We use technology to process, store, retrieve, evaluate and utilize customer and company data and information. Our information technology and telecommunications systems, in turn, interface with and rely upon third-party systems. We and our third party vendors must be able to access our systems to provide insurance quotes, process premium payments, make changes to existing policies, file and pay claims, administer mutual funds, provide customer support, manage our investment portfolios, report on financial results and perform other necessary business functions. Systems failures or outages could compromise our ability to perform these business functions in a timely manner, which could harm our ability to conduct business and hurt our relationships with our business partners and customers. In the event of a disaster such as a natural catastrophe, a pandemic, civil unrest, an industrial accident, a cyber-attack, a blackout, a terrorist attack (including conventional, nuclear, biological, chemical or radiological) or war, systems upon which we rely may be inaccessible to our employees, customers or business partners for an extended period of time. Even if our employees and business partners are able to report to work, they may be unable to perform their duties for an extended period of time if our data or systems used to conduct our business are disabled or destroyed. Our systems have been, and will likely continue to be, subject to viruses or other malicious codes, unauthorized access, cyber-attacks (such as ransomware and denial of service), cyber frauds or other computer related penetrations. The frequency and sophistication of such threats continue to increase as well. While, to date, The Hartford is not aware of having experienced a material breach of our cyber security systems, administrative, internal accounting and technical controls as well as other preventive actions may be insufficient to prevent physical and electronic break-ins, denial of service, cyber-attacks, business email compromises, ransomware or other security breaches to our systems or those of third parties with whom we do business. Such an event could compromise our confidential information as well as that of our clients and third parties, impede or interrupt our business operations and result in other negative consequences, including remediation costs, loss of revenue, additional regulatory scrutiny and litigation and reputational damage. In addition, we routinely transmit to third parties personal, confidential and proprietary information, which may be related to employees and customers, by email and other electronic means, along with receiving and storing such information on our systems. Although we attempt to protect privileged and confidential information, we may be unable to secure the information in all events, especially with clients, vendors, service providers, counterparties and other third parties who may not have appropriate controls to protect confidential information. Our businesses must comply with regulations to control the privacy of customer, employee and third party data, and state, federal and international regulations regarding data privacy, including the European Union General Data Protection Regulation and California Consumer Privacy Act, are becoming increasingly more onerous. A misuse or mishandling of confidential or proprietary information could result in legal liability, regulatory action and reputational harm. Third parties, including third party administrators and cloud-based systems, are also subject to cyber-attacks and breaches of confidential information, along with the other risks outlined above, any one of which may result in our incurring substantial costs and other negative consequences, including a material adverse effect on our business, reputation, financial condition, results of operations and liquidity. While we maintain cyber liability insurance that provides both third party liability and first party insurance coverages, our insurance may not be sufficient to protect against all loss.