non-binding nature of consensus pricing and/or quotes accompanied by disclaimers materially reduces the reliability of such information. We employ the services of one or more independent service providers to review the valuation of these securities. The types of factors that the Board may take into account in determining the fair value of our investments generally include, as appropriate, comparison to publicly traded securities including such factors as yield, maturity and measures of credit quality, the enterprise value of a portfolio company, the nature and realizable value of any collateral, the portfolio company’s ability to make payments and its earnings and discounted cash flow, the markets in which the portfolio company does business and other relevant factors. Because such valuations, and particularly valuations of private securities and private companies, are inherently uncertain, may fluctuate over short periods of time and may be based on estimates, our determinations of fair value may differ materially from the values that would have been used if a ready market for these securities existed. Due to this uncertainty in the value of our portfolio investments, a fair value determination may cause net asset value on a given date to materially understate or overstate the value that we may ultimately realize upon one or more of our investments. As a result, investors purchasing shares of our common stock based on an overstated net asset value would pay a higher price than the value of the investments might warrant. Conversely, investors selling shares during a period in which the net asset value understates the value of investments will receive a lower price for their shares than the value the investment portfolio might warrant.
We will adjust quarterly the valuation of our portfolio to reflect the determination of the Board of the fair value of each investment in our portfolio. Any changes in fair value are recorded in our statements of operations as net change in unrealized gain (loss) on investments.
The Board may change our investment objective, operating policies and strategies without prior notice or stockholder approval, the effects of which may be adverse.
The Board has the authority, except as otherwise prohibited by the 1940 Act, to modify or waive certain of our operating policies and strategies without prior notice and without stockholder approval. However, absent stockholder approval, we may not change the nature of our business so as to cease to be, or withdraw our election as, a BDC. Under Maryland law, we also cannot be dissolved without prior stockholder approval except by judicial action. We cannot predict the effect any changes to our current operating policies and strategies would have on our business, operating results and the price value of our common stock. Nevertheless, any such changes could adversely affect our business and impair our ability to make distributions.
Internal and external cyber threats, as well as other disasters, could impair our ability to conduct business effectively.
The occurrence of a disaster, such as a cyber-attack against us or against a third party that has access to our data or networks, a natural catastrophe, an industrial accident, failure of our disaster recovery systems, or consequential employee error, could have an adverse effect on our ability to communicate or conduct business, negatively impacting our operations and financial condition. This adverse effect can become particularly acute if those events affect our electronic data processing, transmission, storage, and retrieval systems, or impact the availability, integrity, or confidentiality of our data.
We depend heavily upon computer systems to perform necessary business functions. Despite our implementation of a variety of security measures, our computer systems, networks, and data, like those of other companies, could be subject to cyber-attacks and unauthorized access, use, alteration, or destruction, such as from physical and electronic break-ins or unauthorized tampering. If one or more of these events occurs, it could potentially jeopardize the confidential, proprietary, and other information processed, stored in, and transmitted through our computer systems and networks. Such an attack could cause interruptions or malfunctions in our operations, which could result in financial losses, litigation, regulatory penalties, client dissatisfaction or loss, reputational damage, and increased costs associated with mitigation of damages and remediation.
Third parties with which we do business may also be sources of cybersecurity or other technological risk. We outsource certain functions, and these relationships allow for the storage and processing of our information, as well as client, counterparty, employee, and borrower information. While we engage in actions to reduce our exposure resulting from outsourcing, ongoing threats may result in unauthorized access, loss, exposure, destruction, or other