We are subject to complex and evolving cybersecurity, privacy and data protection laws, regulations, rules, standards and contractual obligations in the United States and other jurisdictions in which we operate, and legislators and regulators are increasingly focused on these issues. Ensuring that our collection, use, transfer, storage and other processing of personal information complies with such requirements can increase operating costs, impact the development of new products or services, and reduce operational efficiency.
In the United States, there are numerous federal, state and local cybersecurity, privacy and data protection laws, regulations and rules governing the collection, sharing, use, retention, disclosure, security, transfer, storage and other processing of personal information, including federal and state cybersecurity, privacy and data protection laws, data breach notification laws, and data disposal laws. For example, at the federal level, we are subject to, among other laws and regulations, the rules and regulations promulgated under the authority of the Federal Trade Commission (which has the authority to regulate and enforce against unfair or deceptive acts or practices in or affecting commerce, including acts and practices with respect to cybersecurity, privacy and data protection). In addition, in July 2023, the SEC adopted new cybersecurity rules for public companies that are subject to the reporting requirements of the Exchange Act. Under these new rules, registered companies must disclose a material cybersecurity incident within four days of management's determination that the incident is material. Companies also must include enhanced cybersecurity risk assessment and management, strategy and governance disclosures, including disclosures regarding management's role in overseeing the registered company's cybersecurity risk management and compliance program, in their annual reports. Further, the United States Congress has recently considered, and is currently considering, various proposals for comprehensive federal cybersecurity, privacy and data protection legislation, to which we may become subject if passed.
Cybersecurity, privacy and data protection and disclosure are also areas of increasing state legislative focus in the United States and we are, or may in the future become, subject to various state laws and regulations regarding cybersecurity, privacy and data protection. For instance, the New York Department of Financial Services ("NYDFS") has adopted a cybersecurity regulation which requires entities subject to the jurisdiction of the NYDFS, among other things, to implement and maintain a cybersecurity program designed to identify and address cybersecurity risks that may threaten the security or integrity of personal information stored on the covered entity's information systems. In July and November 2022, the NYDFS proposed amendments to the cybersecurity regulation, which, if adopted, would require new reporting, governance and oversight measures and enhanced cybersecurity safeguards, and would mandate notification to NYDFS in the event that a covered entity makes an extortion payment in connection with a cybersecurity event involving the covered entity. We cannot predict whether the amendments will be adopted, what form they will take, or what effect they would have on our business or compliance costs. In addition, the California Consumer Privacy Act, as amended by the California Privacy Rights Act (collectively, the "CCPA"), to which a portion of our business may be subject, provides California residents with enhanced privacy protections and rights with respect to the processing of their data, such as affording them the right to access and request deletion of their information and to opt out of certain sharing and sales of personal information. The CCPA also prohibits covered businesses from discriminating against California residents for exercising any of their CCPA rights. The CCPA provides for severe civil penalties and statutory damages for violations and a private right of action for certain data breaches that result in the loss of unencrypted personal information. This private right of action is expected to increase the likelihood of, and risks associated with, data breach litigation. Numerous other U.S. states also have enacted or are considering comprehensive privacy and data protection legislation that may apply to our operations. Moreover, laws in all 50 U.S. states require businesses to provide notice under certain circumstances to consumers whose personal information has been disclosed as a result of a data breach. These state statutes, and other similar state or federal laws that may be enacted in the future, may require us to modify our data processing practices and policies, incur substantial compliance-related costs and expenses, and otherwise suffer adverse impacts on our business.
It is anticipated that our operations in Bermuda will also become subject to data protection laws in the near future. The Personal Information Protection Act 2016 of Bermuda ("PIPA") regulates how any individual, entity or public authority may use personal information. Although PIPA was passed on July 27, 2016, the sections that are currently in effect are limited to those that relate to the establishment and appointment of the PIPA commissioner (the "Privacy Commissioner"), the hiring of the Privacy Commissioner's staff, and the general authority of the Privacy Commissioner to inform the public about PIPA. Following the Privacy Commissioner's appointment, effective January 20, 2020, the Privacy Commissioner's office has begun communications with the public and stakeholders regarding full implementation of PIPA. On October 30, 2020, the Privacy Commissioner issued guidance regarding privacy safeguarding of personal information by public companies; however, PIPA's remaining provisions have not been fully implemented and regulations under PIPA have not yet been provided. The Privacy Commissioner has recommended that organizations in Bermuda start to conduct data due diligence across their existing business lines as a first stage towards PIPA compliance and, whilst the effective date has not yet been announced, it is currently anticipated to be announced this year and the Privacy Commissioner has recommended to the Bermuda Government that a period of six to nine months between announcement and the effective date of PIPA be granted to allow adequate time to prepare.
In addition, the BMA has recognized that cyber incidents can cause significant financial losses and/or reputational impacts across the insurance industry and has implemented the Insurance Sector Operation Cyber Risk Management Code of Conduct (the "Cyber Risk Code") to ensure that those operating in the Bermuda insurance sector can mitigate such risks. The Cyber Risk Code prescribes the duties, requirements, standards, procedures and principles which all insurers, insurance managers and insurance intermediaries (agents, brokers and insurance market place providers) registered under the Insurance Act must comply. The Cyber Risk Code is designed to promote the stable and secure management of information technology systems of regulated entities and requires that all registrants implement their own technology risk programs, determine what their top risks are and develop an appropriate risk response. This requires all registrants to develop a cyber risk policy which is to be delivered pursuant to an operation cyber risk management program and appoint an appropriately qualified member of staff or outsourced resource to the role of Chief Information Security Officer. The role of the Chief Information Security Officer is to deliver the operational cyber risk management program. It is expected that the cyber risk policy will be approved by the registrant's board of directors at least annually. The BMA will assess a registrant's compliance with the Cyber Risk Code in a proportionate manner relative to the nature, scale and complexity of its business. While it is acknowledged that some registrants will use a third party to provide technology services and that they may outsource their IT resources (for example, to an insurance manager where applicable), when so outsourced, the overall responsibility for the outsourced functions will remain with the registrant's board of directors. Failure to comply with the requirements of the Cyber Risk Code will be taken into account by the BMA in determining whether a registrant is conducting its business in a sound and prudent manner as prescribed by the Insurance Act and may result in the BMA exercising its powers of intervention and investigation.
Further, our operations in foreign jurisdictions also may be subject to robust data protection laws. In the European Union and in the United Kingdom ("U.K."), we are subject to the European Union General Data Protection Regulation ("GDPR") and member state laws implementing the GDPR and the U.K. General Data Protection Regulation ("U.K. GDPR"), respectively, which impose stringent obligations regarding the collection, control, use, sharing, disclosure and other processing of personal data. While the GDPR and U.K. GDPR remain substantially similar for the time being, the U.K. government has announced that it would seek to chart its own path on data protection and reform its relevant laws, including in ways that may differ from the GDPR. While these developments increase uncertainty with regard to data protection regulation in the U.K., even in their current, substantially similar form, the GDPR and U.K. GDPR can expose businesses to divergent parallel regimes that may be subject to potentially different interpretations and enforcement actions for certain violations and related uncertainty. Failure to comply with the GDPR or the U.K. GDPR can result in significant fines and other liability, including, under the GDPR, fines of up to EUR 20 million (or GBP 17.5 million under the U.K. GDPR) or four percent (4%) of annual global revenue, whichever is greater. The cost of compliance, and the potential for fines and penalties for non-compliance, with GDPR and U.K. GDPR may have a significant adverse effect on our business and operations.
Legal developments in the European Economic Area ("EEA") regarding the transfer of personal data from the EEA to third countries, including the United States, have created complexity and uncertainty regarding such processing, and similar complexities and uncertainties also apply to transfers from the U.K. to third countries. While we have taken steps to mitigate the impact on us, such as implementing lawful data transfer mechanisms (e.g., the European Commission's standard contractual clauses ("SCCs")), the efficacy and longevity of these mechanisms remains uncertain. Moreover, in 2021, the European Commission adopted new SCCs, which impose on companies additional obligations relating to personal data transfers out of the EEA, including the obligation to update internal privacy practices, conduct transfer impact assessments and, as required, implement additional security measures. The new SCCs may increase the legal risks and liabilities under E.U. laws associated with cross-border data transfers, and result in material increased compliance and operational costs. In July 2023, the European Commission adopted an adequacy decision concluding the new E.U.-U.S. data privacy framework (the "E.U.-U.S. DPF") constitutes a lawful data transfer mechanism under E.U. law for participating U.S. entities; however, the E.U.-U.S. DPF may be in flux as such adequacy decision has been challenged, and is likely to face additional challenges at the Court of Justice of the European Union. Moreover, although the U.K. currently has an adequacy decision from the European Commission, such that SCCs are not required for the transfer of personal data from the EEA to the U.K., that decision will sunset in June 2025 unless extended and it may be revoked in the future by the European Commission if the U.K. data protection regime is reformed in ways that deviate substantially from the GDPR. Adding further complexity for international data flows, in March 2022, the U.K. adopted its own International Data Transfer Agreement for transfers of personal data out of the U.K. to so-called third countries, as well as an international data transfer addendum that can be used with the SCCs for the same purpose. In addition, in June 2023, the U.S. and U.K. announced a commitment in principle to establish a "data bridge" to extend the E.U.-U.S. DPF to the flow of U.K. personal data under the U.K. GDPR to participating entities in the U.S. Such data bridge could not only be challenged but also may be affected by any challenges to the E.U.-U.S. DPF. The E.U. has also proposed legislation that would regulate non-personal data and establish new cybersecurity standards, and other countries, including the U.K., may similarly do so in the future. If we are otherwise unable to transfer data, including personal data, between and among countries and regions in which we operate, it could affect the manner in which we provide our products and services, the geographical location or segregation of our relevant systems and operations, and could adversely affect our financial results. While we have implemented new controls and procedures designed to comply with the requirements of the GDPR, U.K. GDPR and the cybersecurity, privacy and data protection laws of other jurisdictions in which we operate, such procedures and controls may not be effective in ensuring compliance or preventing unauthorized transfers of personal data.
Moreover, while we strive to publish and prominently display privacy policies that are accurate, comprehensive, and compliant with applicable laws, regulations, rules and standards, we cannot ensure that our privacy policies and other statements regarding our practices will be sufficient to protect us from claims, proceedings, liability or adverse publicity relating to cybersecurity, privacy or data protection. The publication of our privacy policies and other documentation that provide promises and assurances about cybersecurity, privacy and data protection can subject us to potential government or legal investigation or action if they are found to be deceptive, unfair, or misrepresentative of our actual practices.
Our compliance efforts are further complicated by the fact that cybersecurity, privacy and data protection laws, regulations, rules and standards around the world are rapidly evolving, may be subject to uncertain or inconsistent interpretations and enforcement, and may conflict among various jurisdictions. Such cybersecurity, privacy and data protection requirements, and new or modified requirements that may be adopted in the future, may increase our compliance costs. Any failure or perceived failure to comply with our privacy policies, or applicable cybersecurity, privacy and data protection laws, regulations, rules, standards or contractual obligations, or any compromise of security that results in unauthorized access to, or unauthorized loss, destruction, use, modification, acquisition, disclosure, release or transfer of personal information, may lead to significant fines, judgments, awards, penalties, sanctions, reputational harm, increased regulatory scrutiny, litigation, requirements to modify or cease certain operations or practices, the expenditure of substantial costs, time and other resources, proceedings or actions against us, governmental investigations, enforcement actions, or other liability. Any of the foregoing could distract our management and technical personnel, increase our costs of doing business, adversely affect the demand for our products and services, and ultimately result in the imposition of liability, any of which could have a material adverse effect on our business, financial condition and results of operations.