As a financial institution, our operations rely heavily on the secure data processing, storage and transmission of confidential and other information on our computer systems and networks, as well as those of third-party service providers. This may include sensitive business and personal information about our customers. Maintaining the confidentiality of this information is critical to our business. We also maintain important internal company data such as personal information about our employees and information regarding our operations. Our collection of such customer and company data is subject to extensive regulation and oversight.
Cloud technologies, including third-party cloud infrastructure, are also critical to the operation of our systems, and our reliance on cloud technologies continues to grow. Any failure, interruption or breach in security or operational integrity of these systems could result in failures or disruptions in our online banking system, customer relationship management, general ledger, deposit and loan servicing and other systems. The security and integrity of our systems and the technology we use, including services and solutions provided by third-party vendors, could be threatened by a variety of interruptions or information security breaches, including those caused by computer hacking, cyber-attacks, electronic fraudulent activity or attempted theft of financial assets or information. The increased use of mobile and cloud technologies, as well as the increase in remote work, can heighten these and other operational risks. We may fail to promptly identify or adequately address any such failures, interruptions or security breaches when they occur. While we have certain protective policies and procedures in place, the nature and sophistication of the threats continue to evolve. The increasing sophistication of cyber criminals and their evolving attempts to breach networks present increasing risk of a security breach and other data incidents. We may be required to expend significant additional resources in the future to modify and enhance our protective measures.
The nature of our business may make it an attractive target and potentially vulnerable to cyber-attacks, computer viruses, physical or electronic break-ins or similar disruptions. The technology-based platform we use processes sensitive data from our borrowers, depositors and other customers. While we have taken steps to protect confidential and proprietary information that we have access to, our security measures and the security measures employed by the owners of the technology in the platforms and services that we use can be compromised. Data incidents including those involving phishing, hacking, misdirected communications and other inadvertent disclosures, and other incidents results in unauthorized access to and/or acquisition of confidential and proprietary information, including personal information, can and do occur. Accidental or willful security breaches or other unauthorized access to our systems can cause confidential customer, borrower, employee, vendor, partner or investor information to be stolen and used for criminal purposes. Security breaches or unauthorized access to confidential information can also expose us to liability related to the loss of the information, time-consuming and expensive litigation, and negative publicity. When security measures are breached because of third-party action, employee error, malfeasance or otherwise, or if design flaws in the technology-based platform that we use are exposed and exploited, our relationships with customers, borrowers, employees, vendors, partners and investors could be severely damaged, and we could incur significant liability.
Because techniques used to sabotage or obtain unauthorized access to systems change frequently and generally are not recognized until they are launched against a target, we and our partners and collaborators may be unable to anticipate these techniques or to implement adequate preventative measures. In addition, federal regulators and many federal and state laws and regulations require companies to notify individuals of data security breaches involving their personal information. Certain security breaches and other data incidents also require notice to regulators, the media, and/or other parties. These mandatory disclosures regarding a security breach and other data incidents are costly to implement and often lead to widespread negative publicity, which may cause customers, borrowers, employees, vendors, partners or investors to lose confidence in the effectiveness of our data security measures. Any security breach or other data incident, whether actual or perceived, would harm our reputation and could cause us to lose customers, borrowers, employees, vendors, partners, or investors, and could adversely affect our business and operations.
Additionally, we face the risk of operational disruption, failure, termination or capacity constraints of any of the third parties that facilitate our business activities, including exchanges, clearing agents, clearing houses or other financial intermediaries. Such parties could also be the source of an attack on, or breach of, our operational systems. Any failures, interruptions or security breaches, including with respect to our information systems or our vendors' information systems, or any perception that our security measures are inadequate, could negatively impact our operations, damage our reputation, result in a loss of customer business, result in a violation of privacy or other laws, and expose us to civil litigation, enforcement actions by governmental agencies, regulatory fines or other damages or losses, including those not covered by insurance.
Our business is dependent on the successful and uninterrupted functioning of our information technology and telecommunications systems and third-party providers. The failure of these systems, or the termination of a third-party software license or service agreement on which any of these systems is based, could interrupt our operations. Because our information technology and telecommunications systems interface with and depend on third-party systems, we could experience service denials if demand for such services exceeds capacity or such third-party systems fail or experience interruptions. If significant, sustained or repeated, a system failure or service denial could compromise our ability to operate effectively, damage our reputation, result in a loss of customer business, and/or subject us to additional regulatory scrutiny and possible financial liability, any of which could materially adversely affect our business, financial condition, results of operations and prospects, as well as the value of our common stock.