interruption of such systems, including as a result of the termination of an agreement with any such third-party service provider, could cause delays or other problems in the Company’s activities. This, in turn, could have a material adverse effect on the Company’s operating results and negatively affect the Company.
The failure in cyber security systems, as well as the occurrence of events unanticipated in the Company’s disaster recovery systems and management continuity planning could impair its ability to conduct business effectively.
The occurrence of a disaster, such as a cyber-attack against the Company or against a third-party that has access to the Company’s data or networks, a natural catastrophe, an industrial accident, failure of our disaster recovery systems, or consequential employee error, could have an adverse effect on its ability to communicate or conduct business, negatively impacting its operations and financial condition. This adverse effect can become particularly acute if those events affect the Company’s electronic data processing, transmission, storage, and retrieval systems, or impact the availability, integrity, or confidentiality of its data.
The Company depends heavily upon computer systems to perform necessary business functions. Despite its implementation of a variety of security measures, the Company’s computer systems, networks, and data, like those of other companies, could be subject to cyber-attacks and unauthorized access, use, alteration, or destruction, such as from physical and electronic break-ins or unauthorized tampering, malware and computer virus attacks, or system failures and disruptions. If one or more of these events occurs, it could potentially jeopardize the confidential, proprietary, and other information processed, stored in, and transmitted through our computer systems and networks. Such an attack could cause interruptions or malfunctions in the Company’s operations, which could result in financial losses, litigation, regulatory penalties, client dissatisfaction or loss, reputational damage, and increased costs associated with mitigation of damages and remediation.
Third parties with which the Company does business may also be sources of cybersecurity or other technological risks. The Company outsources certain functions, and these relationships allow for the storage and processing of its information, as well as customer, counterparty, employee and borrower information. Cybersecurity failures or breaches by the Advisor and other service providers (including, but not limited to, accountants, custodians, transfer agents and administrators), and the issuers of securities in which the Company invests, also have the ability to cause disruptions and impact business operations, potentially resulting in financial losses, interference with the Company’s ability to calculate its net asset value, impediments to trading, the inability of its shareholders to transact business, violations of applicable privacy and other laws, regulatory fines, penalties, reputation damages, reimbursement of other compensation costs, or additional compliance costs. While the Company engages in actions to reduce its exposure resulting from outsourcing, ongoing threats may result in unauthorized access, loss, exposure or destruction of data, or other cybersecurity incidents, with increased costs and other consequences, including those described above. In addition, substantial costs may be incurred in order to prevent any cyber incidents in the future.
Privacy and information security laws and regulation changes, and compliance with those changes, may result in cost increases due to system changes and the development of new administrative processes. In addition, the Company may be required to expend significant additional resources to modify its protective measures and to investigate and remediate vulnerabilities or other exposures arising from operational and security risks. The Company currently does not maintain insurance coverage relating to cybersecurity risks, and it may be required to expend significant additional resources to modify its protective measures or to investigate and remediate vulnerabilities or other exposures, and the Company may be subject to litigation and financial losses that are not fully insured.
The Company, the Advisor and the Company’s portfolio companies are subject to risks associated with “phishing” and other cyber-attacks.
The Company’s business and the business of its portfolio companies relies upon secure information technology systems for data processing, storage and reporting. Despite careful security and controls design, implementation and updating, the Company’s and its portfolio companies’ information technology systems could become subject to cyber-attacks. Cyber-attacks include, but are not limited to, gaining unauthorized access to digital systems (e.g., through “hacking”, malicious software coding, social engineering or “phishing” attempts) for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber-attacks may also be carried out in a manner that does not require gaining unauthorized access, such as causing denial-of service attacks on websites (i.e., efforts to make network services unavailable to intended users). The Advisor’s employees have been and expect to continue to be the target of fraudulent calls, emails and other forms of activities. The result of these incidents may include disrupted operations, misstated or unreliable financial data, liability for