We rely extensively on information technology ("IT") systems for the storage, processing, and transmission of our electronic, business-related, information assets used in or necessary to conduct business. We leverage our internal IT infrastructures, and those of our business partners or other third parties, to enable, sustain, and support our global business activities. In addition, we rely on networks and services, including internet sites, data hosting and processing facilities and tools and other hardware, software and technical applications and platforms, some of which are managed, hosted, provided and/or used by third-parties or their vendors, to assist in conducting our business. The data we store and process may include customer payment information, personal information concerning our employees, confidential financial information, and other types of sensitive business-related information. In limited instances, we may also come into possession of information related to patients of our physician customers. In addition, the laws and regulations governing security of data on IT systems and otherwise collected, processed, stored, transmitted, disclosed and disposed of by companies are evolving, adding another layer of complexity in the form of new requirements. We have made, and continue to make investments, seeking to address these threats, including monitoring of networks and systems, hiring of third party service providers with expertise in cybersecurity, employee training and security policies for employees and third-party providers. In addition, we currently maintain cybersecurity insurance, although the cost of cybersecurity insurance has been increasing and there can be no assurances that we will continue to maintain cybersecurity insurance at the same levels of coverage, or at all. Despite our security measures and those of third parties with whom we do business, our respective systems and facilities and those of our third-party vendors may be vulnerable to security incidents, disruptions, cyberattacks, ransomware, data breaches, viruses, phishing attacks and other forms of social engineering, denial-of-service attacks, third-party or employee theft or misuse and other negligent actions. Hackers, data thieves and rogue insiders are increasingly sophisticated and operate social engineering, such as phishing, and large-scale, complex automated attacks that can evade detection for long periods of time. Any breach of our or our service providers' network, or other vendor systems, may result in the loss of confidential business and financial data, misappropriation of our customers' or employees' personal information or a disruption of our business. Any of these outcomes could have a material adverse effect on our business, including unwanted media attention, impairment of our customer relationships, damage to our reputation, resulting in lost sales and consumers, fines, lawsuits, or significant legal and remediation expenses. We also may need to expend significant resources to protect against, respond to and/or redress problems caused by any breach. Insurance policies that may provide coverage with regard to such incidents may not cover any or all of the resulting financial losses.
Our worldwide operations mean that we are subject to laws and regulations, including data protection and cybersecurity laws and regulations, in many jurisdictions. For example, the EU General Data Protection Regulation ("GDPR") requires us to manage personal data in the EU and may impose fines of up to four percent of our global revenue in the event of certain violations. In addition, legal requirements standards for cross-border personal data transfers from outside the U.S. are constantly changing, including the revisions made by the European Economic Area ("EEA") that require the use of revised Standard Contractual Clauses ("SCCs") for international data transfers from the EEA. The SCCs are required to be used for new agreements involving the cross-border transfer of personal data from the EEA and must be supplemented by an assessment and due diligence of the legal and regulatory landscape of the jurisdiction of the data importer, the channels used to transmit personal data and any sub-processors that may receive personal data. The UK has developed its own set of SCCs that must be used for transfers of personal data from the UK to the U.S. In July 2023, the European Commission determined that the Data Privacy Framework ("DPF"), a replacement for the invalidated EU-US Privacy Shield, ensures an adequate level of protection for EU personal data transferred to the U.S. Compliance with these changes and any future changes to data transfer or privacy requirements could potentially require us to make significant technological and operational changes, any of which could result in substantial costs, and failure to comply with applicable data protection and transfer or privacy laws requirements could subject us to fines or regulatory oversight.
Likewise, the California Consumer Privacy Act ("CCPA") imposes obligations on companies that conduct business in California, and meet other requirements, with respect to the collection or sale of specified personal information. In November 2020, voters in the State of California approved the California Privacy Rights Act ("CPRA"), a ballot measure that amends and supplements the CCPA by, among other things, expanding certain rights relating to personal information and its use, collection, deletion, and disclosure by covered businesses. In addition, approximately 20 other states have adopted similar comprehensive privacy laws, which may require companies to change their practices for collecting and handling personal information. Compliance with the CCPA, the CPRA, and other state statutes, common law, or regulations designed to protect consumer, employee, or job applicant personal information could potentially require substantive technology infrastructure and process changes across many of our businesses. Any perceived failure to comply with these regulatory standards could subject us to legal and reputational risks. Misuse of or failure to secure personal information could also result in violation of data privacy laws and regulations, proceedings against the Company by governmental entities or others, damage to our reputation and credibility and could have a negative impact on revenues and profits. Further, there has been a developing trend of civil lawsuits and class actions relating to breaches of consumer data held by large companies or incidents arising from other cyber-attacks. Any data security breaches, cyber-attacks, malicious intrusions or significant disruptions could result in actions by regulatory bodies and/or civil litigation, any of which could materially and adversely affect our business, financial condition, results of operations, reputation or competitive position.
Additionally, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), including the expanded requirements under the Health Information Technology for Economic and Clinical Health Act of 2009, establish comprehensive standards with respect to the use and disclosure of protected health information ("PHI"). HIPAA imposes privacy and security obligations on covered entity health care providers, health plans, and health care clearinghouses, as well as their "business associates"-certain persons or entities that create, receive, maintain, or transmit PHI in connection with providing a specified service or performing a function on behalf of a covered entity. We are subject to HIPAA as a business associate. If we do not comply with the applicable requirements of HIPAA or applicable state privacy and security laws, we could be subject to criminal or civil sanctions that could adversely affect our financial condition. The costs of complying with privacy and security related legal and regulatory requirements are substantial and could have an adverse effect on our business. In addition, a security breach could require reporting to federal and state government entities, notification to affected individuals, expensive investigation and remediation and mitigation. Government agencies could, in their discretion, impose fines and penalties relating to the breach, which may have a material adverse effect on our business.
The costs of protecting IT systems and data may increase, and there can be no assurance that these added security efforts will prevent all breaches of our IT systems or thefts of our data. We may also be exposed to potential disruption in operations, loss of customers, reputational, competitive and business harm, and significant costs from remediation, litigation and regulatory actions if our business continuity plans do not effectively address the following failures on a timely basis:
- our IT systems are damaged or cease to function properly;- the networks or service providers we rely upon fail to function properly;- we fail to comply with an applicable law or regulation, such as the GDPR; or - we or one of our third-party providers suffer a loss or disclosure of our business or stakeholder information due to any number of causes ranging from catastrophic events or power outages to improper data handling or security breaches.