As part of its business, the Company collects, processes, and transmits sensitive and confidential information about its clients and employees, as well as proprietary information about its business. The Company has policies and procedures pursuant to which it takes numerous security measures to prevent cyberattacks of various kinds as well as fraudulent and inadvertent activity by persons who have been granted access to such sensitive or confidential information. Nevertheless, the Company's systems, like all technology systems, remain vulnerable to unauthorized access, which can result in theft or corruption of information. In addition, the Company shares information with third party vendors upon whom it relies for various functions. The systems of such third parties also are vulnerable to cyber threats. Unauthorized access can come from unrelated third parties through the internet, from access to hardware removed from the Company's or those third parties' premises, or from employees acting intentionally or inadvertently.
Cybersecurity incidents can involve, among other things: (i) deliberate attacks designed to corrupt the Company's information systems and make them unusable by the Company to operate its business; (ii) theft of information used by the perpetrators for financial and other gain; or (iii) inadvertent releases of information by employees or third parties with whom the Company does business.
Cyberattacks that corrupt the Company's information systems and make them unusable could impair its ability to trade securities in its clients' accounts. Corruption of the systems of the Company's third-party vendors could impact the Company to the same extent as corruption of its own systems. If information about the Company's employees or clients is intentionally stolen or inadvertently made public, that information could be used to commit identity theft, obtain credit in an employee's or client's name, or steal from an employee or client. If information about the Company's business is obtained by unauthorized persons, whether through intentional attacks or inadvertent releases of information, it could be used to harm its competitive position.
Whether information is corrupted, stolen, or inadvertently disclosed, and regardless of the type and nature of the information (e.g., proprietary information about the Company's business or personal information about clients or employees), it could have various adverse impacts on, and be materially harmful to, the Company, including the following:
- The Company's reputation could be harmed, resulting in the loss of clients, vendors, and employees or making payments or concessions to such persons to maintain its relationships with them;- The Company's inability to operate its business fully, even if temporarily, and thus, fulfill contracts with clients or vendors, could result in termination of contracts and loss of revenue;- Harm suffered by clients or vendors whose contracts have been breached, or by clients, vendors, or employees whose information is compromised, could result in costly litigation against us;- The Company's need to focus attention on remediation of a cybersecurity issue could take its attention away from the operation of its business, resulting in lost revenue;- The Company could incur costs to repair systems made inoperable by a cyberattack and to make changes to its systems to reduce future cyber threats. Those changes could include, among other things, obtaining additional technologies as well as employing additional personnel and training employees;- The interruption of the Company's business or theft of proprietary information could harm its ability to compete; and - Any losses that the Company may be responsible to bear may not be covered by insurance.
Any of the above potential impacts of a cybersecurity incident could have a material adverse effect on the Company's business, financial condition, and results of operations.