Our business requires us to collect, process, transmit and store significant amounts of confidential information regarding our customers, employees and our own business, operations, plans and business strategies. Our operational and security systems infrastructure, including our computer systems, data management and internal processes, as well as those of third parties, are integral to our performance. Our operational risks include the risk of malfeasance by employees or persons outside our company, errors relating to transaction processing and technology, systems failures or interruptions, breaches of our internal control systems and compliance requirements, and business continuation and disaster recovery. Insurance coverage may not be available for such losses, or where available, such losses may exceed insurance limits. This risk of loss also includes the potential legal actions that could arise as a result of operational deficiencies or as a result of non-compliance with applicable regulatory standards or customer attrition due to potential negative publicity.
In the event of a breakdown in our internal control systems, improper operation of systems or improper employee actions, or a breach of our security systems, including if confidential or proprietary information were to be mishandled, misused or lost, we could suffer financial loss, face regulatory action, civil litigation and/or suffer damage to our reputation. Although we have not experienced any material technology failures, cyber-attacks or other information or security breaches, or material losses related to any such events to date, there can be no assurance that we will not suffer such events, losses or other consequences in the future. Our risk and exposure to these matters remain heightened because of, among other things, the evolving nature of these threats and our role as a provider of financial services, our continuous transmission of sensitive information to, and storage of such information by, third parties, including our vendors and regulators, the outsourcing of some of our business operations, threats of cyber-terrorism, and system and customer account updates and conversions. As a result, cyber-security and the continued development and enhancement of our controls, processes and practices designed to protect our systems, computers, software, data and networks from attack, damage or unauthorized access remain an area of substantial concern.