We are subject to numerous United States federal, state, local, and international laws and regulations regarding privacy, data protection and cybersecurity that govern the processing of certain data (including personal information, sensitive information, health information, and other regulated data). These laws and regulations are increasing in severity, complexity and number, change frequently, and increasingly conflict among the various jurisdictions in which we operate, which has resulted in greater compliance risk and cost for us.
As of December 31, 2025, we are required to comply with the European Union General Data Protection Regulation (GDPR) as well as the United Kingdom (U.K.) equivalent and other global data protection laws (including in Switzerland, Japan, Singapore, China, India, United Arab Emirates, Australia, and Brazil), the implementation of which exposes us to parallel data protection regimes, each of which potentially authorizes similar fines and other enforcement actions for certain violations. Several jurisdictions in which we operate are considering or have proposed or enacted legislation and policies regulating AI and non-personal data, such as the European Union's AI Act. These new regulations may diverge from one another, which could require us to navigate different obligations and enforcement actions in different geographies. Any violations of these laws may lead to reputational damage, financial penalties and increased regulatory scrutiny and oversight.
In the U.S., the California Consumer Privacy Act of 2018 (as amended by the California Privacy Rights Act of 2020) broadly defines personal information, gives California residents expanded privacy rights and protections, and provides for civil penalties for certain violations, and established a regulatory agency dedicated to enforcing those requirements. At least nineteen U.S. states have also passed consumer privacy laws, and several states, most notably Illinois and Texas, have passed laws regulating the processing of biometric information. Without any overarching federal privacy law, the patchwork of privacy legislation formed by individual state laws heightens the costs of compliance, the risks of noncompliance, and the potential for enforcement actions by individual state attorneys general.
We are also subject to an increasing number of reporting obligations in respect of material cybersecurity incidents. These reporting requirements have been proposed or implemented by a number of regulators in different jurisdictions, may vary in their scope and application, and could contain conflicting requirements. Certain of these rules and regulations may require us to report a cybersecurity incident before we have been able to fully assess its impact or remediate the underlying issue. Efforts to comply with such reporting requirements could divert management's attention from our cybersecurity incident response and could potentially reveal system vulnerabilities to threat actors. Failure to timely report cybersecurity incidents under these rules could also result in regulatory investigations, litigation, monetary fines, sanctions, or subject us to other forms of liability.
A significant actual or potential theft, loss, corruption, exposure, fraudulent use or misuse of client, employee or other personal information or proprietary business data, whether by third parties or as a result of employee malfeasance or otherwise, perceived or actual non-compliance with our contractual or other legal obligations regarding such data or intellectual property or a violation of our privacy and security policies with respect to such data could result in significant remediation and other costs, fines, litigation or regulatory actions against us. Such an event could additionally disrupt our operations and the services we provide to clients, harm our relationships with contractors and vendors, damage our reputation, result in the loss of a competitive advantage, impact our ability to provide timely and accurate financial data and cause a loss of confidence in our services and financial reporting, which could adversely affect our business, revenues, competitive position and investor confidence. Additionally, we rely on third parties to support our information and technology networks, including cloud storage solution providers, and as a result have less direct control over our data and information technology systems. Such third parties are also vulnerable to security breaches and compromised security systems, for which we may not be indemnified and which could materially adversely affect us and our reputation.