Our businesses depend on our ability to process a large numberof transactions, many of which are complex, across multiple anddiverse markets in different currencies, to comply withrequirements of many different legal and regulatory regimes towhich we are subject and to prevent, or promptly detect and stop,unauthorized, fictitious or fraudulent transactions. We also relyon access to, and on the functioning of, systems maintained bythird parties, including clearing systems, exchanges, informationprocessors and central counterparties. Any failure of our or third-party systems could have an adverse effect on us. These risks maybe greater as we deploy newer technologies, such as blockchain,or products that rely on these technologies. Our operational riskmanagement and control systems and processes are designed tohelp ensure that the risks associated with our activities – includingthose arising from process error, failed execution, misconduct,unauthorized trading, fraud, system failures, financial crime,cyberattacks, breaches of information security, inadequate orineffective access controls and failure of security and physicalprotection – are appropriately controlled. If our internal controlsfail or prove ineffective in identifying and remedying these risks,we could suffer operational failures that might result in materiallosses, such as the substantial loss we incurred from theunauthorized trading incident announced in September 2011.As a significant proportion of our staff have been and willcontinue working from outside the offices as a consequence ofthe COVID-19 pandemic, we have faced, and will continue toface, new challenges and operational risks, includingmaintenance of supervisory and surveillance controls, as well asincreased fraud and data security risks. While we have takenmeasures to manage these risks, such measures have never beentested on the scale or duration that we are currently experiencing,and there is risk that these measures will prove not to have beeneffective in the current unprecedented operating environment. We use automation as part of our efforts to improve efficiency,reduce the risk of error and improve our client experience. Weintend to expand the use of robotic processing, machine learningand artificial intelligence to further these goals. Use of these toolspresents their own risks, including the need for effective designand testing; the quality of the data used for development andoperation of machine learning and artificial intelligence tools mayadversely affect their functioning and result in errors and otheroperational risks.For financial institutions, cybersecurity risks have increased dueto the widespread use of digital technologies, cloud computingand mobile devices to conduct financial business and transactions.In addition, cyberattacks by hackers, terrorists, criminalorganizations, nation states and extremists have also increased infrequency and sophistication. Current geopolitical tensions alsomay lead to increased risk of cyberattack from foreign state actors.In particular, the Russian invasion of Ukraine and the impositionof significant sanctions on Russia by Switzerland, the US, the EU,the UK and others may result in an increase in the risk ofcyberattacks. We and other financial services firms have been subject tobreaches of security and to cyber- and other forms of attack, someof which are sophisticated and targeted attacks intended to gainaccess to confidential information or systems, disrupt service ordestroy data. These attacks may be attempted through theintroduction of viruses or malware, phishing and other forms ofsocial engineering, distributed denial of service attacks and othermeans. These attempts may occur directly, or using equipment orsecurity passwords of our employees, third-party service providersor other users. In addition to external attacks, we haveexperienced loss of client data from failure by employees andothers to follow internal policies and procedures and frommisappropriation of our data by employees and others. We maynot be able to anticipate, detect or recognize threats to oursystems or data and our preventative measures may not beeffective to prevent an attack or a security breach. In the event ofa security breach, notwithstanding our preventative measures, wemay not immediately detect a particular breach or attack. Once aparticular attack is detected, time may be required to investigateand assess the nature and extent of the attack. A successfulbreach or circumvention of security of our systems or data couldhave significant negative consequences for us, includingdisruption of our operations, misappropriation of confidentialinformation concerning us or our customers, damage to oursystems, financial losses for us or our customers, violations of dataprivacy and similar laws, litigation exposure and damage to ourreputation. We may be subject to enforcement actions asregulatory focus on cybersecurity increases and regulators haveannounced new rules, guidance and initiatives on ransomwareand other cybersecurity-related issues.We are subject to complex and frequently changing laws andregulations governing the protection of client and personal data,such as the EU General Data Protection Regulation. Ensuring thatwe comply with applicable laws and regulations when we collect,use and transfer personal information requires substantialresources and may affect the ways in which we conduct our business. In the event that we fail to comply with applicable laws,we may be exposed to regulatory fines and penalties and othersanctions. We may also incur such penalties if our vendors orother service providers or clients or counterparties fail to complywith these laws or to maintain appropriate controls over protecteddata. In addition, any loss or exposure of client or other data mayadversely damage our reputation and adversely affect ourbusiness.A major focus of US and other countries’ governmental policiesrelating to financial institutions in recent years has been onfighting money laundering and terrorist financing. We arerequired to maintain effective policies, procedures and controls todetect, prevent and report money laundering and terroristfinancing, and to verify the identity of our clients under the lawsof many of the countries in which we operate. We are also subjectto laws and regulations related to corrupt and illegal payments togovernment officials by others, such as the US Foreign CorruptPractices Act and the UK Bribery Act. We have implementedpolicies, procedures and internal controls that are designed tocomply with such laws and regulations. Notwithstanding this, USregulators have found deficiencies in the design and operation ofanti-money laundering programs in our US operations. We haveundertaken a significant program to address these regulatoryfindings with the objective of fully meeting regulatoryexpectations for our programs. Failure to maintain and implementadequate programs to combat money laundering, terroristfinancing or corruption, or any failure of our programs in theseareas, could have serious consequences both from legalenforcement action and from damage to our reputation. Frequentchanges in sanctions imposed and increasingly complex sanctionsimposed on countries, entities and individuals, as exemplified bythe breadth and scope of the sanctions imposed in relation theRussian invasion of Ukraine, increase our cost of monitoring andcomplying with sanctions requirements and increase the risk thatwe will not identify in a timely manner client activity that is subjectto a sanction.As a result of new and changed regulatory requirements andthe changes we have made in our legal structure, the volume,frequency and complexity of our regulatory and other reportinghas remained elevated. Regulators have also significantlyincreased expectations regarding our internal reporting and dataaggregation, as well as management reporting. We have incurredand continue to incur significant costs to implement infrastructureto meet these requirements. Failure to meet external reportingrequirements accurately and in a timely manner or failure to meetregulatory expectations of internal reporting, data aggregationand management reporting could result in enforcement action orother adverse consequences for us.In addition, despite the contingency plans that we have inplace, our ability to conduct business may be adversely affectedby a disruption in the infrastructure that supports our businessesand the communities in which we operate. This may include adisruption due to natural disasters, pandemics, civil unrest, war orterrorism and involve electrical, communications, transportationor other services that we use or that are used by third parties with whom we conduct business.