Our infrastructure, including our information systems and technology, is vital to the competitiveness of our business. The failure to maintain an adequate infrastructure commensurate with the size and scope of our business could impede our productivity and growth, which could cause our earnings or stock price to decline. We outsource a significant portion of our information systems operations to third parties who are responsible for providing the management, maintenance, and updating of such systems. Technology is subject to rapid change and we cannot guarantee that our competitors may not implement more advanced technology platforms for their products than we do for ours. In addition, there can be no assurance that the cost of maintaining such outsourcing arrangements will not increase from its current level, which could have a material adverse effect on us.
In addition, any inaccuracies, delays, system failures, or security breaches in these and other systems could subject us to client dissatisfaction and losses. Breach of our technology systems could result in the loss of valuable information, liability for stolen assets or information, remediation costs to repair damage caused by the breach, additional security costs to mitigate against future incidents, and litigation costs resulting from the incident. Moreover, loss of confidential customer identification information could harm our reputation and subject us to liability under laws that protect confidential personal data, resulting in increased costs or loss of revenues. Further, although we take precautions to password protect and encrypt our laptops, tablets, smartphones, and other mobile electronic hardware, if such hardware is stolen, misplaced or left unattended, it may become vulnerable to hacking or other unauthorized use, creating a possible security risk and resulting in potentially costly actions by us.
Our operations rely on the secure processing, storage, and transmission of confidential and other information in our computer systems and networks. We may be the target of cyber-attacks, including denial-of-service attacks, and must continuously monitor and develop our systems to protect our technology infrastructure and data from misappropriation or corruption. Although we take protective measures and endeavor to modify them as circumstances warrant, our computer systems, software, and networks may be vulnerable to unauthorized access, misuse, computer viruses, or other malicious code and other events that could have a security impact. If one or more of such events occur, this potentially could jeopardize our or our clients' or counterparties' confidential and other information processed and stored in our, our clients', our counterparties', or third parties' operations, which could impact their ability to transact with us or otherwise result in significant losses or reputational damage. The increased use of mobile technologies can heighten these and other operational risks. We expect to expend additional resources on an ongoing basis to modify our protective measures and to investigate and remediate vulnerabilities or other exposures, and we may be subject to litigation and financial losses that are either not insured against or not fully covered through any insurance maintained by us.
We routinely transmit and receive personal, confidential, and proprietary information by email and other electronic means. We have discussed and worked with clients, vendors, service providers, counterparties, and other third parties to develop secure transmission capabilities and protect against cyber-attacks, but we do not have, and may be unable to put in place, secure capabilities with all of our clients, vendors, service providers, counterparties, and other third parties and we may not be able to ensure that these third parties have appropriate controls in place to protect the confidentiality of the information. An interception, misuse, or mishandling of personal, confidential, or proprietary information being sent to or received from a client, vendor, service provider, counterparty, or other third party could result in legal liability, regulatory action, and reputational harm.