes in a timely manner. The failure of our IT systems or a component thereof could, depending on the nature, materially impact our financial condition, results of operations, reputation and share price.
Unauthorized access to our IT systems as a result of cyber-attacks could lead to exposure, corruption or loss of confidential information, and disruption to our communications, operations, business activities or our competitive position. Further, disruption of critical IT services, or breaches of information security, could expose us to financial losses and regulatory or legal action. Our risk and exposure to these matters cannot be fully mitigated because of, among other things, the evolving nature of these threats. As a result, cyber- security and the continued development and enhancement of controls, processes and practices designed to protect systems, computers, software, data and networks from attack, damage or unauthorized access remain a priority.
We apply technical and process controls in line with industry-accepted standards to protect information, assets and systems. Although these measures are robust, they cannot possibly prevent all types of cyber-threat. There is no assurance that we will not suffer losses associated with cyber-security breaches in the future, and we may be required to expend significant additional resources to investigate, mitigate and remediate any potential vulnerabilities. As cyber-threats continue to evolve, we may be required to expend additional resources to continue to modify or enhance protective measures or to investigate and remediate any security vulnerabilities.