consequential employee error, could have an adverse effect on our ability to communicate or conduct business, negatively impacting our operations and financial condition. This adverse effect can become particularly acute if those events affect our electronic data processing, transmission, storage, and retrieval systems, or impact the availability, integrity, or confidentiality of our data.
We depend heavily upon computer systems to perform necessary business functions. Despite our implementation of a variety of security measures, our computer systems, networks, and data, like those of other companies, could be subject to cyber-attacks and unauthorized access, use, alteration, or destruction, such as from physical and electronicbreak-ins or unauthorized tampering. If one or more of these events occurs, it could potentially jeopardize the confidential, proprietary, and other information processed, stored in, and transmitted through our computer systems and networks. Such an attack could cause interruptions or malfunctions in our operations, which could result in financial losses, litigation, regulatory penalties, client dissatisfaction or loss, reputational damage, and increased costs associated with mitigation of damages and remediation. If unauthorized parties gain access to such information and technology systems, they may be able to steal, publish, delete or modify private and sensitive information, including nonpublic personal information related to stockholders (and their beneficial owners) and material nonpublic information. The systems we have implemented to manage risks relating to these types of events could prove to be inadequate and, if compromised, could become inoperable for extended periods of time, cease to function properly or fail to adequately secure private information. Breaches such as those involving covertly introduced malware, impersonation of authorized users and industrial or other espionage may not be identified even with sophisticated prevention and detection systems, potentially resulting in further harm and preventing them from being addressed appropriately. The failure of these systems or of disaster recovery plans for any reason could cause significant interruptions in our and our Adviser’s operations and result in a failure to maintain the security, confidentiality or privacy of sensitive data, including personal information relating to stockholders, material nonpublic information and other sensitive information in our possession.
A disaster or a disruption in the infrastructure that supports our business, including a disruption involving electronic communications or other services used by us or third parties with whom we conduct business, or directly affecting our headquarters, could have a material adverse impact on our ability to continue to operate our business without interruption. Our disaster recovery programs may not be sufficient to mitigate the harm that may result from such a disaster or disruption. In addition, insurance and other safeguards might only partially reimburse us for our losses, if at all.
Third parties with which we do business may also be sources of cybersecurity or other technological risk. We outsource certain functions and these relationships allow for the storage and processing of our information, as well as client, counterparty, employee, and borrower information. While we engage in actions to reduce our exposure resulting from outsourcing, ongoing threats may result in unauthorized access, loss, exposure, destruction, or other cybersecurity incident that affects our data, resulting in increased costs and other consequences as described above.
In addition, cybersecurity has become a top priority for regulators around the world, and some jurisdictions have enacted laws requiring companies to notify individuals of data security breaches involving certain types of personal data. If we fail to comply with the relevant laws and regulations, we could suffer financial losses, a disruption of our businesses, liability to investors, regulatory intervention or reputational damage.
We can be highly dependent on information systems and systems failures could significantly disrupt our business, which may, in turn, negatively affect the market price of our common stock and our ability to pay distributions.
Our business is highly dependent on our and third parties’ communications and information systems. Any failure or interruption of those systems, including as a result of the termination of an agreement with any third-party service providers, could cause delays or other problems in our activities. Our financial, accounting, data
59