We electronically receive, process, store and transmit sensitive information of our clients including personal data, such as, without limitation, names and addresses, social security numbers, driver's license numbers, such information is necessary to support our clients' investment transactions. The uninterrupted operation of our information systems, as well as the confidentiality of the customer information that resides on such systems, is critical to our successful operation. Bad actors may attempt to harm us by gaining access to confidential or proprietary client information, often with the intent of stealing from or defrauding us or our clients. In some cases, they seek to disrupt our ability to conduct our business, including by destroying information maintained by us. For that reason, cybersecurity is one of the principal operational risks we face as a provider of financial services and our operations rely on the effectiveness of our information and cyber security policies, procedures and capabilities to provide secure processing, storage and transmission of confidential and other information in our computer systems, software, networks and mobile devices and on the computer systems, software, networks and mobile devices of third parties on which we rely. Although we maintain a system of internal controls designed to provide reasonable assurance that fraudulent activity is either prevented or detected on a timely basis and we take other protective measures and endeavor to modify them as circumstances warrant, our computer systems, software, networks and mobile devices may be vulnerable to cyber-attacks, sabotage, unauthorized access, computer viruses, worms or other malicious code, and other events that have a security impact. In addition, our interconnectivity with service providers and other third parties may be adversely affected if any of them are subject to a successful cyber-attack or other information security event. While we collaborate with service providers and other third parties to develop secure transmission capabilities and other measures to protect against cyber-attacks, we cannot ensure that we or any third party has all appropriate controls in place to protect the confidentiality of such information.
An externally caused information security incident, such as a cyberattack, which could include computer viruses, malware, malicious or destructive code, social engineering, phishing, denial-of-service attacks, ransomware, or identity theft, or an internally caused issue, such as failure to control access to sensitive systems, could materially interrupt business operations or cause disclosure or modification of sensitive or confidential client or competitive information and could result in material financial loss, loss of competitive position, regulatory actions, breach of client contracts, reputational harm or legal liability. If one or more such events occur, it could potentially jeopardize our or our clients', employees' or counterparties' confidential and other information processed and stored in, and transmitted through, our or third-party computer systems, software, networks and mobile devices, or otherwise cause interruptions or malfunctions in our, our clients', our counterparties' or third parties' operations. As a result, we could experience material financial loss, loss of competitive position, regulatory fines and/or sanctions, breach of client contracts, reputational harm or legal liability, which, in turn, could have an adverse effect on our financial condition and results of operations.
As a provider of financial services, we are bound by the disclosure limitations and if we fail to comply with these regulations and industry security requirements, we could be exposed to damages from legal actions from clients, governmental proceedings, governmental notice requirements, and the imposition of fines or prohibitions on the services we provide. Additionally, some of our client contracts require us to indemnify clients in the event of a cyber breach if our systems do not meet minimum security standards. We may be required to spend significant additional resources to modify our protective measures or to investigate and remediate vulnerabilities or other exposures, and we may be subject to litigation and financial losses that are either not insured against fully or not fully covered through any insurance that we maintain. Further, in the event of a security breach to a service provider, we may not receive timely notice of or sufficient information about the breach to be able to exert any meaningful control or influence over how and when the breach is addressed.
Increasing government and regulatory scrutiny of the measures taken by companies to protect against cyberattacks and data privacy breaches, and have resulted in heightened security requirements, including additional regulatory expectations for oversight of vendors and service providers. If more restrictive privacy laws, rules or industry security requirements are adopted in the future on the Federal or State level, or by a specific industry body, they could have an adverse impact on us through increased costs or business restrictions.
Any inability to prevent security or privacy breaches, or the perception that such breaches may occur, could cause our existing clients to lose confidence in our systems and terminate their agreements with us, inhibit our ability to attract new clients, result in increasing regulation, or bring about other adverse consequences from the government agencies that regulate our business.
We may use artificial intelligence in our business, and challenges with properly managing its use could result in reputational harm, competitive harm, and legal liability, and adversely affect our results of operations.
We may incorporate artificial intelligence ("AI") solutions into our platform, offerings, services and features, and these applications may become important in our operations over time. Our competitors or other third parties may incorporate AI into their products more quickly or more successfully than us, which could impair our ability to compete effectively and adversely affect our results of operations. Additionally, if the content, analyses, or recommendations that AI applications assist in producing are or are alleged to be deficient, inaccurate, or biased, our business, financial condition, and results of operations may be adversely affected.
The use of AI applications has resulted in, and may in the future result in, cybersecurity incidents that implicate the personal data of end users of such applications. Any such cybersecurity incidents related to our use of AI applications could adversely affect our reputation and results of operations. AI also presents emerging ethical issues and if our use of AI becomes controversial, we may experience brand or reputational harm, competitive harm, or legal liability. The rapid evolution of AI, including potential government regulation of AI, will require significant resources to develop, test and maintain our platform, offerings, services, and features to help us implement AI ethically in order to minimize unintended, harmful impact.