Our risk management policies and procedures may not be fully effective in mitigating our risk exposure in all market environments or against all types of risks, which could expose us to losses and liability and otherwise harm our business.
We operate in a political and economically volatile country and in a rapidly changing industry. In recent years, we have experienced significant changes to our business, including the launch of new products and services, entering into new areas of activity (credit and banking) and undertaking strategic acquisitions. In addition, the number of clients and their transactions, the complexity and risks of our new products and services, counterparties, suppliers and third-party service providers that work with us has increased. As a result, our risk management policies are challenged to deal with an increasing number of complex risks. For example, we are responsible for vetting and monitoring our clients and determining whether the transactions we process for them are lawful. In this context, our risk management policies, procedures, techniques, and processes may not be partially or fully effective in identifying, monitoring and managing our risks, which may result in financial and reputational losses and liabilities, including civil and criminal.
Because we heavily rely on statistical and artificial intelligence methods in our risk management, we are dependent on data and models. We work with internal data (clients, counterparties, transactions, etc.) and data provided by third parties. In some cases, that information may not be accurate, complete or up to date, which can result in errors. We face model risk because we may, among other reasons, be unsuccessful in determining the appropriate models (i.e., by selecting the wrong variables or not selecting important variables), by failing to choose the appropriate quantitative methods, by failing to detect and properly treat regime changes in the available sample, or by making operational errors in deploying the model to production environment. Quantitative modeling is a central activity of our risk management team. It is especially important to credit risk, market risk and fraud detection and prevention.
Indeed, we face model risk in almost all areas of our business. For example, we are dependent on quantitative modeling to make decisions in areas such as logistics, customer relations and engagement, finance, credit, fraud prevention, marketing and strategy.
Cybersecurity attacks could result in data breaches and severely damage our reputation, business and financial condition.
Our business is vulnerable to cybersecurity attacks, which could have a significant impact on our operations. As we expand our banking and credit business lines, our risk of being subject to cybersecurity attacks increases. Brazilian businesses are particularly subject to frequent cybersecurity attacks. The techniques used to obtain unauthorized, improper, or illegal access to our systems, our data, client data or end-user data, disable or degrade service, or sabotage systems are constantly evolving and have become increasingly complex and sophisticated, may be difficult to detect quickly, and may not be recognized or detected until after they have been launched against a target. These attacks can be carried out by hackers, linked or not to criminal groups, aimed at stealing sensitive data, money, or disrupting our operations.
The cyber risks that we are exposed to include but are not limited to:
- Data theft: Hackers can steal confidential information, such as credit card numbers, bank account information, passwords, and personal identification data.
- Phishing and spear phishing attacks: Phishing attacks can be used to steal confidential information or install malware on our systems.
- Malware: Malware can be used to steal our data or disrupt our operations.
- Ransomware: Ransomware is a type of malware that can restrict our access to our files, data and operations and can demand ransom in exchange for restoring any of the items mentioned.
-
Denial of Service (DDoS) attacks: DDoS attacks can overwhelm our systems, making them inaccessible.
-
Social engineering attacks: Hackers can use social engineering to manipulate our employees and gain access to confidential systems and data.
-
Software and hardware vulnerabilities: Vulnerabilities in our software and hardware can be exploited by hackers to access the institution’s systems.
-
Insider attacks: Cyberattacks can also be carried out by malicious employees who have access to confidential systems and data.
Cybersecurity attacks have become more frequent, sophisticated, and riskier. In 2025, Brazil faced a series of cybersecurity attacks that resulted in the illicit transfer of hundreds of millions of Brazilian reais. For instance, the highest profile case was an attack on C&M Software. The fraud involving C&M Software, which occurred between June and July 2025, represented an unprecedented attack on the infrastructure of the Brazilian payment system. Unlike common scams targeting cardholders, this criminal action exploited the company’s role as an information technology service provider, which connects medium-sized banks and fintechs directly to the Central Bank for Pix settlement. Through the co-opting of an internal employee and the use of social engineering, the fraudsters obtained privileged credentials and legitimate digital certificates. With this access, they managed to bypass security layers and trigger automated payment orders from the financial institutions’ reserve accounts, embezzling an estimated amount between R$800 million and R$1 billion (approximately US$150 million – US$190 million).
The impact of the operation was immediate, forcing the Central Bank to disconnect C&M from the system and paralyzing Pix functionality for thousands of users across various fintechs. The diverted capital was dispersed through a network of “mule” accounts and quickly converted into cryptocurrencies to hinder international tracking. The episode served as a watershed moment for the sector, compelling the regulator to impose much stricter cybersecurity standards and third-party risk monitoring for all entities operating within the vital infrastructure of the national financial system.
Any integration of artificial intelligence in our or any third party’s operations is expected to pose new or unknown cybersecurity risks and challenges. The consequences of a cybersecurity attack could severely harm us through financial and reputational losses, regulatory penalties, and impact on our clients’ business.
An occurrence of a natural disaster, widespread health epidemic or other outbreaks could have a material adverse effect on our business, financial condition and results of operations.
Our business could be materially and adversely affected by natural disasters, such as fires or floods, or other events, such as wars, acts of terrorism, environmental accidents, power shortages, communication interruptions, pandemics or epidemics. These events could cause us to close our operating facilities temporarily. In addition, our net sales could be materially reduced to the extent that a natural disaster, health epidemic or other major event harms the economy of the countries where we operate. Our operations could also be severely disrupted if our clients or other participants were affected by natural disasters, health epidemics or pandemics or other major events. Such events could also negatively impact our clients and other participants’ operations in a way that harms our business.
Our insurance policies may not be sufficient to cover all claims.
Our hedge and insurance policies may not adequately mitigate all the risks to which we are exposed. For example, as of the date of this report, we do not maintain insurance policies contracted specifically for property, business interruptions or cybersecurity. A significant claim not covered by our insurance, in full or in part, may result in significant expenditures by us. Moreover, we may not be able to maintain insurance policies in the future at reasonable costs or on acceptable terms, which may adversely affect our business.
Our systems and our third-party providers’ systems may fail, which could interrupt our service, cause us to lose business and increase our costs.
We are dependent on the ability of our products and services to integrate with a variety of systems, including but not limited to software, data centers, cloud infrastructures, telecommunications and internet networks. Our card transactions, for example, are dependent on telecommunications, internet, cloud infrastructures and data centers, among others. We depend on the efficient and uninterrupted individual and joint operation of them.
These systems and operations could be exposed to damage or interruption due to, among other things, the occurrence of spikes in user volume, fire, natural disaster, power loss, human errors, telecommunications failure, cyber-attacks, acts of terrorism, vandalism or sabotage, unauthorized entry, hosting disruptions, capacity constraints or computer viruses.
We rely on a combination of our own systems and systems licensed to us by third-party providers. We rely on our subsidiary, Buy4 Processamento de Pagamentos S.A., to provide transaction authorization and settlement, computing, storage, processing and other related services for card transactions. Our operations depend, in part, on our providers’ ability to protect their facilities against damage or interruptions and their continued provision of services, as well as to providing us adequate advanced notice in the event that they decide to close a facility. Our solutions, including hardware and software, interoperate with mobile networks offered by telecom operators and mobile devices developed by third parties. Changes in these networks or in the design of these mobile devices may limit the interoperability of our solutions with such networks and devices and require modifications to our solutions. If we are unable to ensure that our hardware continues to interoperate effectively with such networks and devices, or if doing so is costly, our business may be materially and adversely affected. We utilize data center hosting facilities from third-party service providers to make certain products and services available to our customers. See “Item 4. Information on the Company – D. Property, plants and equipment” for information regarding our data center facilities.
We also rely on card issuers and payment schemes to process our transactions. It is mandatory under the Central Bank rules that Acquirers register daily in trade repositories all card receivables owned by merchants (credit and debit). On the other hand, it is also mandatory that institutions willing to negotiate those receivables also register their contracts in such trade repositories. Therefore, as our group includes an Acquirer (Stone IP) and a financial institution (Stone SCD), it registers the merchants’ receivables through TAG Tecnologia para o Sistema Financeiro S.A. (“TAG”) (a StoneCo company), and its contracts through TAG, CERC Central de Recebíveis S.A. (“CERC”), CIP S.A. (“Nuclea”), and B3 S.A. – Brasil, Bolsa, Balcão (“B3”). Any failure to settle the merchant’s receivables in accordance with the information registered in the trade repository is considered an Acquirers’ misconduct. Under existing rules, while Acquirers may only choose one trade repository, increasing risks due to system failures, financial institutions may choose as many as they want, mitigating system unavailability risks. On June 6, 2021, the interoperability between financial market infrastructures (TAG, CERC, Nuclea and, more recently, B3) was launched under the rules of the Central Bank. Pursuant to applicable rules, the Acquirer must settle the merchants’ receivables in accordance with the information registered in the chosen trade repository and contracts regarding card receivables are only effective and made public when registered in a trade repository. We also rely on the Central Bank’s Brazilian Payment System (Sistema Brasileiro de Pagamentos, SPB) and Instantaneous Payment System (Sistema de Pagamentos Instantâneos, SPI) to receive and send funds electronically in our platform that serves acquiring, banking and credit businesses.
Our systems, our subsidiaries’ systems, and those of third parties have experienced defects, errors, delays, and other difficulties in processing our transactions (for example payment, banking, and credit transactions), communication channels with our clients, and our internal operations. If they experience such problems in the future, they could result in:
- Loss of clients or early termination of customer contracts.
- Loss of revenues, including subscription revenues owed from equipment rentals.
- Loss of merchant and Cardholder data.
-
Loss of reputation resulting from negative publicity.
-
Penalties applied by Visa, Mastercard or other payment schemes, including loss of licenses and fines.
-
Loss of Central Bank authorizations granted by the Central Bank to operate as a payment institution (instituição de pagamento), a direct credit company (sociedade de crédito direto), a trade repository (entidade registradora), and a financial services company (Sociedade de Crédito, Financiamento e Investimento S.A.) in Brazil.
-
Fines or other penalties imposed by the Central Bank, as well as other measures taken by the Central Bank, including intervention, temporary special management, insolvency proceedings, and/or the out-of-court liquidation of Stone IP and any of our subsidiaries to whom licenses may be granted in the future.
-
Fines or other penalties imposed by ANPD.
-
Exposure to fraud losses or other liabilities.
-
Indemnity actions imposed by customers.
-
Additional operating and development costs.
-
Diversion of technical and other resources.
While much of our processing infrastructure is located in multiple, redundant data centers and clouds, we have some core business systems that are located in only one facility and do not have redundancy. An adverse event that results in the unavailability of such systems or the facilities in which they are located could harm us.
Any changes in systems or networks belonging to third-party providers that degrade the functionality of our products and services may result in additional costs or requirements on us re-establishing the proper level of the functionality, or give preferential treatment to competitive services, including their own services, could materially and adversely affect usage of our products and services.
While we maintain four data centers and cloud infrastructure operating across multiple regions, which provides meaningful resilience within areas under our direct control, we cannot assure that our disaster recovery and business continuity plans are adequate or will function as intended when activated. Our operations also use third-party providers’ systems whose own resilience and recovery capabilities are outside our direct control. A failure in any of these dependencies during a recovery scenario could extend our recovery timeline beyond what our plans contemplate. If our disaster recovery or business continuity plans prove inadequate, we could experience prolonged service interruptions, fail to meet settlement obligations, lose Central Bank authorizations and suffer reputational and financial harm.
Our use of open source software could negatively affect our ability to sell our solutions and subject us to possible litigation.
Our solutions incorporate and are dependent to some extent on the use and development of open source software and we intend to continue our use and development of open source software in the future. Such open source software is generally licensed by its authors or other third-parties under open source licenses and is typically freely accessible, usable and modifiable. Pursuant to such open source licenses, we may be subject to certain conditions, including requirements that we offer our proprietary software that incorporates the open source software for no cost, that we make available source code for modifications or derivative works we create based upon, incorporating or using the open source software and that we license such modifications or derivative works under the terms of the particular open source license. If an author or other third-party that uses or distributes such open source software were to allege that we had not complied with the conditions of one or more of these licenses, we could be required to incur significant legal expenses defending against such allegations and could be subject to significant damages, enjoined from the sale of our solutions that contained or are dependent upon the open source software and required to comply with the foregoing conditions, which could disrupt the distribution and sale of some of our solutions. Litigation could be costly for us to defend, have a negative effect on our operating results and financial condition or require us to devote additional research and development resources to change our platform. The terms of many open source licenses to which we are subject have not been interpreted by courts. The potential impact of these terms on our business is uncertain and may result in unanticipated obligations regarding our solutions and technologies.
Furthermore, any requirement to disclose our proprietary source code, termination of open source license rights or payments of damages for breach of contract could be harmful to our business, results of operations or financial condition and could help our competitors develop products and services that are similar to or better than ours.
In addition to risks related to license requirements, use of open source software can lead to greater risks than use of third-party commercial software, as open source licensors generally do not provide warranties, controls on the origin or development of the software, or remedies against the licensors. Many of the risks associated with the usage of open-source software cannot be mitigated and could adversely affect our business.
Although we believe that we have complied with our obligations under the various applicable licenses for open-source software, it is possible that we may not be aware of all instances where open-source software has been incorporated into our proprietary software or used in connection with our solutions or our corresponding obligations under open-source licenses. We do not have open source software usage policies or monitoring procedures in place. We rely on multiple software programmers to design our proprietary software and we cannot be certain that our programmers have not incorporated open-source software into our proprietary software that we intend to maintain as confidential or that they will not do so in the future.
Unauthorized disclosure, destruction or modification of data, through cybersecurity breaches, computer viruses or otherwise or disruption of our services could expose us to liability, protracted and costly litigation and damage our reputation.
Our business involves the collection, storage, processing and transmission of customers’ personal data, including names, addresses, identification numbers, credit or debit card numbers and expiration dates and bank account numbers. Concerns about data security are increased when we transmit information. Electronic transmissions can be subject to attack, interception or loss. Also, computer viruses and malware can be distributed and spread rapidly over the internet and could infiltrate our systems or those of our associated participants, which can impact the confidentiality, integrity and availability of information. In addition, data security threats may derive from human error, fraud and malice on the part of our third-party employees, and accidental technological failure.
In the scope of our activities, we share information with third parties, including commercial partners, third-party service providers and other agents, which we refer to collectively as “associated participants”, who collect, process, store and transmit sensitive data. Given the rules established by the payment scheme settlors, such as Visa and Mastercard, and applicable regulations, we may be held responsible for any failure or cybersecurity breaches attributed to these third parties insofar as they relate to the information we share with them.
The loss, destruction or unauthorized modification of data of the end users of payment services (e.g., payers, receivers, Cardholders, merchants, and those who may hold funds in their accounts) by us or our associated participants or through systems we provide could result in significant fines, sanctions and proceedings or actions against us by payment schemes, ANPD or third parties. In addition, a significant data breach from our systems and communications could result in payment schemes prohibiting us from processing transactions on their schemes or the loss of Central Bank authorization to operate as a payment institution in Brazil, which could materially impede our ability to conduct business.
Our encryption of data and other protective measures may not prevent unauthorized access or use of data and sensitive data. A breach of our system or that of one of our associated participants may subject us to material losses or liability, assessments and claims for unauthorized purchases with misappropriated credit, debit or card information, impersonation or other similar fraud claims. Misuse of such data or a cybersecurity breach could harm our reputation and deter merchants from using electronic payments generally and our products and services specifically. In addition, any such misuse or breach could cause us to incur costs to correct the breaches or failures, expose us to uninsured liability, increase our risk of regulatory scrutiny, subject us to lawsuits, and result in the imposition of material penalties and fines under state and federal laws or regulations or by payment schemes.
We cannot assure you that there are written agreements in place with every associated participant or that such written agreements will prevent the unauthorized use, modification, destruction or disclosure of data or enable us to obtain reimbursement from associated participants in the event we should suffer incidents resulting in unauthorized use, modification, destruction or disclosure of data. In addition, many of our associated participants are small- and medium-sized agents that have limited competency regarding data security and handling requirements and may thus experience data losses. Any unauthorized use, modification, destruction or disclosure of data could result in protracted and costly litigation.
We may not be able to successfully manage our intellectual property and may be subject to infringement claims.
Our business relies on a number of forms of intellectual property rights, including trademarks, domain names, software, know-how, trade secrets technologies and other proprietary information, and we use a combination of contractual provisions, confidentiality procedures, and other approaches to establish and protect our intellectual property rights. We have been granted numerous trademarks and software covering our brands and products and have filed, and expect to continue to file, trademark applications before the patent, trademark and software offices in a number of jurisdictions, including the Brazilian Patent and Trademark Office (INPI) seeking to protect newly developed trademarks and products. We cannot be sure that intellectual property rights will be granted with respect to any of our trademarks, applications will be granted, or that any such patent, trademark and software offices shall continue to protect our intellectual property rights with respect to any of our trademarks, applications and products. We may not be able to successfully manage our intellectual property and may be subject to infringement claims.
Third-parties may challenge, invalidate, circumvent, infringe, misappropriate or otherwise violate any existing or future intellectual property assets requested by, issued to, or licensed by, us. Additionally, our intellectual property rights may not be sufficient to permit us to take advantage of current market trends or otherwise to provide competitive advantages, to our business, and as a result, we may be forced to engage in costly redesign efforts, discontinuance of certain service offerings or other competitive harm. There is also a risk that we may, by omission, fail to renew our intellectual property rights on a timely basis in certain jurisdictions. Moreover, others, including our competitors, may independently develop similar technology, duplicate our services or design around our intellectual property, and in such cases, we may not to be able to assert our intellectual property rights against such parties. Furthermore, our contractual arrangements may not effectively prevent disclosure of our confidential information or provide an adequate remedy in the event of unauthorized disclosure of our confidential information. We may have to litigate to enforce or determine the scope and enforceability of our intellectual property rights, trade secrets and know-how, which is expensive and time-consuming, could cause a diversion of resources and may not prove successful. Such cases may expose us and negatively affect the use of our intellectual property and we may be prohibited from continuing to exploit them.
Due to the rapid pace of technological change in our industry, aspects of our business and our services rely on technologies developed or licensed by third parties, and we may not be able to obtain or continue to obtain licenses and technologies from these third parties on reasonable terms or at all. The loss of intellectual property protection, the inability to obtain third-party intellectual property or delay or refusal by relevant regulatory authorities to approve pending intellectual property registration applications could harm our business and ability to compete.
We may also be subject to costly litigation in the event our services and technology infringe upon, misappropriate or otherwise violate a third-party’s proprietary rights. Third parties may have, or may eventually be issued, patents, trademarks, trade secrets or other intellectual property that may be infringed upon, misappropriated or otherwise violated by our services, or may otherwise conflict with our own proprietary rights. We may also be subject to claims by third-parties alleging that we have breached any of our applicable copyright, trademark, license usage or other intellectual property licenses or agreements. Any such claim from third-parties may be expensive, time consuming and result in a limitation of our ability to use the intellectual property subject to such claims and may prevent us from registering certain trademarks, domain names, industrial designs, patents or other intellectual property assets. Additionally, in recent years, individuals and groups have been purchasing intellectual property assets for the sole purpose of making claims of infringement and attempting to extract settlements from companies like ours. Even if we believe that intellectual property related claims brought by such individuals are without merit, defending against such claims is time-consuming and expensive and could result in the diversion of the time and attention of our management and employees. Claims of intellectual property infringement also might require us to redesign affected services, enter into costly settlement or license agreements, pay costly damage awards, change our brands, or face a temporary or permanent injunction prohibiting us from marketing or selling certain of our services or using certain of our brands. Even if we have an agreement for indemnification against such costs, the indemnifying party, if any in such circumstances, may be unable to uphold its contractual obligations. If we cannot or do not license the infringed technology on reasonable terms or substitute similar technology from another source, our revenue and earnings could be adversely impacted.
In a dynamic industry like ours, the ability to attract, recruit, develop and retain key personnel and qualified employees is critical to our success and growth. If we are not able to do so, our business, financial condition and results of operations may be adversely affected.
We are dependent upon the ability and experience of several key personnel who have substantial experience with our operations and in the markets in which we offer our products and services. Many of our key personnel have worked for us for a significant amount of time or were recruited by us specifically due to their industry experience. It is possible that the loss of the services of one or a combination of our senior executives or key managers could have a negative effect on us. On November 13, 2024, the Central Bank enacted Resolution No. 432 that establishes minimum standards for management compensation policies in payment institutions, in line with FSB (Financial Stability Board) Principles for Sound Compensation Practices and their implementation standards. In a similar manner, CMN Resolution No. 5,177, enacted in September 2024, extended to SCDs management compensation standards already applicable to other financial institutions (such as Stone SCFI).
Furthermore, in order for us to successfully compete and grow, we must attract, recruit, develop and retain the necessary personnel who can provide the needed expertise across the entire spectrum of our intellectual capital needs. We also must develop our personnel to provide succession plans for our existing key personnel in order to be capable of maintaining continuity in the midst of the inevitable unpredictability of human capital. However, the market for qualified personnel is competitive, and we may not succeed in recruiting additional personnel or may fail to effectively replace current personnel who depart with qualified or effective successors. For instance, our Stone Agents are highly trained and, accordingly, we may face challenges in recruiting and retaining such qualified personnel. Our efforts to retain and develop personnel may also result in significant additional expenses, which could adversely affect our profitability. We cannot assure you that qualified employees will continue to be employed or that we will be able to attract and retain qualified personnel in the future. Failure to retain or attract key personnel could have a material adverse effect on our business, financial condition and results of operations.
We may identify material weaknesses in our internal control over financial reporting and, if we fail to maintain effective internal controls over financial reporting, we may be unable to accurately report our results of operations, meet our reporting obligations or prevent fraud.
We cannot provide assurance that significant deficiencies or material weaknesses in our internal control over financial reporting will not be identified in the future. If we fail to maintain the adequacy of our internal control over financial reporting, as the laws, regulations and policies standards are modified, supplemented or amended from time to time, we may not be able to conclude on an ongoing basis that we have effective internal control over financial reporting in accordance with Section 404 of the Sarbanes-Oxley Act of 2002. If we fail to maintain an effective internal control environment, we could suffer material misstatements in our financial statements, fail to meet our reporting obligations or fail to prevent fraud, which would likely cause investors to lose confidence in our reported financial information. This could, in turn, limit our access to capital markets and harm our results of operations. Additionally, ineffective internal control over financial reporting could expose us to increased risk of fraud or misuse of corporate assets and subject us to potential delisting from Nasdaq, regulatory investigations and civil or criminal sanctions.
Degradation of the quality of the products and services we offer, including support services, could adversely affect our ability to attract and retain clients and partners and client attrition or a decline in our clients’ growth rate could cause our revenues to decline.
We experience churning in our client base resulting from several factors, including but not limited to business closures, transfers of clients’ accounts and credit products or a reduction in same-store sales. We may not be able to accurately predict the level of churn in the future and our revenues could decline as a result of higher-than-expected churn, which could have a material adverse effect on our business, financial condition and results of operations.
Our clients expect a consistent level of quality in the provision of our products and services. The support services that we provide are also a key element of the value proposition to our clients. If the reliability or functionality of our products and services is compromised or if the quality of those products or services is otherwise degraded, or if we fail to continue to provide a high level of support, we could see an increase in our client churn and find it harder to attract new clients and partners.
Our growth to date has been partially driven by the growth of our clients’ businesses and the resulting growth in usage of our products and services, mainly driven by TPV and credit disbursements. Should the rate of growth of our clients’ business slow or decline, generated by macroeconomic or industry factors, this could have an adverse effect on volumes processed and on the usage of our products and services, therefore leading to an adverse effect on our results of operations. If we are unable to scale our support functions to address our growth, the quality of our support may decrease, which could adversely affect our ability to attract and retain clients and partners.
We are dependent on a few manufacturers for a substantial amount of our POS devices. We are at risk of shortage, price increases, changes, delay or discontinuation of key components from our POS device manufacturers, which could disrupt and harm our business.
Our acquiring business is dependent on a few manufacturers for a substantial amount of our POS devices. We are constrained by their manufacturing capabilities and pricing as well as general counterparty risk. We may face production delays or escalating costs if they are unable to manufacture enough products at an affordable cost. Further, we could face production delays if it becomes necessary to replace the existing substantial suppliers with more alternative suppliers.
We may also be subject to product recalls or other quality-related actions if such devices, or other products supplied by us, are believed to cause injury or illness, or if such products are defective or fail to meet our quality control standards or standards established by applicable law. If our POS suppliers are unable or unwilling to recall products and fail to meet applicable quality standards, we may be required to recall those products at a substantial cost to us. Recalls and government, customer or consumer concerns about product safety could harm our reputation, brands and relationships with clients, lead to increased costs, loss of revenues (including revenues from equipment rentals and/or decreased transaction volumes), and/or loss of merchants, any of which could have a material adverse effect on our business, results of operations and financial condition.
Additionally, agreements for the components used to manufacture our POS devices are entered into directly by the manufacturer of our POS devices and we do not have agreements with these suppliers. Some of the key components used to manufacture our POS devices, such as the chip, pin reader and battery, come from limited sources of supply in limited countries in Asia. In addition, the geopolitical tensions and risks involving these countries, in particular, Taiwan and China, have been increasing in the last years. The policies and mitigators in place to contain the impacts of potential geopolitical crisis may fail. Due to the reliance of our POS manufacturers on these components, we are subject to the risk of shortages and long lead times in the supply of certain products. If our manufacturers cannot find alternative sources of supply, we could be subject to components shortages or delays or other problems in product assembly. In addition, various sources of supply-chain risk, including strikes or shutdowns, or loss of or damage to our products while they are in transit or storage, could limit the supply of our POS devices.
The materialization of the risks above would harm our ability to provide our POS devices or other services to our merchants on a timely basis. This could damage our relationship with our clients, prevent us from acquiring new clients, and harm our business.
Our operating results are subject to seasonal fluctuations, which could result in variations in our quarterly profit.
We have experienced in the past, and expect to continue to experience, seasonal fluctuations in our revenues as a result of consumer spending patterns. Historically, our revenues have been strongest during the last quarter of the year as a result of higher sales during the Brazilian holiday season. This is due to the increase in the number and amount of electronic payment transactions related to seasonal retail events. Adverse events that occur during these months could have a disproportionate effect on our results of operations for the entire fiscal year. As a result of quarterly fluctuations caused by these and other factors, comparisons of our operating results across different fiscal quarters may not be accurate indicators of our future performance.
Fraud activities could have a material adverse effect on our business, reputation, financial condition, and results of operations.
The highly automated nature of, and liquidity offered by our products and services make us a target for illegal or improper uses, including fraudulent or illegal sales of goods or services, money laundering and terrorist financing. These types of illegitimate, as well as unlawful, transactions can also expose us to governmental and regulatory sanctions, including outside of Brazil (e.g., U.S. anti-money laundering and economic sanctions violations). In configuring our products and services, we face an inherent trade-off between security and client convenience.
Frauds may occur in all the different financial services segments we operate in. We may be subject to potential liability for fraudulent electronic payment transactions or credits initiated by merchants or others, as well as by clients using our credit or digital banking solutions. In acquiring, merchant fraud includes when a merchant or other party knowingly uses stolen or counterfeit credit, debit or prepaid card, card number, or other credentials to record a false sales transaction, processes an invalid card, or intentionally fails to deliver the merchandise or services sold in an otherwise valid transaction. Payment schemes may identify merchants as questionable or potentially fraudulent through monitoring and audit processes, impose financial penalties on the acquirer and, in certain cases, shift liability from the card issuer to the acquirer. Because we are reducing the period between the card transaction and the receivables anticipation to minutes in some products, the fraud risk tends to increase despite our efforts to contain it. In credit, a common fraud in working capital loans involves using falsification of balance sheets and income statements to inflate actual revenue and hide liabilities to create the illusion of robust financial health, securing higher credit limits. In banking, identity thieves and those committing fraud using bank account numbers may cash out our client balance. In addition, they may also cash out the proceeds from our credit products.
Additionally, we must consider potential liabilities related to privacy and data protection, particularly in cases where personal information is compromised due to fraudulent activities. Criminals are using increasingly sophisticated methods to engage in illegal activities such as counterfeiting and fraud. It is possible that incidents of fraud could increase in the future, and our failure to catch such incidents may result in sanctions and/or fines from regulators, lawsuits and the degradation of our reputation. Failure to effectively manage risk and prevent fraud would increase our Chargeback and credit liabilities, default rates on our credit solutions, among others, and subject us to potential fines by regulators. Increases in fraudulent activities using our products and services could have a material adverse effect on our business, reputation as a financial services provider, financial condition, and results of operations.
We partially rely on Card Issuers or payment schemes to process our transactions. If we fail to comply with the applicable requirements of Visa, Mastercard or other payment schemes, those payment schemes could seek to fine us, suspend us or terminate our registrations, which could have a material adverse effect on our business, financial condition or results of operations.
We rely on Card Issuers and payment schemes to enable card acceptance and, in order to provide this service to our clients, we must pay fees to the payment schemes and Card Issuers, according to the applicable fees defined by the payment schemes regulation. A significant source of our revenue comes from processing transactions through Visa, Mastercard and other payment schemes. The payment schemes routinely update and modify their requirements and may increase or enforce new fees that can be charged by different billing methods, including fees per transaction by using one of their cards. Those changes in the requirements, including changes to risk management and collateral requirements, may impact our ongoing cost of doing business and, in some circumstances, we may not be able to pass through such costs to our clients or associated participants.
Furthermore, if we do not comply with the payment scheme requirements (e.g., their rules), the payment schemes could seek to fine us, suspend us or terminate our registrations that allow us to process transactions on their schemes. On occasion, we have received notices of noncompliance and fines, which have been typically related to transactional or messaging requisites, as well as excessive Chargebacks by a merchant or data security failures on the part of a merchant. If we are unable to recover amounts relating to fines or pass through the costs to our merchants or other associated participants, we would experience a financial loss. The termination of our registration due to failure to comply with the applicable requirements of Visa, Mastercard or other payment schemes, or any changes in the payment scheme rules that would impair our registration, could require us to stop allowing our clients to accept Visa, Mastercard or other payment schemes, which could have a material adverse effect on our business, financial condition and results of operations.