We rely on information technology networks and systems, including the Internet, to process, transmit and store confidential information, and to manage or support a variety of business processes, including financial transactions and records, intellectual property, proprietary business information, and personal information of our employees, contractors and customers, such as tenant and lease data (collectively, "Confidential Information"). We also rely on third-party vendors for information technology and services, including commercially available systems, software, tools and monitoring to provide security for the processing, transmission and storage of Confidential Information. Our information technology systems and those of our third-party service providers, strategic partners and other contractors or consultants are vulnerable to attack and damage or interruption from computer viruses and malware (e.g. ransomware), misconfigurations, bugs or other vulnerabilities, malicious code, natural disasters, terrorism, war, telecommunication and electrical failures, hacking, cyberattacks, phishing attacks and other social engineering schemes, employee theft or misuse, human error fraud, denial or degradation of service attacks, and sophisticated nation-state and nation-state-supported actors. Although we have taken steps to protect the security of our information technology systems and Confidential Information, it is possible that our cybersecurity risk management program and processes, including our policies, safety and security measures will not be fully implemented, complied with or able to prevent such systems' improper functioning or damage, or the improper accessing or disclosure of Confidential Information, from such security breaches, disruptions, and shutdowns. The costs associated with the investigation, remediation and potential notification of such breaches to counter-parties and data subjects could be material.
We and certain of our service providers are, from time to time, subject to cyberattacks and security incidents. While to date, we do not believe that we have experienced any significant system failure, accident or security breach, this risk has generally increased as the number, intensity and sophistication of such breaches and attempted breaches from around the world have increased. Furthermore, because the technologies used to obtain unauthorized access to, or to sabotage or disrupt, systems change frequently and often are not recognized until launched against a target, we may be unable to anticipate these techniques or implement adequate preventative measures. We may also experience security breaches that may remain undetected for an extended period. Even if identified, we may be unable to adequately investigate or remediate incidents or breaches due to attackers increasingly using tools and techniques that are designed to circumvent controls, to avoid detection, and to remove or obfuscate forensic evidence. Any failure to maintain the proper functioning, confidentiality, security and availability of our or our third-party service providers' information technology systems or our Confidential Information could interrupt our operations, damage our reputation, divert significant management attention and resources to remedy any damages that result, subject us to liability and claims or regulatory investigations and enforcement actions, which could result in, among other things, fines and penalties, and have a material adverse effect on our business, financial condition and results of operations. Further, our insurance coverage may not be sufficient to cover the financial, legal, business or reputational losses that may result from an interruption or breach of our systems.