The Company, its vendors and customers all rely heavily on communications and information systems to conduct their respective businesses, store sensitive data and work effectively together. The financial services industry is undergoing rapid technological changes with frequent introductions of new technology-driven products and services. The Company's ability to compete successfully depends in part upon its ability to use technology to provide products and services that will satisfy customer demands. Many of the Company's larger competitors invest substantially greater resources in technological capabilities than the Company does. The Company may not be able to effectively protect, develop and manage mission critical systems and IT infrastructure to support strategic business initiatives, which could impair its ability to achieve financial, operational, compliance and strategic objectives and negatively affect the business, results of operations, financial condition or profitability.
Communications and information systems and those of the Company's vendors and customers remain vulnerable to unexpected disruptions, failures and cyber-attacks. Any disruptions, failures or breaches in security of these systems could result in significant disruption to the Company's operations. Information security breaches and cyber-security-related incidents include, but are not limited to, attempts to access information, theft of information, credentials or other intellectual property, including customer and company information, malicious code, computer viruses and denial of service attacks that could result in unauthorized access, data breaches resulting in misuse, loss or destruction of data (including confidential customer and employee information), ransomware attacks, account takeovers, unavailability of service or other events. These types of threats may derive from human error, fraud or malice on the part of external or internal parties or may result from accidental technological failure. The risk, frequency and intensity of such attacks is escalating, including as a result of remote working arrangements, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication of these threats. Material failures or interruptions of these systems could impair the Company's ability to serve customers and to operate the business and could damage the Company's reputation, result in a loss of business, subject the Company or the Bank to additional regulatory scrutiny or enforcement or exposure to civil litigation, criminal penalties or financial liability. While the Company has developed extensive recovery plans, the Company cannot assure that those plans will be effective to prevent adverse effects resulting from system failures.
The use of the Company's cloud technologies is also critical to the operation of systems, and its reliance on cloud technologies is growing. Service disruptions in cloud technologies may lead to delays in accessing, or the loss of, data that is important to the businesses and may hinder clients' access to products and services.
The Company collects and stores sensitive data, including personally identifiable information of its customers and employees and in the ordinary course of business must allow certain vendors access to that data. Breaches of the systems or vendors' or customers' systems, thefts of data and other breaches and criminal activity may result in significant costs to respond or remediate losses if the Company or its vendors are at fault, damage to the Company's customer relationships, regulatory scrutiny and enforcement and loss of future business opportunities due to reputational damage. Even the most well-protected information, networks, systems and facilities remain potentially vulnerable because attempted security breaches, particularly cyber-attacks and intrusions, or disruptions will occur in the future, and because the techniques used in such attempts are rapidly and constantly evolving and generally are not recognized until launched against a target, and in some cases are designed not to be detected and, in fact, may not be detected for a period of time or at all. Accordingly, the Company may be unable to anticipate or be prepared for these techniques or to implement adequate security barriers or other preventative measures, and thus it is impossible for the Company to entirely mitigate this risk.
Breaches can be perpetrated by unknown third parties, but could also be facilitated by employees either inadvertently or by consciously attempting to create disruption or certain acts of fraud. The Company's customers and employees have been, and will continue to be, targeted by parties using fraudulent e-mails and other communications in attempts to misappropriate passwords, bank account information or other personal information or to introduce viruses or other malware through "Trojan horse" programs to the Company's information systems, the information systems of merchants or third-party service providers and/or customers' computers. Although the Company, with the help of third-party service providers, will continue to implement information security technology solutions and establish operational procedures to protect sensitive data, there can be no assurance that these measures will be effective. The Company advises, or alerts and provides some guidance to customers and evaluates and imposes security requirements on vendors regarding protection of their respective information systems, but there is no assurance that these actions will have the intended positive effects or will be effective to prevent losses or attacks. Successful cyber-attacks on the Company, vendors or customers may affect the Company's reputation, and failure to meet customer expectations could have a material impact on the Company's ability to attract and retain deposits as a primary source of funding.
A security breach or other significant disruption of information systems or those related to customers, merchants and third-party vendors, including as a result of cyber-attacks, could (i) disrupt the proper functioning of networks and systems and therefore the operations and/or those of certain customers; (ii) result in the unauthorized access to, and destruction, loss, theft, misappropriation or release of confidential, sensitive or otherwise valuable information; (iii) result in a violation of applicable privacy, data breach and other laws, subjecting the Company to additional regulatory scrutiny and exposure to civil litigation, criminal penalties, governmental fines or financial liability; (iv) require significant management attention and resources to respond, remediate or remedy the damages that result; or (v) harm the reputation or cause a decrease in the number of customers that choose to do business with the Company. The occurrence of any of the foregoing could have a material adverse effect on the business, financial condition, results of operations or profitability.