We rely extensively on computer systems to manage our business, and our business is at risk from and may be impacted by cybersecurity attacks and security breaches. These could include attempts to gain unauthorized access to our computer systems, data and the data of third parties retained within our systems through malware, computer viruses, attachments to e-mails, persons inside our Company or persons with access to systems inside our Company, and other significant disruptions of our information technology networks and related systems. Our business is also at risk from and may be impacted by our computer systems malfunctioning or being subject of a significant disruption.
The risk of a cybersecurity breach or disruption, particularly through a cyber-incident, including by computer hackers, foreign governments and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. Although we employ a number of measures to prevent, detect and mitigate these threats, even the most well-protected information, networks, systems and facilities remain potentially vulnerable because the techniques used in such attempted security breaches evolve and generally are not recognized until launched against a target, and in some cases are designed to not be detected and, in fact, may not be detected. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, and thus it is impossible for us to entirely mitigate this risk.
Moreover, security events or disruptions impacting our vendors, sub-processors and service providers could also impact our data and operations or the data of third parties retained within our system via unauthorized access to information or disruption of services.
Our computer systems are essential to the operation of our business and our ability to perform day-to-day operations and, in some cases, may be critical to the operations of certain of our tenants. A successful cybersecurity attack or other disruption of our computer systems could, among other things: (i) disrupt the proper functioning of our networks and systems, and therefore our operations and/or those of certain of our tenants; (ii) result in the unauthorized access to, and destruction, loss, theft, misappropriation or release of proprietary, confidential, sensitive or otherwise valuable information of ours or others, which others could use to compete against us or for disruptive, destructive or otherwise harmful purposes and outcomes; (iii) result in misstated financial reports, violations of loan covenants and/or missed reporting deadlines; (iv) result in our inability to properly monitor our compliance with the rules and regulations regarding our qualification as a REIT; (v) require significant management attention and resources to remedy any damages that result; (vi) subject us to claims for breach of contract, damages, credits, penalties or termination of leases or other agreements; (vii) subject us to legal liability; or (viii) damage our reputation among our tenants, investors and associates.