A significant portion of our business is conducted over the internet and we rely on the secure processing, storage and transmission of confidential, sensitive, proprietary and other types of information relating to our business operations and confidential and sensitive information about our customers and employees in our computer systems and networks, and in those of our third-party vendors. Individuals, groups, and state-sponsored organizations may take steps that pose threats to our operations, our computer systems, our employees, and our customers. The cybersecurity risks we face range from cyber attacks common to most industries, such as the development and deployment of malicious software to gain access to our networks and attempt to steal confidential information, launch distributed denial of service attacks, or attempt other coordinated disruptions, to more advanced threats that target us because of our prominence in the global research and advisory field.
Like many multinational corporations, we, and some third parties upon which we rely, have experienced cyber attacks on our computer systems and networks in the past and may experience them in the future, likely with more frequency and sophistication, and involving a broader range of devices and modes of attack, all of which will increase the difficulty of detecting and successfully defending against them. To date, none have resulted in any material adverse impact to our business, operations, products, services or customers. We have implemented various security controls to meet our security obligations, while also defending against constantly evolving security threats. Our security controls help to secure our information systems, including our computer systems, intranet, proprietary websites, email and other telecommunications and data networks, and we scrutinize the security of outsourced website and service providers prior to retaining their services. However, the security measures implemented by us or by our outside service providers may not be effective and our systems (and those of our outside service providers) are vulnerable to theft, loss, damage and interruption from a number of potential sources and events, including unauthorized access or security breaches, cyber attacks, computer viruses, power loss, or other disruptive events. As a result of operating in a hybrid work environment, most of our employees are working virtually for a period of time, which magnifies the importance of the integrity of our remote access security measures.
Cyber criminals use artificial intelligence tools to increase the effectiveness, speed and complexity of attacks, requiring increased vigilance and threat defense. Additionally, the security compliance landscape continues to evolve, requiring us to stay apprised of changes in cybersecurity and data privacy laws, regulations, and security requirements required by our clients, such as the European Union General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA), the Brazilian General Data Protection Law (LGPD), the Chinese Cybersecurity, Data Security and Personal Information Protection laws (and other new and proposed data protection laws), International Organization for Standardization (ISO), and National Institute of Standards and Technology (NIST). Recent well-publicized security breaches at other companies have led to enhanced government and regulatory scrutiny of the measures taken by companies to protect against cyber attacks, and may in the future result in heightened cybersecurity requirements, including additional regulatory expectations for oversight of vendors and service providers.
A cyber attack, widespread internet failure or internet access limitations, or disruption of our critical information technology systems through denial of service, viruses, or other events could cause delays in initiating or completing sales, impede delivery of our products and services to our clients, disrupt other critical client-facing or business processes or dislocate our critical internal functions. Additionally, any material breaches of cybersecurity or other technology-related catastrophe, or media reports of perceived security vulnerabilities to our systems or those of our third parties, even if no breach has been attempted or occurred, could cause us to experience reputational harm, loss of customers and revenue, fines, regulatory actions and scrutiny, sanctions or other statutory penalties, litigation, liability for failure to safeguard our customers' information, or financial losses that are either not insured against or not fully covered through any insurance maintained by us.
Any of the foregoing may have a material adverse effect on our business, operating results and financial condition.