In the ordinary course of business, we collect and process personal data and other sensitive information, including proprietary and confidential business data, trade secrets, employee data, intellectual property, data we collect about trial participants in connection with clinical trials, and other sensitive third-party data. Our data processing activities may subject us to numerous privacy and data protection obligations, such as various laws, regulations, guidance, industry standards, external and internal privacy and security policies, contractual requirements, and other obligations relating to privacy and data protection.
Various federal, state, local and foreign legislative and regulatory bodies, or self-regulatory organizations, may expand or amend current laws, rules or regulations, enact new laws, rules or regulations or issue revised rules or guidance regarding privacy and data protection. In the United States, federal, state, and local governments have enacted numerous privacy and data protection laws, including data breach notification laws, personal data privacy laws, consumer protection laws, e.g., Section 5 of the Federal Trade Commission Act, and other similar laws, e.g., wiretapping laws. HIPAA, as amended by the Health Information Technology for Economic and Clinical Health Act of 2009 and their respective implementing regulations (collectively, HIPAA), imposes certain privacy and security requirements for individually identifiable health information on certain entities, namely certain healthcare providers, health plans, and healthcare clearinghouses (covered entities) and their respective "business associates" who directly or as a subcontractor provide services involving the creation, use, maintenance or disclosure of individually identifiable health information on covered entities' behalf. As a clinical trial sponsor, we are not directly subject to HIPAA, but we do have relationships with providers and other entities subject to the law and thus must structure those relationships in a manner consistent with HIPAA requirements. If any of the physicians or other health care providers or entities with whom we expect to do business are found to be not in compliance with HIPAA or other applicable privacy laws, they may be subject to criminal, civil or administrative sanctions, including exclusions from government funded health care programs. If regulatory authorities challenge our activities, or those of a collaborator or other third party on which we rely, under HIPAA or other privacy laws applicable to the privacy and security of health information, any such challenge could have a material adverse effect on our reputation, business, results of operations and financial condition. Any investigation of or enforcement against us or the third parties with whom we contract, including a research collaborator, regardless of the outcome, would be costly and time consuming, and may negatively affect our ability to conduct clinical trials, results of operations and financial condition.
Other federal and state laws establish additional requirements for protecting the privacy and security of health information that is not protected by HIPAA. For instance, Washington state recently passed the "My Health My Data" Act, which came into force in 2024 and regulates "consumer health data," which is defined as "personal information that is linked or reasonably linkable to a consumer and that identifies a consumer's past, present, or future physical or mental health." The "My Health My Data" Act provides exemptions for personal data used or shared in connection with certain research activities, including data subject to 45 C.F.R. Parts 46, 50 and 56. Notably, the "My Health My Data" Act contains a private right of action. In addition, Nevada recently enacted a consumer health data privacy bill, SB 370, which also took effect in 2024, and regulates "consumer health data." SB 370 shares many similarities with Washington's "My Health My Data" Act, and Connecticut recently amended its comprehensive privacy law to include heighted regulation of "consumer health data." Additional states may adopt health-specific privacy laws that could impact our business activities and our collection and handling of health-related data.
More broadly, various U.S. states now regulate the processing of personal data. For example, California was the first of an ever-increasing number of states to enact comprehensive state privacy legislation with the California Consumer Privacy Act (CCPA), which went into effect in January of 2020. The CCPA established a privacy framework for covered businesses by creating an expanded definition of personal data, establishing data privacy rights for California residents, requiring covered businesses to provide disclosures to California residents, and creating a statutory damages framework with the potential for severe damages for violations of the CCPA and for businesses that fail to implement reasonable security procedures and practices to prevent data breaches, as well as a private right of action for certain data breaches. Additionally, in 2020 California voters passed the California Privacy Rights Act of 2020 (CPRA), which went into effect on January 1, 2023. The CPRA significantly amends and expands the CCPA, such as granting additional rights to California residents, including the right to correct personal data and additional opt-out rights. Among other things, the CPRA also establishes a regulatory agency, the California Privacy Protection Agency, which enacts new regulations under the CCPA and has expanded enforcement authority. In 2023, comprehensive privacy laws in Virginia, Colorado, Connecticut, and Utah all took effect, and laws in Montana, Oregon, and Texas took effect during 2024. Laws in a number of other U.S. states took effect, or are set to take effect, in 2025, in 2026, and beyond. Additional U.S. states have proposals under consideration, all of which are likely to increase our regulatory compliance costs and risks, exposure to regulatory enforcement action, and other liabilities. While these state privacy laws, such as the CCPA, contain exemptions for certain types of personal data, such as personal data processed in the context of clinical trials, these laws may further complicate compliance efforts, and increase legal risk and compliance costs for us and the third parties upon whom we rely. The scope and enforcement of these laws is uncertain and evolving. In addition to government activity, privacy advocacy groups and technology and other industries are considering various new, additional or different self-regulatory standards that may place additional burdens on us.
Numerous other countries have, or are developing, laws governing the collection, use and transmission of personal data as well. In the ordinary course of business, we transfer personal data from Europe and other jurisdictions to the United States or other countries and may be subject to the General Data Protection Regulation (GDPR) and UK GDPR, as well as other foreign data protection laws. Europe and other jurisdictions have enacted laws requiring data to be localized or limiting the transfer of personal data to other countries and impose other restrictions on processing sensitive personal data, including genetic information and testing information. In particular, the EEA and the United Kingdom have significantly restricted the transfer of personal data to the United States and other countries whose privacy laws it generally believes are inadequate. Other jurisdictions may adopt or have already adopted similarly stringent data localization and cross-border data transfer laws. In July 2023, the European Commission adopted an adequacy decision for a new mechanism for transferring personal data from the European Union to the United States, the EU-U.S. Data Privacy Framework, which provides EU individuals with several new rights, including the right to obtain access to their data, or obtain correction or deletion of incorrect or unlawfully handled data. In addition, the EU-U.S. Data Privacy Framework offers additional redress avenues for violations, including free of charge independent dispute resolution mechanisms and an arbitration panel. The United Kingdom followed the European Commission in October of 2023 and adopted its "extension" to the EU-U.S. Data Privacy Framework. The European Commission and the United Kingdom will continually review developments in the United States along with their adequacy decisions. Adequacy decisions can be adapted or even withdrawn in the event of developments affecting the level of protection in the applicable jurisdiction. Future actions of EU and UK data protection authorities are difficult to predict, and the GDPR permits EU states to frame national legislation that may derogate from the GDPR.
If there is no lawful manner for us to transfer personal data from the EEA, the UK or other jurisdictions to the United States, or if the requirements for a legally-compliant transfer are too onerous, we could face significant adverse consequences, including the interruption or degradation of our operations at significant expense, increased exposure to regulatory actions, substantial fines and penalties, the inability to transfer data and work with partners, vendors and other third parties, and injunctions against our processing or transferring of personal data necessary to operate our business. Additionally, companies that transfer personal data out of the EEA and UK to other jurisdictions, particularly to the United States, are subject to increased scrutiny from regulators, individual litigants, and activist groups. Some European regulators have ordered certain companies to suspend or permanently cease certain transfers out of Europe for allegedly violating the GDPR's cross-border data transfer limitations.
Regulators in the United States such as the Department of Justice are also increasingly scrutinizing certain personal data transfers and, effective October of 2025, the DOJ has implemented what is known as the Bulk Transfer Rule restricting transfers of bulk sensitive personal data (like health, genomic, or financial info) and U.S. government-related data to "countries of concern" (e.g., China, Russia) or related entities, focusing on national security by preventing adversary access, absent an exception that permits such transfers. It requires U.S. companies to implement data security programs, audit compliance, and maintain records, with significant penalties for violations, aiming to safeguard sensitive U.S. data from foreign adversaries. In the ordinary course of business, as part of our clinical development programs, we transfer health and other data to China and we could face significant adverse consequences, including the interruption or degradation of our operations at significant expense, increased exposure to regulatory actions, substantial fines and penalties, the inability to transfer data and work with partners, vendors and other third parties, and injunctions against our processing or transferring of personal data necessary to operate our business if we are unable to comply with the requirements of the Bulk Transfer Rule.
In addition to privacy and data protection laws in the United States, European Union, and United Kingdom, various other jurisdictions in which we operate have established legal frameworks relating to privacy, data protection, and information security matters to which we may also be subject. For example, we are also subject to laws in China. Under the Cybersecurity Law of the People's Republic of China (China's Cybersecurity Law), any collection, use, transfer and storage of personal information of a Chinese citizen through a network by the network operator should be based on the three principles of legitimacy, justification and necessity and requires the consent of the data subject. The rules, purposes, methods and ranges of such collection should also be disclosed to the data subject. China's data localization requirements are becoming increasingly common in sector-specific regulations, and laws including data localization requirements exist in many of the other jurisdictions in which we operate. For example, China's Cybersecurity Law requires operators of critical information infrastructure (CIIOs) to store personal information and important data collected and generated from the critical information infrastructure within China. Non-compliance with China's Cybersecurity Law can result in fines for the relevant entity as well as for the personnel directly responsible. On September 14, 2022, the Cyberspace Administration of China (CAC), China's top cybersecurity regulator, released new amendments to China's Cybersecurity Law for public consultation and if the amendments are passed, the amended law will increase the penalties for violations of cybersecurity obligations under the Cybersecurity Law to up to RMB 50 million, in line with those under the Data Security Law and PIPL.
Building on this, China's Data Security Law (Data Security Law) became effective on September 1, 2021. The primary purpose of the Data Security Law is to regulate data activities, safeguard data security, promote data development and usage, protect individuals and entities' legitimate rights and interests, and safeguard state sovereignty, state security and development interests. The Data Security Law applies extraterritorially, and to a broad range of activities that involve "data" (not only personal or sensitive data). Under the Data Security Law, entities and individuals carrying out data activities must abide by various data security obligations. For example, the Data Security Law proposes to classify and protect data based on the importance of data to the state's economic development, as well as the degree of harm it will cause to national security, public interests, or legitimate rights and interests of individuals or organizations when such data is tampered with, destroyed, leaked, or illegally acquired or used. The appropriate level of protective measures is required to be taken for each respective class of data. The Data Security Law also echoes the data localization requirement in the Cybersecurity Law and requires important data to be stored locally in China. Such important data may only be transferred outside of China subject to compliance with certain data transfer restrictions, such as passing a security assessment organized by the relevant authorities.
The Cybersecurity Review Measures, which took effect on February 15, 2022 in China, clarify when entities must apply for a mandatory cybersecurity review from the Chinese government authorities. These circumstances include (i) when CIIOs purchase network products that may affect national security, (ii) when a network platform operator's data processing activities may affect national security, or (iii) when a network platform operator holds personal information of more than one million individuals and plans on listing publicly outside China. Network platform operators are not defined under the Cybersecurity Review Measures but are understood to be broadly interpreted to include all Internet platform operators or service providers, thus providing for a broad application. A mandatory cybersecurity review is likely to prolong the timeline of any contemplated listing timeline outside China and increase the regulatory compliance burden on entities that are subject to this requirement. At this time, the Company does not act as a network platform operator and does not hold the personal information of more than one million individuals in China, and as such, we do not believe the Company would be subject to the Cybersecurity Review Measures. However, the relevant Chinese authorities have great discretion, and it is generally uncertain as to how they may interpret and enforce the Cybersecurity Review Measures in practice.
Additionally, on August 20, 2021, China announced the Personal Information Protection Law (PIPL), which took effect on November 1, 2021. The PIPL is intended to clarify the scope of application, the definitions of personal information and sensitive personal information, the legality of personal information processing and the basic requirements of notice and consent, among other things. The PIPL also sets out data localization requirements for CIIOs and personal information processors who process personal information above a certain threshold prescribed by the relevant authorities. The PIPL also includes a list of rules which must be complied with prior to the transfer of personal information outside of China, such as compliance with a security assessment or certification by an agency designated by the relevant authorities or entering into standard form model contracts approved by the relevant authorities with the overseas recipient.
On July 7, 2022, the CAC issued Security Assessment Measures for Outbound Data Transfers, which became effective on September 1, 2022. The Security Assessment Measures for Outbound Data Transfers clarifies the security assessment requirement under the PIPL and requires a data processor to apply for the security assessment organized by the CAC under any of the following circumstances before the information is transferred outbound: (i) where a data processor provides key data overseas, (ii) critical information infrastructure operator and personal information processors who process more than one million individuals' personal information; (iii) where a data processor has cumulatively provided personal information of over 100,000 individuals or sensitive personal information of over 10,000 individuals in total abroad since January 1st of the previous year. Additionally, on November 18, 2022, the CAC and the State Administration of Market Regulation issued the Implementation Rules for Personal Information Protection Certification which apply with immediate effect and which provide important guidance on obtaining a personal information certification for lawful cross-border transfer of personal information under the PIPL.
Notably, the PIPL, similar to both the GDPR and certain U.S. privacy laws, applies extraterritorially. Failure to comply with PIPL can result in fines of up to RMB 50 million or 5% of the prior year's total annual revenue for the personal information processor and/or a suspension of services or data processing activities. Other potential penalties include a fine of up to RMB 1 million on the person in charge or directly responsible personnel and, in serious cases, individuals and entities may be exposed to criminal liabilities under other local Chinese law, such as the Criminal Law of the People's Republic of China. The PIPL also prohibits responsible personnel for violations of the PIPL from holding high level management or data protection officer positions in relevant enterprises.
In addition to China's Cybersecurity Law, the Data Security Law and the PIPL, the government agencies of China promulgated several regulations or released a number of draft regulations for public comments which are designed to provide further implemental guidance in accordance with the laws mentioned above. We cannot predict what impact the new laws and regulations or the increased costs of compliance, if any, will have on our operations in China, in particular the Data Security Law or PIPL, or the increased costs of compliance, if any, will have on our operations in China due to their recent enactment and the limited guidance available on their scope and applicability, particularly on PIPL. It is also generally unclear how the laws will be interpreted and enforced in practice by the relevant government authorities as often the abovementioned laws are drafted broadly and thus leaves great discretion to the relevant government authorities to exercise.
We also publicly post privacy policies and notices that describe our practices concerning our collection, use, disclosure and other processing of personal data. Although we endeavor to comply with our public-facing privacy policies and notices, we may at times fail to do so or be perceived to have failed to do so, and we may be subject us to enforcement actions if our privacy policies and notices are found to be deceptive, unfair or misrepresentative of our actual practices, which could result in, regulatory inquiries and investigations or adverse publicity and could cause our customers and collaborators to lose trust in us, any of which could adversely affect our business, financial condition, results of operations and prospects.
Applicable data privacy and data protection laws may conflict with each other, and by complying with the laws or regulations of one jurisdiction, the Company may find that it is violating the laws or regulations of another jurisdiction. Despite the Company's efforts, the Company may not have fully complied in the past and may not in the future. Evolving legal, contractual, and other privacy and data protection obligations, could impose significant limitations, require changes to our business, or restrict our collection, use, storage or processing of personal data, which may increase our compliance expenses and make our business more costly or less efficient to conduct. In addition, any such changes could impact our ability to develop an adequate marketing strategy and pursue our growth strategy effectively, or even prevent us from providing certain products in jurisdictions in which we currently operate, and in which we may operate in the future, or incur potential liability in an effort to comply, which, in turn, could adversely affect our business, financial condition, results of operations and prospects. Complying with these numerous, complex and often evolving requirements is expensive and difficult, and suspected and actual failure to comply, whether by us, our service providers, CROs, business partners or other third parties, or any inadvertent or unauthorized access to or use or disclosure of data that we store or handle as part of operating our business, could adversely affect our business, financial condition, results of operations and prospects, including but not limited to: loss of customers; interruptions or stoppages in our business operations (including clinical trials); inability to process personal data or to operate in certain jurisdictions; limit our ability to develop or commercialize our products; expenditure of time and resources; investigation costs; material fines and penalties; compensatory, special, punitive and statutory damages; litigation; consent orders regarding our privacy and security practices; requirements that we provide notices, credit monitoring services and/or credit restoration services or other relevant services to impacted individuals; adverse actions against our licenses to do business; reputational damage; and injunctive relief. We may also be contractually required to indemnify and hold harmless third parties.
The successful assertion of one or more large claims against us that exceeds our available insurance coverage, or results in changes to our insurance policies (including premium increases or the imposition of large deductible or co-insurance requirements), could have an adverse effect on our business. In addition, we cannot be sure that our existing insurance coverage will continue to be available on acceptable terms or that our insurers will not deny coverage as to any future claim.