We rely on computer systems, hardware, software, technology infrastructure and online sites and networks for both internal and external operations that are critical to our business (collectively, "IT Systems"). We own and manage some of these IT Systems but also rely on the third parties that provide services to the Company (collectively, "Service Providers") for a range of IT Systems and related products and services, including but not limited to cloud computing services. And we collect, maintain and process confidential, sensitive, and proprietary information about investors, tenants, partners, businesses, our employees, and others, including personally identifiable information, as well as confidential, sensitive, and proprietary information belonging to our business such as trade secrets (collectively, "Confidential Information").
We face numerous and evolving cybersecurity risks that threaten the confidentiality, integrity and availability of our IT Systems and Confidential Information. The risk of a cyber incident has generally increased as the number, intensity and sophistication of attempted attacks have increased globally, especially given the use of more advanced hacking tools and techniques and the use of artificial intelligence, including by computer hackers, foreign governments, information service interruptions and cyber terrorists, opportunistic hackers and hacktivists, as well as through diverse attack vectors, such as social engineering/phishing, malware (including ransomware), malfeasance by insiders, human or technological error, and as a result of bugs, misconfigurations or exploited vulnerabilities in software or hardware. Techniques used in cyber incidents evolve frequently, may originate from less regulated and remote areas of the world and be difficult to detect and may not be recognized until launched against a target. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, making it impossible for us to entirely eliminate this risk. For example, unauthorized parties, whether within or outside the Company, may disrupt or gain access to our IT Systems, or those of third parties with whom we do business, through human error, misfeasance, fraud, trickery, or other forms of deceit, including break-ins, use of stolen credentials, social engineering, phishing, computer viruses or other malicious codes, and similar means of unauthorized and destructive tampering.
As our reliance on technology increases, so do the risks posed to our systems - both internal and external. Our primary risks that could directly result from the occurrence of a cyber incident are theft of assets; operational interruption; regulatory enforcement, lawsuits and other legal proceedings; damage to our relationships with our tenants; and exposure of Confidential Information. A significant or extended disruption could damage our business or reputation, cause a loss of revenue, have an adverse effect on tenant relations, cause an unintended or unauthorized public disclosure, or lead to the misappropriation of Confidential Information, any of which could result in us incurring significant expenses to resolve these kinds of issues. Even security measures that are appropriate, reasonable and/or in accordance with applicable legal requirements may not be sufficient to protect our IT Systems and the Confidential Information we maintain due to attackers using tools and techniques that are designed to circumvent controls, avoid detection and remove or obfuscate forensic evidence.
As have many companies, our Service Providers have been impacted by security incidents in the past and will likely continue to experience security incidents of varying degrees. We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have had a material adverse effect on us, including an adverse effect on our business, financial condition and results of operations. While we do not believe these incidents have had a material impact to date, as our reliance on technology increases, so do the risks of a security incident. The Service Providers that provide cloud services and store our information are critical to our operations and could experience security incidents resulting in downtime, data breach or loss, or shutdown. The occurrence of any of the foregoing risks could have a material adverse effect on us including an adverse effect on our business, financial condition and results of operations.
In addition, our processing of Confidential Information, including personally identifiable information, subjects us to various federal, state and local laws, regulations and industry standards governing the collection, use, storage, sharing, transmission and other processing of personal information. The regulatory environment surrounding information security and privacy is increasingly demanding, with frequent imposition of new and changing requirements that are subject to differing interpretations. Any failure or perceived failure by us to comply with laws, regulations, policies or regulatory guidance relating to privacy or data security may result in governmental investigations and enforcement actions, litigation, fines and penalties or adverse publicity and could cause our investors to lose trust in us, which could have an adverse effect on our reputation as well as our business, financial condition and results of operations.
There can be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our systems and information.