We, and our suppliers and third party service providers on our behalf, collect, use and transmit a large volume of personal information, which pose a tempting target for malicious actors who may seek to carry out cyber-attacks against us or our suppliers or service providers. The secure transmission of client information over the internet is essential in maintaining the confidence of our customers. Substantial or ongoing data security breaches or cyber-attacks, whether instigated internally or externally on our system or other internet-based systems (including computer hackers, persons involved with organized crime, or foreign state or foreign state-supported actors), expose us to a significant risk of loss, theft, the rendering inaccessible, improper disclosure or misappropriation of this information and resulting regulatory actions, litigation (including class action litigation) and potential liability, damages and regulatory fines and penalties, and other related costs (including in connection with our investigation and remediation efforts), which could significantly affect our reputation and harm our business. Further, some of our third-party service providers, suppliers and other third parties may receive or store information, including client information provided by us.
Cybersecurity threat actors employ a wide variety of methods and techniques that are constantly evolving, increasingly sophisticated and difficult to detect and successfully defend against. The capabilities of malicious actors pose greater cybersecurity threats and could result in a cyber-attack or a compromise or breach of the technology that we use to protect client transaction data. We cannot guarantee that future cyberattacks, if successful, will not have a material adverse effect on our business, results of operations and financial condition.
We incur material expenses to protect against cyber-attacks and security breaches and their consequences, and we may need to increase our security-related expenditures to maintain or increase our systems' security in the future. However, despite these efforts, our security measures may not prevent cyber-attacks or data security breaches from occurring, and we may ultimately fail to detect, or accurately assess the severity of, a cyber-attack or security breach or not respond quickly enough. In addition, to the extent we experience a cyber-attack or security breach, we may be unsuccessful in implementing remediation plans to address exposure and future harm. It is possible that computer circumvention capabilities, new discoveries or advances or other developments, which change frequently and often are not recognized until launched against a target, could result in a compromise or breach of client data, even if we take all reasonable precautions, including to the extent required by law. These risks are likely to increase as we expand our offerings, expand internationally, integrate our products and software services and store and process more data, including personal information and other sensitive data. Further, if any of our third-party service providers, suppliers or other third parties with whom we share client data fail to implement adequate data-security practices or fail to comply with our terms and policies or otherwise suffer a network or other security breach, our clients' information may be improperly accessed, used or disclosed. We maintain a comprehensive portfolio of insurance policies to meet both our legal obligations and to cover perceived risks within our business, including those related to cybersecurity. We believe that our coverage and the deductibles under these policies are adequate for the risks that we face.
If a party (whether internal, external, an affiliate or unrelated third party) is able to circumvent our data security systems or those of the third parties with whom we share client information or engage in cyber-attacks, such cyber-attacks or data breaches could result in unauthorized access to our systems or to the systems of third-party vendors upon whom we rely. Such unauthorized access could result in other parties obtaining our proprietary information, the loss, theft or inaccessibility of, unauthorized access to, or improper use or disclosure of, our clients' data and/or significant interruptions in our operations. Cyber-attacks and security breaches could also result in severe damage to our IT infrastructure, including damage that could impair our ability to offer our products and services. In addition, cyber-attacks or security breaches could result in negative publicity, damage our reputation, divert management's time and attention, increase our expenditure on cybersecurity measures, expose us to risk of loss or litigation and possible liability, cause contract terminations and/or cause customers, potential customers, suppliers and potential suppliers to lose confidence in our security and choose to use the products and/or services of our competitors, any of which would have a material adverse effect on our business, brands, market share, results of operations and financial condition. Any compromise of our security could also result in a violation of applicable domestic and foreign security, privacy or data protection, consumer protection and other laws, regulatory or other governmental investigations, enforcement actions and legal and financial exposure, and potentially subject us to regulatory penalties and sanctions (and lead to further enhanced regulatory oversight).