Any failure, interruption or breach in the security of our systems could severely disrupt our operations. Our systems involve the processing, storage and transmission of clients' and our proprietary and confidential information, and security breaches, including cyber-attacks, could expose us to a risk of theft, loss or other misappropriation of this information. Our security measures may be breached due to the actions of outside parties, employee error, failure of our controls with respect to access to our systems, malfeasance or otherwise, and, as a result, an unauthorized party may obtain access to our or our clients' proprietary and confidential information, resulting in the theft, loss, destruction, gathering, monitoring, or other misappropriation of this information. Additionally, we are subject to complex and evolving laws and regulations governing cybersecurity, data privacy and data protection, which may differ and potentially conflict, in various jurisdictions. Regulators globally are introducing the potential for greater monetary fines on institutions that suffer from breaches leading to the misappropriation of such information. Most states, the EU and other non-U.S. jurisdictions also have adopted their own statutes and/or regulations concerning data privacy and security and notification of data breaches. These and other changes in laws or regulations associated with the enhanced protection of personal and other types of information could greatly increase compliance costs and the size of potential fines related to the protection of such information.
Information security and data privacy risks for large financial institutions like us are significant in part because of the evolving proliferation of new technologies, the use of the internet, mobile devices, and cloud technologies to conduct financial transactions and the increased sophistication and activities of hackers, terrorists, organized crime and other external parties, including foreign state actors. If we fail to continue to upgrade our technology infrastructure to ensure effective information security and data privacy relative to the type, size and complexity of our operations, we could become more vulnerable to cyber-attack and, consequently, subject to significant regulatory penalties. Also, like many large enterprises, in response to the COVID-19 pandemic, we have shifted the majority of our professionals to remote work arrangements, and expect that many will continue to work remotely to some extent even as we begin to institute return-to-office plans. This change has enabled us successfully to continue business operations, but also introduces potential new vulnerabilities to cyber threats. Additionally, our computer, communications, data processing, networks, backup, business continuity or other operating, information or technology systems, including those that we outsource to other providers, may fail to operate properly or become disabled, overloaded or damaged as a result of a number of factors, including events that are wholly or partially beyond our control, which could have a negative effect on our ability to conduct our business activities.
The third parties with which we do business also are susceptible to the foregoing risks (including regarding the third parties with which they are similarly interconnected or on which they otherwise rely), and our or their business operations and activities may therefore be affected adversely, perhaps materially, by failures, terminations, errors or malfeasance by, or attacks or constraints on, one or more financial, technology, infrastructure or government institutions or intermediaries with whom we or they are interconnected or conduct business. While we conduct security assessments on third-party vendors, we cannot be certain that their information security protocols are sufficient to withstand a cyber-attack or other security breach. In addition, our clients often use their own devices, such as computers, smart phones and tablets, as well as third parties with whom they share information used for authentication, to manage their accounts, which may heighten the risk of system failures, interruptions or security breaches.
In recent years, several financial services firms suffered successful cyber-attacks launched both domestically and from abroad, resulting in the disruption of services to clients, loss or misappropriation of sensitive or private information, and reputational harm. We and our clients have been, and expect to continue to be, subject to a wide variety of cyber-attacks and threats, including computer viruses, ransomware and other malicious code, distributed denial of service attacks, and phishing attacks, and it is possible that we could suffer material losses resulting from a breach. Because the techniques used to obtain unauthorized access, disable or degrade service or sabotage systems change frequently and often are not recognized until launched against a target, we may be unable to anticipate these techniques, to implement adequate preventative measures, or to address them until they are discovered. In addition, successful cyber-attacks may persist for an extended period of time before being detected. Because any investigation of an information security incident would be inherently unpredictable, the extent of a particular information security incident and the path of investigating the incident may not be immediately clear. It may take a significant amount of time before such an investigation can be completed and full and reliable information about the incident is known. While such an investigation is ongoing, we may not necessarily know the extent of the harm or how best to remediate it, certain errors or actions could be repeated or compounded before they are discovered and remediated, and communication to the public, regulators, clients and other stakeholders may be inaccurate, any or all of which could further increase the costs and consequences of an information security incident.
We could be the subject of legal claims or proceedings related to security incidents, including regulatory investigations and actions. Further, the market perception of the effectiveness of our security measures could be harmed, our reputation could suffer and we could lose clients in conjunction with security incidents, each of which could have a negative effect on our business, financial condition and results of operations. A breach of our security also may affect adversely our ability to effect transactions, service our clients, manage our exposure to risk or expand our business. An event that results in the loss of information also may require us to reconstruct lost data or reimburse clients for data and credit monitoring services, which could be costly and have a negative impact on our business and reputation. Although we maintain insurance covering information theft, damage, or destruction from cyber breach incidents, there can be no assurance that liabilities or losses we may incur will be covered under such policies or that the amount of insurance will be adequate.
Further, even if not directed at us, attacks on financial or other institutions important to the overall functioning of the financial system or on our counterparties could affect, directly or indirectly, aspects of our business.