In the ordinary course of its business, the Company collects, stores, and transmits sensitive, confidential, or proprietary data and other information, including intellectual property, business information, funds-transfer instructions, and the personally identifiable information of its customers and employees. The secure processing, storage, maintenance, and transmission of this information is critical to the Company's operations and reputation, and if any of this information were mishandled, misused, improperly accessed, lost, breached, held hostage or stolen, or if the Company's operations were disrupted, the Company could suffer significant financial, business, reputational, regulatory, or other damage. Failures or errors in, or breach of the Company's systems or networks, or those of its third-party service providers or their third-party service providers (collectively, third party service providers), or the Company's counterparties, may expose the Company to litigation, disclosure requirements, remediation costs, increased costs for security measures, loss of revenue, regulatory scrutiny, governmental investigation and/or other actions, and other potential liability. For example, despite security measures, the Company's or its third-party service providers' information technology and infrastructure may be breached or rendered inaccessible due to a variety of factors, including from infrastructure changes or failures, introductions of new functionality, human or software errors, service failures, operational and technological outages, capacity constraints, loss or theft of assets, natural disasters, terrorist attacks, power outages, data breaches, cyber-attacks, denial of service attacks, hacking, ransomware and other computer viruses or malware, or acts of misconduct through pretext calls, electronic phishing or other means, and, as a result, an unauthorized party may obtain access to the Company's or its customers' confidential, proprietary, personal, or sensitive data. These risks and uncertainties are rapidly evolving and increasing in complexity, and the Company's failure to effectively mitigate them could negatively impact its business and operations.
Because the techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently or may be designed to remain dormant until a predetermined event, and often are not recognized until launched against a target, the Company or its third-party service providers may be unable to anticipate or detect these techniques or implement adequate preventative or remedial measures. Though it is difficult to determine what harm may directly result from any specific interruption or data breach, any failure to maintain performance, reliability, security, and availability of the Company's network infrastructure and the information processed thereby may harm the Company's brand, its ability to retain existing customers and attract new customers, and its ability to operate.
Risks and exposures related to cybersecurity attacks, particularly for financial institutions, are expected to remain high for the foreseeable future due to the rapidly evolving nature and sophistication of these threats and the expanding use of technology-based products and services by the Company, its third-party service providers, and its customers. The Company can provide no assurances that the safeguards it or its third-party service providers have in place or may implement in the future will prevent all unauthorized infiltrations or breaches and that the Company will not suffer losses related to a security breach in the future, which losses may be material.
As noted above, third-party service providers also present a source of risk to the Company if their own security measures or other systems or infrastructure were to be breached or subject to another cybersecurity incident, rendered inaccessible or interrupted, experience an outage, downtime or degradation in service, or otherwise fail or experience adverse conditions (including conditions which interfere with the Company's access to and use of such third-party services). The Company's ability to monitor its third-party service providers' cybersecurity practices is inherently limited. Although the agreements that the Company has in place with its third-party service providers generally include requirements relating to privacy, data protection and data security where and as appropriate, the Company cannot guarantee that such agreements will prevent a cyber incident impacting the Company's systems or information or enable it to obtain adequate or any reimbursement from its third-party service providers in the event the Company should suffer any such incidents. In addition, due to applicable laws and regulations or contractual obligations, the Company may be held responsible for cyber incidents attributed to its third-party service providers as they relate to the information shared with them.
Likewise, a cyber-attack, hacking incident, or other security breach affecting the business community, the markets, or parts of them may cycle or cascade through the financial system and adversely affect the Company or its service providers or counterparties. Many of these risks and uncertainties are beyond the Company's control. Any failure, attempted or successful data breach or other cybersecurity incident or significant disruption in the Company's information technology infrastructure, or those of the Company's third-party service providers, could lead to transaction delays, compromised cybersecurity or data, inability to access critical services, and a failure to comply with applicable laws, regulations and standards governing financial transactions, data privacy, and cybersecurity. The consequences of such disruptions could be severe, resulting in financial losses, identity theft, loss of consumer trust, regulatory fines, monetary damages or other penalties or fines as well as a tarnished reputation among customers, partners and other third parties, any of which could adversely affect the Company's business, results of operations, financial condition and future prospects. Although the Company believes it has appropriate measures in place to help manage the risk, there can be no guarantee that its efforts will be effective in preventing a material loss event.
Even when an attempted cyber-attack, hacking incident or other security breach is successfully avoided or thwarted, the Company may need to expend substantial resources to avoid such breach, may be required to take actions that could adversely affect customer satisfaction or behavior, and may be exposed to reputational damage. Despite the Company's efforts to safeguard the integrity of systems and controls and to manage third-party risk, the Company may not be able to anticipate or implement effective measures to prevent all security breaches or all risks to the sensitive, confidential, or proprietary information that it or its service providers or counterparties collect, store, or transmit. In some cases, the Company may not be able to identify the cause or causes of these performance problems immediately or in short order, and may face difficulties detecting, mitigating, remediating, and otherwise responding to any such issues.