Our information technology systems may in the future be attacked or breached by individuals or organizations intending to obtain sensitive data regarding our business, customers, employees, tenants or other third parties with whom we do business or disrupt our business operations and information technology systems. While we maintain some of our own critical information technology systems, we also depend on third-party providers for important information technology software, products and services relating to several key business functions, such as payroll, electronic communications and certain accounting and finance functions, among others. Many of these providers have likewise experienced and expect to continue to experience cyberattacks and other security incidents.
A security compromise of our or our critical providers' information technology systems or business operations could occur through cyber-attacks or cyber-intrusions over the Internet, malware, ransomware, computer viruses, attachments to e-mails, persons inside our organization, or persons with access to systems inside our organization, due to malicious conduct, human error, negligence, and social engineering, as well as due to bugs, coding misconfigurations or other software vulnerabilities. Like many companies, we have experienced intrusions and threats to data and information technology systems, and the risk of a future security breach or disruption, particularly through cyber-attacks or cyber-intrusion, including by computer hackers, foreign governments, and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. We use information technology systems to manage our centers and other business processes. Disruption of those systems, for example, due to ransomware, could adversely impact our ability to operate our business to provide timely service to our customers and maintain our relationships with our tenants. Accordingly, if such an attack or act of terrorism were to occur, our operations and financial results could be adversely affected. In addition, we use our information technology systems to protect confidential or sensitive customer, employee and Company information developed and maintained in the normal course of our business. Certain of these systems have been attacked, and any attack on such systems that results in the unauthorized release or loss of customer, employee or other confidential or sensitive data could have a material adverse effect on our business reputation, increase our costs of remediation and compliance (particularly in light of increased regulation of corporate data privacy and cybersecurity practices) and expose us to material legal claims and liability by private litigants (including class actions) and regulatory agencies. If the unauthorized release or loss of customer, employee or other confidential or sensitive data were to occur, our operations and financial results and our share price could also be adversely affected.
We may expend significant resources or modify our business activities to try to protect against security incidents. Additionally, certain data privacy and security obligations may require us to implement and maintain specific security measures or industry-standard or reasonable security measures to protect our information technology systems and confidential, proprietary, and sensitive data. While we have implemented security measures designed to safeguard our systems and confidential, proprietary, and sensitive data and to manage cybersecurity risks, there can be no assurance that these measures will be effective. We take steps to monitor and develop our information technology networks and infrastructure and invest in the development and enhancement of our controls designed to prevent, detect, respond to, and mitigate the risk of unauthorized access, misuse, computer viruses, and other events that could have a security impact.
We also have policies and procedures in place for the identification of cybersecurity incidents and technology vulnerabilities, and their timely elevation to executive management for remediation. Additionally, we take steps to detect and remediate vulnerabilities, but we may not be able to detect and remediate all vulnerabilities because the threats and techniques used to exploit the vulnerability change frequently and are often sophisticated in nature. Therefore, such vulnerabilities could be exploited but may not be detected until after a security incident has occurred. Undetected and/or unremediated critical vulnerabilities that are exploited could pose material risks to our business. Further, we may experience delays in developing and deploying remedial measures designed to address any such identified vulnerabilities.
Moreover, the security measures employed by third-party service providers may prove to be ineffective at preventing breaches of their systems, which in turn may impact our business and operations. We expect the frequency and intensity of cyberattacks to escalate in the future, particularly as threat actors become more sophisticated, for example, by deploying tools and techniques that are specifically designed to circumvent controls, to evade detection, and even to remove or obfuscate forensic evidence, all of which impedes our ability to detect, identify, investigate and remediate against cyberattacks. Continued remote and hybrid working arrangements also present additional cybersecurity risks given the prevalence of social engineering and vulnerabilities that are inherent in many non-corporate and home networks.
It may not always be possible to anticipate, detect, or recognize threats to our systems, or to implement effective preventive measures against all security incidents. We may not be able to immediately address the consequences of a security incident. A successful breach of our computer systems, software, networks, or other technology assets could occur and persist for an extended period of time before being detected due to, among other things:
- the breadth of our operations and the high volume of transactions that our systems process;- the wide breadth of software required to run our business, and the increase in supply chain attacks by advanced persistent threats;- the large number of our business partners;- the frequency and wide variety of sources from which a cyberattack can originate;- the severity of cyberattacks; and - the proliferation and increasing sophistication and types of cyberattacks.
Furthermore, the extent of a particular cyberattack and the steps that we may need to take to investigate the attack may not be immediately clear. Therefore, in the event of an attack, it may take a significant amount of time before such an investigation can be completed. During an investigation, we may not necessarily know the extent of the damage incurred or how best to remediate it, and certain errors or actions could be repeated or compounded before they are discovered and remediated, which could further increase the costs and consequences of a cyberattack. Additionally, applicable data privacy and security obligations may require us to notify relevant stakeholders of security incidents. Such disclosures are costly, and the disclosure or the failure to comply with such disclosure requirements could lead to adverse consequences.
Our contracts may not contain limitations of liability, and even where they do, there can be no assurance that limitations of liability in our contracts are sufficient to protect us from liabilities, damages, or claims related to our data privacy and security obligations. We cannot be sure that our insurance coverage will be adequate or sufficient to protect us from or to mitigate liabilities arising out of our data privacy and security practices, that such coverage will continue to be available on commercially reasonable terms or at all, or that such coverage will pay future claims.
In addition to experiencing a security incident, third parties may gather, collect, or infer sensitive information about us from public sources, data brokers, or other means that reveals competitively sensitive details about our organization and could be used to undermine our competitive advantage or market position. Additionally, proprietary, confidential, and/or sensitive information of the Company or our tenants could be leaked, disclosed, or revealed as a result of or in connection with our employees', personnel's, or vendors' use of generative artificial intelligence technologies.
Even if we are not targeted directly, cyberattacks on the U.S. or Canadian governments, financial markets, financial institutions, or other businesses, including our tenants, vendors, software creators, cloud providers, cybersecurity service providers, and other third parties upon which we rely, may occur, and such events could disrupt our normal business operations and networks in the future.
In addition, laws, regulations, regulatory frameworks and industry standards related to cybersecurity and data privacy issues are developing rapidly, which may pose complex compliance challenges, lead to increased costs and potentially subject us to liability for violations. While we carry insurance related to cybersecurity events, our policies may not cover all of the costs and liabilities that could be incurred as the result of cyberattack or other security incident.