Cybersecurity threats and incidents have been occurring globally at a more frequent and advanced level and will likely continue to increase in frequency and severity in the future. Our business and the businesses of our managers, tenants, borrowers, investments in unconsolidated entities, vendors, suppliers, service providers and other third parties with whom we do business rely on technology and are consequently subject to risk from cybersecurity threats and incidents, including attempts to gain unauthorized access to systems and networks, to disrupt operations, corrupt data or steal confidential or personal information and other cybersecurity breaches. Such attempts can originate from a wide variety of sources, including organized crime, hackers, activists, insider threats, terrorists, nation-states, state-sponsored actors and others, any of which may see their effectiveness enhanced by the use of artificial intelligence.
While we have implemented measures designed to help mitigate these threats for our business, these measures cannot guarantee that we will be successful in preventing a cybersecurity incident. Our information technology systems and networks are essential to our ability to perform day-to-day operations of our business, and a cybersecurity threat or incident could result in a data center outage, disrupt our systems and operations, compromise the confidential or personal information of our employees, partners or the residents in our senior housing communities and damage our business relationships and reputation. Although we have implemented various measures designed to manage risks to our information technology systems and networks relating to these types of events, these measures could prove to be inadequate. If our information technology systems or networks are compromised, they could become inoperable for extended periods of time, cease to function properly or fail to adequately secure confidential and personal information, which could have an adverse impact on our ability to operate our business.
Cybersecurity threats and incidents, such as those involving software bugs, server malfunctions, software or hardware failure, telecommunications failures, error or misconduct, ransomware, covertly introduced malware, denial-of-service attacks, impersonation of authorized users or other social engineering schemes (including phishing attacks), industrial or other espionage and other cybersecurity breaches may not be identified even with sophisticated prevention and detection systems, potentially resulting in further harm and preventing them from being addressed appropriately. The failure of our systems or of our disaster recovery plans for any reason could cause significant interruptions in our operations and result in a failure to maintain the security, confidentiality or privacy of sensitive data, including personal information, material nonpublic information and intellectual property and trade secrets and other confidential or sensitive information we possess.
We do not control the information technology systems and network or cybersecurity measures put in place by our managers, tenants, borrowers, investments in unconsolidated entities, vendors, suppliers, service providers or other third parties with whom we do business, all of whom are subject to risks associated with cybersecurity threats and incidents. If those parties are unable to adequately manage those risks, their results of operations, financial condition and the viability of their business could be adversely affected, which could in turn have an adverse impact on us and our business. Any contractual protections with such third parties, such as indemnification obligations to us, if any at all, may be ineffective or otherwise inadequate.
In the event of a cybersecurity threat or incident involving us or our managers, tenants, borrowers, investments in unconsolidated entities, vendors, suppliers, service providers or other third parties with whom we do business, we and they may be required to make a significant investment to attempt to mitigate or remediate the effects of any cybersecurity threats incidents, and such efforts may not be successful. We and they may be subject to legal claims and regulatory or enforcement actions and may experience harm to our reputations and adverse publicity or suffer other adverse consequences. Further, we and they may not have adequate or any insurance coverage to cover any costs, expenses or other losses arising from any of the foregoing. In addition, we cannot be sure such insurance coverage will continue to be available on acceptable terms or at all, or that the applicable insurers will not deny coverage as to any future claim.