Numerous U.S. federal and state laws and regulations govern the collection, dissemination, use, privacy, confidentiality, security, availability and integrity of personally identifiable information ("PII"), including protected health information ("PHI"). These federal and state laws and regulations include, but are not limited to HIPAA, as amended by HITECH, which we refer to collectively as HIPAA, and the California Consumer Privacy Act of 2018, as amended by the California Privacy Rights Act (the "CPRA"), which took effect on January 1, 2023 (the "CCPA"). HIPAA establishes a set of basic national privacy and security standards for the protection of PHI by health plans, healthcare clearinghouses and certain healthcare providers, referred to as covered entities, which includes us, and the business associates with whom such covered entities contract for services, which also includes us.
HIPAA requires healthcare payers and providers-and we are both-to develop and maintain policies and procedures with respect to PHI that is used or disclosed, including the adoption of administrative, physical and technical safeguards to protect such information. HIPAA also implemented the use of standard transaction code sets and standard identifiers that covered entities must use when submitting or receiving certain electronic healthcare transactions, including activities associated with the billing and collection of healthcare claims.
Penalties for failure to comply with a requirement of HIPAA vary significantly depending on the nature of violation and could include civil monetary or criminal penalties. HIPAA also authorizes state attorneys general to file suit on behalf of their residents. Courts are able to award damages, costs and attorneys' fees related to violations of HIPAA in such cases. While HIPAA does not create a private right of action allowing individuals to sue us in civil court for violations of HIPAA, its standards have been used as the basis for duty of care in state civil suits such as those for negligence or recklessness in the misuse or breach of PHI.
In addition, HIPAA mandates that HHS conduct periodic compliance audits of HIPAA-covered entities or business associates for compliance with the HIPAA Privacy and Security Standards. It also tasks HHS with establishing a methodology whereby harmed individuals who were the victims of breaches of unsecured PHI may receive a percentage of the Civil Monetary Penalty fine paid by the violator.
HIPAA further requires that patients be notified of any unauthorized acquisition, access, use or disclosure of their unsecured PHI that compromises the privacy or security of such information, with certain exceptions related to unintentional or inadvertent use or disclosure by employees or authorized individuals. HIPAA specifies that such notifications must be made "without unreasonable delay and in no case later than 60 calendar days after discovery of the breach." If a breach affects 500 patients or more, it must be reported to HHS without unreasonable delay, and HHS will post the name of the breaching entity on its public web site. Breaches affecting 500 patients or more in the same state or jurisdiction must also be reported to the local media. If a breach involves fewer than 500 people, the covered entity must record it in a log and notify HHS at least annually.
Numerous other U.S. federal and state laws, such as the CCPA, protect the confidentiality, privacy, availability, integrity, and security of PII, including PHI. These laws in many cases are more restrictive than, and may not be preempted by, the HIPAA rules and may be subject to varying interpretations by courts and government agencies, creating complex compliance issues for us and our providers and business associates and potentially exposing us to additional expense, adverse publicity and liability. Among other things, the CCPA gives California residents expanded data privacy rights, allowing consumers to opt out of certain data sharing with third parties, provides a private cause of action for data breaches, imposes additional obligations such as data minimization and storage limitations; on covered businesses; and forms a dedicated privacy regulator in California, the California Privacy Protection Agency, to implement and enforce the law. The CCPA marked the beginning of a trend toward more stringent state data privacy legislation in the United States, which may result in significant costs to our business, damage our reputation, and require us to amend our business practices, and could adversely affect our business, especially to the extent the specific requirements vary from those and other existing laws. Four such laws, in Virginia, Colorado, Connecticut, and Utah, have taken effect in 2023, and at least three more laws in Montana, Texas and Oregon are scheduled to take effect in 2024. Similar laws have been proposed in other states and at the federal level. If passed, such laws may have potentially conflicting requirements that would make compliance challenging. In addition, in response to such laws, we may need to update and/or change our data collection practices, which may be costly, time-consuming, and present potential liability while we adapt to comply with such legislation.
New health information standards, whether implemented pursuant to HIPAA, state or federal legislative action or otherwise, could have a significant effect on the manner in which we must handle healthcare related data, and the cost of complying with standards could be significant. If we do not comply with existing or new laws and regulations related to PHI, we could be subject to criminal or civil sanctions.
Because of the extreme sensitivity of the personal information, including PHI, that we store and transmit, the security features of our technology platform are very important. We also contract with third parties for important aspects of the storage and transmission of beneficiary information, and thus rely on those third parties to manage functions that have material cyber-security risks. We attempt to address these risks by requiring subcontractors who handle beneficiary information to sign business associate agreements contractually requiring those subcontractors to adequately safeguard personal health data to the same extent that applies to us and in some cases by requiring such subcontractors to undergo third-party security examinations. However, we cannot ensure that these contractual measures and other safeguards will adequately protect us from the risks associated with the storage and transmission of such information on our behalf by our subcontractors.
If our security measures, some of which are managed by third parties, or those of the third parties with whom we contract, are breached or fail, unauthorized persons may be able to obtain access to sensitive provider and beneficiary data, including HIPAA-regulated PHI. As a result, our reputation could be severely damaged, adversely affecting PCP and beneficiary confidence. Beneficiaries may curtail their use of or stop using our services including the use of telehealth, or our number of beneficiaries could decrease, which would cause our business to suffer. In addition, we could face litigation, damages for contract breach, penalties and regulatory actions for violation of HIPAA and other applicable laws or regulations and significant costs for remediation, notification to individuals and for measures to prevent future occurrences. Any potential security breach could also result in increased costs associated with liability for stolen assets or information, repairing system damage that may have been caused by such breaches, incentives offered to business partners in an effort to maintain our business relationships after a breach and implementing measures to prevent future occurrences, including organizational changes, deploying additional personnel and protection technologies, training employees and engaging third-party experts and consultants. While we maintain insurance covering certain security and privacy damages and claim expenses, we may not carry insurance or maintain coverage sufficient to compensate for all liability. In any event, insurance coverage would not address the reputational damage that could result from a security incident.
We also publish statements to our beneficiaries that describe how we handle and protect personal information. Any failure or perceived failure by us to maintain posted privacy policies that are accurate, comprehensive and fully implemented, and any violation or perceived violation of our privacy-, data protection-, or information security obligations to providers, beneficiaries, or other third parties could result in claims of deceptive practices brought against us. That could lead to significant liabilities and consequences, including, without limitation, governmental investigations or enforcement actions, costs of responding to investigations, defending against litigation, settling claims and complying with regulatory or court orders, all of which could have material impacts on our revenues and results of operations.
Furthermore, the Federal Trade Commission and many state attorneys general continue to enforce federal and state consumer protection laws against companies for online collection, use, dissemination, and security practices that appear to be unfair or deceptive. There are also a number of legislative proposals in the United States, at both the federal and state level, that could impose new obligations or liability for copyright infringement by third parties violating those laws. We cannot yet determine the impact that future laws, regulations, and standards may have on our business.