Our businesses require us to process and monitor, on a daily basis, a very large number of transactions, many of which are highly complex, across numerous and diverse markets in many currencies. Developing and maintaining our operational systems and infrastructure are challenging, particularly as a result of us and our clients entering into new businesses, jurisdictions and regulatory regimes, rapidly evolving legal and regulatory requirements and technological shifts. Our financial, accounting, data processing or other operating and compliance systems and facilities may fail to operate properly or become disabled as a result of events that are wholly or partially beyond our control, including malicious cyber-attacks or other adverse events, which may adversely affect our ability to process these transactions or provide services or products.
In addition, our operations rely on the secure processing, storage and transmission of confidential and other information on our computer systems and networks. Although we take protective measures, such as software programs, firewalls and similar technology, to maintain the confidentiality, integrity and availability of our and our customers'information, and endeavor to modify these protective measures as circumstances warrant, the nature of cyber threats continues to evolve. As a result, our computer systems, software and networks may be vulnerable to unauthorized access, loss or destruction of data (including confidential customer information), account takeovers, unavailability or disruption of service, computer viruses, acts of vandalism, or other malicious code, ransomware, hacking, phishing and other cyber-attacks and other adverse events that could have an adverse security impact. Additionally, we may be vulnerable to cybersecurity attacks utilizing emerging technologies, such as artificial intelligence. Despite the defensive measures we have taken, these threats may come from external forces, such as governments, nation-state actors, organized crime, hackers, and other third parties, or may originate internally from within us. Given the high volume of transactions involved in our business, certain errors may be repeated or compounded before they are discovered and rectified.
We also face the risk of operational disruption, failure, termination or capacity constraints of any of the third parties that facilitate our business activities, including vendors, customers, counterparties, exchanges, clearing agents, clearinghouses or other financial intermediaries. Such parties could also be the source of a cyber-attack on or breach of our operational systems, network, data or infrastructure. Malicious actors may also attempt to compromise or induce our employees, clients or other users of our systems to disclose sensitive information or provide access to our data, and these types of risks may be difficult to detect or prevent.
There have been an increasing number of ransomware, hacking, phishing and other cyber-attacks in recent years in various industries, including ours, and cybersecurity risk management has been the subject of increasing focus by our regulators. Like other companies, we have on occasion experienced, and may continue to experience, threats to our systems, including viruses, phishing and other cyber-attacks. The number and complexity of these threats continue to increase over time. The techniques used in these attacks are increasingly sophisticated, change frequently and are often not recognized until launched. If one or more cyber-attacks occur, it could potentially jeopardize the confidential, proprietary and other information processed and stored in, and transmitted through, our computer systems and networks, or otherwise cause interruptions or malfunctions in our, as well as our customers' or other third parties' operations, which could result in reputational damage, financial losses, customer dissatisfaction and/or regulatory penalties, which may not in all cases be covered by insurance. If an actual, threatened or perceived cyber-attack or breach of our security occurs, our clients could lose confidence in our platforms and solutions, security measures and reliability, which would materially harm our ability to retain existing clients and gain new clients. As a result of any such attack or breach, we may be required to expend significant resources to repair system, network or infrastructure damage and to protect against the threat of future cyber-attacks or security breaches. We could also face litigation or other claims from impacted individuals as well as substantial regulatory sanctions or fines.
The extent of a particular cyber-attack and the steps that we may need to take to investigate the attack may not be immediately clear, and it may take a significant amount of time before such an investigation can be completed and full and reliable information about the attack is known. While such an investigation is ongoing, we may not necessarily know the full extent of the harm caused by the cyber-attack, and any resulting damage may continue to spread. Furthermore, it may not be clear how best to contain and remediate the harm caused by the cyber-attack, and certain errors or actions could be repeated or compounded before they are discovered and remediated. Any or all of these factors could further increase the costs and consequences of a cyber-attack.
Our regulators in recent years have increased their examination and enforcement focus on all matters of our business, especially matters relating to cybersecurity threats, including the assessment of firms' vulnerability to cyber-attacks. In particular, regulatory concerns have been raised about firms establishing effective cybersecurity governance and risk management policies, practices and procedures that enable the identification of risks, testing and monitoring of the effectiveness of such procedures and adaptation to address any weaknesses; protecting firm networks and information; data loss prevention, identifying and addressing risk associated with remote access to client information and fund transfer requests; identifying and addressing risks associated with customers' business partners, counterparties, vendors, and other third parties, including exchanges and clearing organizations; preventing and detecting unauthorized access or activities; adopting effective mitigation and business continuity plans to timely and effectively address the impact of cybersecurity breaches; and establishing protocols for reporting cybersecurity incidents. As we enter new jurisdictions or different product area verticals, we may be subject to new areas of risk or to cyber-attacks in areas in which we have less familiarity and tools. A technological breakdown could also interfere with our ability to comply with financial reporting requirements. While any insurance that we may have that covers a specific cybersecurity incident may help to prevent the realization of a significant loss from the incident, it would not protect us from the effects of adverse regulatory actions that may result from the incident or a finding that we had inadequate cybersecurity controls, including the reputational harm that could result from such regulatory actions.
Additionally, data privacy is subject to frequently changing rules and regulations in countries where we do business. Rights in relation to an individual's personal data in the EU and U.K. are governed respectively by the GDPR in the EU and the equivalent Data Protection Act 2018 in the U.K. We are subject compliance obligations in relation to such personal data and the possibility of significant financial penalties for non-compliance. We are also subject to certain U.S. federal and state laws governing the protection of personal data. These laws and regulations are increasing in complexity and number. In addition to the increased cost of compliance, our failure to successfully implement or comply with appropriate processes to adhere to the GDPR and other laws and regulations relating to personal data could result in substantial financial penalties for non-compliance, expose us to litigation risk and harm our reputation.
The SEC recently adopted new rules that state that, as a public company, we are required to disclose certain of our processes that relate to cybersecurity and to disclose information relating to material cyber-attacks or other information security breaches. While we view cybersecurity as a top priority, developing and maintaining our operational systems and infrastructure is challenging, particularly as a result of rapidly evolving legal and regulatory requirements and technological shifts. Our financial, accounting, data processing or other operating and compliance systems and facilities may fail to operate properly or become disabled as a result of events that are wholly or partially beyond our control, such as a malicious cyber-attack or other adverse events, which may adversely affect our ability to provide services. Any such cyber incidents involving our computer systems and networks, or those of third parties important to our business, could have a material adverse effect on our business, financial condition, results of operations and prospects.