We are dependent on information technology networks and systems to securely process, transmit and store electronic information and to communicate among our locations around the world and with our people, clients, alliance partners and vendors. As the breadth and complexity of this infrastructure continues to grow, because of the use of mobile technologies, social media and cloud-based services, the risk of security breaches and cyberattacks increases. Such breaches could lead to shutdowns or disruptions of or damage to our systems and those of our clients, alliance partners and vendors and unauthorized disclosure of sensitive or confidential information, including confidential or personal data.
In addition, third party Cyber Security Risk is a critical focus for us. All potential new suppliers go through our Data Protection Impact Assessment ("DPIA") process. This starts with an initial screening questionnaire. The questionnaire covers what personal data and client data is processed, whether the third party has any access requirements to our environment and how is data is transferred. From this, our security team assesses the third party, conducts further due diligence, and reviews contractual clauses. If the risk assessment identifies that the baseline Information security & privacy technical and organizational controls are not met, the business will be advised accordingly. The outcome of all DPIAs is recorded on the DPIA register. All new third parties processing personal data or client data are assessed to be either Tier 1, 2 or 3, with Tier 1 being the highest risk in terms of data processed or interactions to our environment from a cyber security threat perspective. Tier 1 and 2 third parties are recorded on our business-critical services register and reviewed annually, and we review the compliance documentation, such as latest ISO certifications, SOC2 reports and pen tests, of those Tier 1 and 2 third parties. Tier 3 third parties are recorded on the DPIA register, but no further due diligence is performed by the security team, as Tier 3 third parties process no client or personal data and have no access or integration to ISG's network or systems. As part of our continuous improvement in our third-party risk management process, we engage the services of a third-party risk monitoring service to monitor threat intelligence and known vulnerabilities.
Although we seek to prevent, detect, and investigate cybersecurity threats and incidents, and have taken steps to mitigate the likelihood of network security breaches, there can be no assurance that attacks by unauthorized users will not be attempted in the future or that our security measures will be effective. Unauthorized disclosure of sensitive or confidential client data, whether through breach of our processes, systems or otherwise, could subject us to liability, damage our reputation and cause us to lose existing and potential clients. We may also be subject to civil actions and/or criminal prosecution by government or quasi-government agencies for breaches relating to such data. Our insurance coverage for breaches or mismanagement of such data may not continue to be available on reasonable terms or in sufficient amounts to cover one or more large claims against us.