We and our portfolio companies may experience cyber security incidents and are subject to cyber security risks.
Our business and the business of our portfolio companies relies upon secure information technology systems for data processing, storage and reporting. Despite careful security and controls design, implementation and updating, our and our portfolio company’s information technology systems could become subject to cyber-attacks. Cyber-attacks include, but are not limited to, gaining unauthorized access to digital systems (e.g., through “hacking”, malicious software coding, social engineering or “phishing” attempts) for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber-attacks may also be carried out in a manner that does not require gaining unauthorized access, such as causing denial-of service attacks on websites (i.e., efforts to make network services unavailable to intended users). Our employees and the Adviser’s employees have been and expect to continue to be the target of fraudulent calls, emails and other forms of activities. Network, system, application and data breaches could result in operational disruptions or information misappropriation, which could have a material adverse effect on our business, results of operations and financial condition or the business, results of operations and financial conditions of our portfolio companies.
Cyber security failures or breaches by the Adviser and other service providers (including, but not limited to, accountants, custodians, transfer agents and administrators), and the issuers of securities in which we invest, have the ability to cause disruptions and impact business operations, potentially resulting in financial losses, interference with our ability to calculate its net asset value, impediments to trading, the inability of our shareholders to transact business, violations of applicable privacy and other laws, regulatory fines, penalties, reputational damage, reimbursement or other compensation costs, or additional compliance costs. In addition, substantial costs may be incurred in order to prevent any cyber incidents in the future. While we have established a business continuity plan in the event of, and risk management systems to prevent, such cyber-attacks, there are inherent limitations in such plans and systems including the possibility that certain risks have not been identified. Furthermore, we cannot control the cyber security plans and systems put in place by our service providers and issuers in which we invest. We and our shareholders could be negatively impacted as a result. The costs related to cyber or other security threats or disruptions may not be fully insured or indemnified by other means. In addition, cyber-security has become a top priority for regulators around the world, and some jurisdictions have enacted laws requiring companies to notify individuals of data security breaches involving certain types of personal data. If we fail to comply with the relevant laws and regulations, we could suffer financial losses, a disruption of our businesses, liability to investors, regulatory intervention or reputational damage.
The failure in cyber security systems, as well as the occurrence of events unanticipated in our disaster recovery systems and management continuity planning could impair our ability to conduct business effectively.
The occurrence of a disaster such as a cyber-attack, a natural catastrophe, an industrial accident, a terrorist attack or war, events unanticipated in our disaster recovery systems, or a support failure from external providers, could have an adverse effect on our ability to conduct business and on our results of operations and financial condition, particularly if those events affect our computer-based data processing, transmission, storage, and retrieval systems or destroy data. If a significant number of our managers were unavailable in the event of a disaster, our ability to effectively conduct our business could be severely compromised.
We depend heavily upon computer systems to perform necessary business functions. Despite our implementation of a variety of security measures, our computer systems could be subject to cyber-attacks and unauthorized access, such as physical and electronic break-ins or unauthorized tampering. Like other companies, we may experience threats to our data and systems, including malware and computer virus attacks, unauthorized access, system failures and disruptions. If one or more of these events occurs, it could potentially jeopardize the confidential, proprietary and other information processed and stored in, and transmitted through, our computer systems and networks, or otherwise cause interruptions or malfunctions in our operations, which could result in damage to our reputation, financial losses, litigation, increased costs, and/or regulatory penalties.
57