high match confidence
Sentence-level differences:
- Reworded sentence: "We rely on information technology networks and systems, including the Internet, to process, transmit and store confidential information, and to manage or support a variety of business processes, including financial transactions and records, intellectual property, proprietary business information, and personal information of our employees, contractors and customers, such as tenant and lease data (collectively, "Confidential Information")."
- Reworded sentence: "ransomware), misconfigurations, bugs or other vulnerabilities, malicious code, natural disasters, terrorism, war, telecommunication and electrical failures, hacking, cyberattacks, phishing attacks and other social engineering schemes, employee theft or misuse, human error fraud, denial or degradation of service attacks, and sophisticated nation-state and nation-state-supported actors."
- Reworded sentence: "Any failure to maintain the proper functioning, confidentiality, security and availability of our or our third-party service providers' information technology systems or our Confidential Information could interrupt our 11 11 11 operations, damage our reputation, divert significant management attention and resources to remedy any damages that result, subject us to liability and claims or regulatory investigations and enforcement actions, which could result in, among other things, fines and penalties, and have a material adverse effect on our business, financial condition and results of operations."
Current (2024):
We rely on information technology networks and systems, including the Internet, to process, transmit and store confidential information, and to manage or support a variety of business processes, including financial transactions and records, intellectual property, proprietary…
Read full text
We rely on information technology networks and systems, including the Internet, to process, transmit and store confidential information, and to manage or support a variety of business processes, including financial transactions and records, intellectual property, proprietary business information, and personal information of our employees, contractors and customers, such as tenant and lease data (collectively, "Confidential Information"). We also rely on third-party vendors for information technology and services, including commercially available systems, software, tools and monitoring to provide security for the processing, transmission and storage of Confidential Information. Our information technology systems and those of our third-party service providers, strategic partners and other contractors or consultants are vulnerable to attack and damage or interruption from computer viruses and malware (e.g. ransomware), misconfigurations, bugs or other vulnerabilities, malicious code, natural disasters, terrorism, war, telecommunication and electrical failures, hacking, cyberattacks, phishing attacks and other social engineering schemes, employee theft or misuse, human error fraud, denial or degradation of service attacks, and sophisticated nation-state and nation-state-supported actors. Although we have taken steps to protect the security of our information technology systems and Confidential Information, it is possible that our cybersecurity risk management program and processes, including our policies, safety and security measures will not be fully implemented, complied with or able to prevent such systems’ improper functioning or damage, or the improper accessing or disclosure of Confidential Information, from such security breaches, disruptions, and shutdowns. The costs associated with the investigation, remediation and potential notification of such breaches to counter-parties and data subjects could be material. We and certain of our service providers are, from time to time, subject to cyberattacks and security incidents. While to date, we do not believe that we have experienced any significant system failure, accident or security breach, this risk has generally increased as the number, intensity and sophistication of such breaches and attempted breaches from around the world have increased. Furthermore, because the technologies used to obtain unauthorized access to, or to sabotage or disrupt, systems change frequently and often are not recognized until launched against a target, we may be unable to anticipate these techniques or implement adequate preventative measures. We may also experience security breaches that may remain undetected for an extended period. Even if identified, we may be unable to adequately investigate or remediate incidents or breaches due to attackers increasingly using tools and techniques that are designed to circumvent controls, to avoid detection, and to remove or obfuscate forensic evidence. Any failure to maintain the proper functioning, confidentiality, security and availability of our or our third-party service providers' information technology systems or our Confidential Information could interrupt our 11 11 11 operations, damage our reputation, divert significant management attention and resources to remedy any damages that result, subject us to liability and claims or regulatory investigations and enforcement actions, which could result in, among other things, fines and penalties, and have a material adverse effect on our business, financial condition and results of operations. Further, our insurance coverage may not be sufficient to cover the financial, legal, business or reputational losses that may result from an interruption or breach of our systems.
View prior text (2023)
We rely on information technology networks and systems, including the Internet, to process, transmit and store electronic information, and to manage or support a variety of business processes, including financial transactions and records, personally identifiable information, and tenant and lease data. We purchase some of our information technology from vendors, on whom our systems depend. We rely on commercially available systems, software, tools and monitoring to provide security for processing, transmission and storage of confidential tenant and other sensitive information. Our information technology systems and those of our third-party service providers, strategic partners and other contractors or consultants are vulnerable to attack and damage or interruption from computer viruses and malware (e.g. ransomware), malicious code, natural disasters, terrorism, war, telecommunication and electrical failures, hacking, cyberattacks, phishing attacks and other social engineering schemes, employee theft or misuse, human error (e.g., social engineering, phishing), fraud, denial or degradation of service attacks, sophisticated nation-state and nation-state-supported actors or unauthorized access or use by persons inside our organization, or persons with access to systems inside our organization. Although we have taken steps to protect the security of our information systems and the data maintained in those systems, it is possible that our safety and security measures will not be able to prevent the systems’ improper functioning or damage, or the improper access or disclosure of personally identifiable information such as in the event of cyber-attacks. Security breaches, including physical or electronic break-ins, computer viruses, attacks by hackers and similar breaches, can create system disruptions, shutdowns or unauthorized disclosure of confidential information. We and certain of our service providers are from time to time, subject to cyberattacks and security incidents. While to date, we do not believe that we have experienced any significant system failure, accident or security breach, this risk has generally increased as the number, intensity and sophistication of such breaches and attempted breaches from around the world have increased. Furthermore, because the technologies used to obtain unauthorized access to, or to sabotage or disrupt, systems change frequently and often are not recognized until launched against a target, we may be unable to anticipate these techniques or implement adequate preventative measures. We may also experience security breaches that may remain undetected for an extended period. Even if identified, we may be unable to adequately investigate or remediate incidents or breaches due to attackers increasingly using tools and techniques that are designed to circumvent controls, to avoid detection, and to remove or obfuscate forensic evidence. Any failure to maintain proper function, security and availability of our information systems could interrupt our operations, damage our reputation, divert significant management attention and resources to remedy any damages that result, subject us to liability claims or regulatory penalties and have a material adverse effect on our business and results of operations. Further, our insurance coverage may not be sufficient to cover the financial, legal, business or reputational losses that may result from an interruption or breach of our systems.