We rely on information technology networks, enterprise applications, and other information systems to process, transmit, and store electronic information, and to manage or support a variety of business processes, including financial transactions and records, to maintain personal identifying information and tenant and lease data, and to operate building management systems. We utilize software and cloud-based technology from third-party service providers, on whom our information systems depend. We rely on commercially available systems, software, tools, and monitoring to provide security for the processing, transmission, and storage of confidential tenant and customer data, including individually identifiable information relating to financial accounts, as well as building access, security, and operations. Although we have taken steps to protect the security of our information systems, with multiple layers of controls around the data maintained in those systems, it is possible that our safety and security measures will not prevent the systems' improper functioning or damage, or the improper access of systems or disclosure of personally identifiable information such as in the event of cyber-attacks or other cybersecurity incidents.
Furthermore, because our operators as well as other third-party service providers with whom we and they do business (including vendors, software creators and cloud solution and cybersecurity providers) also rely on the Internet, information technology networks, enterprise applications, systems, and software, some of our data may be vulnerable to cybersecurity incidents or cybersecurity threats involving our operators and third parties with whom we or they do business. We do not control the cybersecurity systems and protocols put in place by our operators or other third parties, and such parties may have limited indemnification obligations to us, which could cause us to be negatively impacted as a result.
Cybersecurity incidents and cybersecurity threats affecting our or our operators' or other third party providers' information systems, including those caused by physical or electronic break-ins, computer viruses, malware, worms, attacks by hackers or foreign governments, ransomware attacks, disruptions from unauthorized access and tampering, including through social engineering such as phishing or vishing attacks, coordinated denial-of-service attacks, and similar breaches, could result in, among other things: (i) system disruptions; (ii) shutdowns; (iii) unauthorized access to or disclosure of confidential information, including as a result of impersonation of authorized users or manipulated communications; (iv) misappropriation of our or our business partners' proprietary or confidential information; (v) breach of our legal, regulatory, or contractual obligations; (vi) inability to access or rely upon critical business records or systems; or (vii) other delays in our operations. In some cases, it may be difficult to anticipate or immediately detect such cybersecurity threats and cybersecurity incidents and the damage they cause. The risk of cybersecurity incidents and cybersecurity threats has generally increased as the number, intensity, and sophistication of attacks and intrusions affecting companies generally have increased, and we have seen a significant increase in cyber phishing attacks. The risk of security breaches has also increased under our hybrid work model. We may be required to expend significant financial resources to detect, protect against or remediate such cybersecurity incidents or cybersecurity threats. In addition, our technology infrastructure and information systems are vulnerable to damage or interruption from natural disasters, power loss, and telecommunications failures. Any failure to adequately train employees or to maintain proper function, security, and availability of our and our operators' information systems and the data maintained in those systems could interrupt our operations, damage our reputation, subject us to liability claims or regulatory penalties, harm our business relationships, or increase our security and insurance costs, which could have a material adverse effect on our business, financial condition, and results of operations.
Our tenants and borrowers may also from time to time experience cybersecurity incidents or cybersecurity threats that compromise, damage or disrupt their information systems or result in the loss or misuse of confidential information, intellectual property or sensitive or personal information. Any resulting financial impact to our tenants or borrowers, including liability claims or regulatory penalties, increased security and insurance costs as well as business impacts resulting from any damage to their reputation or harm to their business relationships, could negatively impact the ability of our tenants and borrowers to meet their financial and other contractual obligations to us, which could have a material adverse effect on our business, financial condition and results of operations.