The Bank relies heavily on internal and outsourced digital technologies, communications, and information systems to conduct its business. As our reliance on technology systems increases, the potential risks of technology-related operation interruptions in our customer relationship management, general ledger, deposit, loan, or other systems or the occurrence of cyber incidents also increases. Cyber incidents can result from deliberate attacks or unintentional events including (i) gaining unauthorized access to digital systems for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruptions; (ii) causing denial-of-service attacks on websites; or (iii) intelligence gathering and social engineering aimed at obtaining information. The occurrence of operational interruption, cyber incident, or a deficiency in the cyber security of our technology systems (internal or outsourced) could negatively impact our financial condition or results of operations.
Information security risks have generally increased in recent years because of the proliferation of new technologies, the use of the Internet and telecommunications technologies to conduct financial and other transactions and the increased sophistication and activities of perpetrators of cyber-attacks and mobile phishing directed at our customers and our personnel. Mobile phishing, a means for identity thieves to obtain sensitive personal information through fraudulent e-mail, text or voice mail, is an emerging threat targeting the customers of financial entities. A failure in or breach of our operational or information security systems, or those of our third-party service providers, as a result of cyber-attacks or information security breaches or due to employee error, malfeasance or other disruptions could adversely affect our business, result in the disclosure or misuse of confidential or proprietary information, damage our reputation, increase our costs and/or cause losses.
We have policies and procedures expressly designed to prevent or limit the effect of a failure, interruption, or security breach of our systems and maintain cyber security insurance. However, such policies, procedures, or insurance may prove insufficient to prevent, repel, or mitigate a cyber incident. Significant interruptions to our business from technology issues could result in expensive remediation efforts and distraction of management. Although we have not experienced any material losses related to a technology-related operational interruption or cyber-attack, there can be no assurance that such failures, interruptions, or security breaches will not occur in the future or, if they do occur, that the impact will not be substantial.
The occurrence of any failures, interruptions, or security breaches of our technology systems could damage our reputation, result in a loss of customer business, result in the unauthorized release, gathering, monitoring, misuse, loss, or destruction of proprietary information, subject us to additional regulatory scrutiny, or expose us to civil litigation and possible financial liability, any of which could have a material adverse effect on our financial condition, results of operations, or stock price. As cyber threats continue to evolve, we may also be required to spend significant additional resources to continue to modify or enhance our protective measures or to investigate and remediate any information security vulnerabilities.