Our business relies on its digital technologies, computer and email systems, software, and networks to conduct its operations. Although we have information security procedures and controls in place, our technologies, systems, and networks and, because the nature of our business involves the receipt and retention of personal information about our customers, our customers’ personal accounts may become the target of cyber attacks or information security breaches that could result in the unauthorized release, gathering, monitoring, misuse, loss, or destruction of our customers’, or other third parties’ confidential information. Third parties with whom we do business or who facilitate our business activities, including intermediaries or vendors that provide service or security solutions for our operations, and other third parties, could also be sources of operational and information security risk to us, including from breakdowns or failures of their own systems or capacity constraints. In addition, hardware, software, or applications we develop or procure from third parties may contain defects in design or manufacture or other problems that could unexpectedly compromise information security.
While we have disaster recovery and other policies and procedures designed to prevent or limit the effect of the failure, interruption, or security breach of our information systems, there can be no assurance that any such failures, interruptions, or security breaches will not occur or, if they do occur, that they will be adequately addressed. Our risk and exposure to these matters remain heightened because of the evolving nature of these threats. As a result, cyber security and the continued development and enhancement of our controls, processes, and practices designed to protect our systems, computers, software, data, and networks from attack, damage, or unauthorized access remain a focus for us. As threats continue to evolve, we may be required to expend additional resources to continue to modify or enhance our protective measures or to investigate and remediate information security vulnerabilities. Disruptions or failures in the physical infrastructure or operating systems that support our businesses and customers, or cyber attacks or security breaches of the networks, systems, or devices that our customers use to access our products and services, could result in customer attrition, regulatory fines, penalties or intervention, reputation damage, reimbursement or other compensation costs, and/or additional compliance costs, any of which could have a material effect on our results of operations or financial condition. Furthermore, if such attacks are not detected immediately, their effect could be compounded. To date, to our knowledge, we have not experienced any material impact relating to cyber-attacks or other information security breaches.
If we enter intonon-compete agreements with the sellers of the self storage properties that we acquire, and the terms of those agreements expire, the sellers may compete with us within the general location of one of our self storage facilities, which could have an adverse effect on our operating results and returns to you.
We may enter intonon-compete agreements with the sellers of the self storage properties that we acquire in order to prohibit the seller from owning, operating, or being employed by a competing self storage property for a predetermined time frame and within a geographic radius of a self storage facility we acquire. When thesenon-compete agreements expire, we may face the risk that the seller will develop, own, operate, or become employed by a competing self storage facility within the general location of one of our properties, which could have an adverse effect on our operating results and returns to you.
General Risks Related to Investments in Real Estate
The growth portion of our property acquisition strategy involves a higher risk of loss than more conservative investment strategies.
Our strategy for acquiring properties may involve the acquisition of properties in markets that are depressed or overbuilt, and/or have high growth potential in real estate lease rates and sale prices. As a result of our investment in these types of markets, we will face increased risks relating to changes in local market conditions and increased competition for similar properties in the same market, as well as increased risks that
44