In the ordinary course of business, we collect, use, transmit, store, share and otherwise process member, customer and employee data, including credit and debit card numbers, bank account information, dates of birth, location information and other types of personal data. Some of this data is sensitive and could be an attractive target for criminal attack by malicious third parties with a wide range of expertise and motives (including financial gain), including organized criminal groups, hackers, disgruntled current or former employees, and others. In particular, the increasing sophistication and resources of cyber criminals and other non-state threat actors and increased actions by nation-state actors make keeping up with new threats difficult and could result in a breach of security. The integrity, protection and security of such member, customer and employee data is critical to us.
Despite the security measures we and our third-party service providers have in place to protect confidential information and PII and to comply with applicable laws, rules, regulations, industry standards and contractual obligations relating to data privacy, protection and security, our facilities and systems and those of our third-party service providers, as well as the Soho House App, may be vulnerable to security or data breaches, acts of cyber terrorism or sabotage, vandalism or theft, computer viruses, misplaced, corrupted or lost data, programming or human errors or other similar events. Furthermore, the size and complexity of our IT systems and those of our third-party service providers make such systems potentially vulnerable to security or data breaches and other security incidents from inadvertent or intentional actions by our employees or third-party service providers or from attacks by malicious third parties. Because such attacks are increasing in sophistication and change frequently in nature, we and our third-party service providers may be unable to anticipate these attacks or implement adequate preventative measures, and any compromise of our systems, or those of our third-party vendors, may not be discovered, mitigated or remediated promptly or effectively.
Additionally, the collection, maintenance, use, disclosure, storage, transmission, disposal and other processing of PII by our businesses are regulated at the federal, state local, provincial and international levels as well as by certain industry groups, such as the Payment Card Industry organization and the National Automated Clearing House Association, and we cannot guarantee that we have been and will be in compliance with all such applicable laws, rules, regulations and standards. The regulatory framework for data privacy and security worldwide is continuously evolving and developing and, as a result, interpretation and implementation standards and enforcement practices are likely to remain uncertain for the foreseeable future. The occurrence of unanticipated events and the development of evolving technologies often rapidly drives the adoption of legislation or regulation affecting the use, collection or other processing of data. New laws, amendments to or reinterpretations of existing laws, regulations, standards and other obligations may require us to change our business operations with respect to how we use, collect, store, transfer or otherwise process certain types of PII, implement new processes, and incur additional costs to comply with those laws and our members' exercise of their rights thereunder.
Foreign data protection, privacy, consumer protection and other laws and regulations are often more restrictive than those in the United States. In particular, the EEA (comprised of the EU member states and Iceland, Liechtenstein and Norway) and the UK, have traditionally taken broader views as to types of data that are subject to privacy and data protection. In the EU, the processing of personal data (i.e., data which identifies an individual or from which an individual is identifiable) is governed by the EU GDPR. The UK has implemented the EU GDPR into its national law by virtue of section 3 of the European Union (Withdrawal) Act 2018 (known as the "UK GDPR", and together with the EU GDPR, the "GDPR") which sits alongside the UK Data Protection Act 2018. The GDPR imposes a number of obligations on controllers, including, among others: (i) accountability and transparency requirements, which require controllers to demonstrate and record compliance with the GDPR and to provide more detailed information to data subjects regarding processing; (ii) requirements to process personal data lawfully including specific requirements for obtaining valid consent where consent is the lawful basis for processing; (iii) obligations to consider data protection as any new products or services are developed and designed and to limit the amount of personal data processed; (iv) obligations to comply with data protection rights of data subjects including a right of access to and rectification of personal data, a right to obtain restriction of processing or to withdraw consent to processing, or to object to processing of personal data and a right to ask for a copy of personal data to be provided to a third party in a usable format and a right to erasure of personal data in certain circumstances; (v) obligations to implement appropriate technical and organizational security measures to safeguard personal data; and (vi) obligations to report certain personal data breaches to the relevant supervisory authority without undue delay (and no later than 72 hours where feasible) and affected individuals where the personal data breach is likely to result in a high risk to their rights and freedoms.
In addition, the EU GDPR prohibits the international transfer of personal data from the EEA to countries outside of the EEA unless made to a country deemed to have adequate data privacy laws by the European Commission or a data transfer mechanism in accordance with the EU GDPR has been put in place or a derogation under the EU GDPR can be relied on. In July 2020, the Court of Justice of the European Union ("CJEU") in its Schrems II ruling invalidated the EU-U.S. Privacy Shield framework, a self-certification mechanism that facilitated the lawful transfer of personal data from the EEA to the United States, with immediate effect. The CJEU upheld the validity of standard contractual clauses ("EU SCCs") as a legal mechanism to transfer personal data but companies relying on EU SCCs will need to carry out a transfer impact assessment ("TIA"), which among other things, assesses laws governing access to personal data in the recipient country and considers whether supplementary measures that provide privacy protections additional to those provided under EU SCCs will need to be implemented to ensure an 'essentially equivalent' level of data protection to that afforded in the EEA. The UK GDPR imposes similar restrictions on transfers of personal data from the UK to jurisdictions that the UK does not consider adequate. This may have implications for our cross-border data flows and may result in compliance costs.
Further, on October 7, 2022, the U.S. President introduced an Executive Order to facilitate a new Trans-Atlantic Data Privacy Framework ("DPF"), and on July 10, 2023, the European Commission adopted its Final Implementing Decision granting the U.S. adequacy ("Adequacy Decision") for EU-US transfers of personal data for entities self-certified to the DPF. Entities relying on EU SCCs for transfers to the U.S. are also able to rely on the analysis in the Adequacy Decision as support for their TIA regarding the equivalence of U.S. national security safeguards and redress.
It should also be noted that the UK government has published its own form of EU SCCs known as the UK International Data Transfer Agreement and an International Data Transfer Addendum to the new EU SCCs. The UK's Information Commissioner's Office ("ICO") has also published its own version of the TIA and guidance on international transfers, although entities may choose to adopt either the EU or UK style TIA. Further, on September 21, 2023, the UK Secretary of State for Science, Innovation and Technology established a UK-U.S. data bridge (i.e., a UK equivalent of the Adequacy Decision) and adopted UK regulations to implement the UK-U.S. data bridge ("UK Adequacy Regulations"). Personal data may now be transferred from the UK under the UK-U.S. data bridge through the UK extension to the DPF to organizations self-certified under the UK extension to DPF.
The GDPR also introduces fines of up to €20 million (under the EU GDPR) or £17.5 million (under the UK GDPR) or up to 4% of the annual global turnover of the noncompliant company, whichever is greater, for serious violations of certain of the GDPR's requirements. The GDPR identifies a list of points to consider when determining the level of fines to impose (including the nature, gravity and duration of the infringement). Data subjects also have a right to compensation for financial or non-financial losses (e.g., distress). Complying with the GDPR may cause us to incur substantial operational and compliance costs or require us to change our business practices. Despite our efforts to bring practices into compliance with the GDPR, we may not be successful either due to internal or external factors such as resource allocation limitations or a lack of vendor cooperation. Non-compliance could result in proceedings against us by governmental entities, regulators, customers, data subjects, suppliers, vendors or other parties. Further, there is a risk that the measures will not be implemented correctly or that individuals within the business will not be fully compliant with the new procedures. If there are breaches of these measures, we could face significant administrative and monetary sanctions as well as reputational damage which may have a material adverse effect on our operations, financial condition and prospects. There is a risk that we could be impacted by a cybersecurity incident that results in loss or unauthorized disclosure of personal data, potentially resulting in us facing harms similar to those described above.
The EU has also proposed the draft ePrivacy Regulation, which, once finalized and in effect, will replace both the ePrivacy Directive and all the national laws implementing this Directive. The ePrivacy Regulation, as proposed in its current form, would impose strict opt-in marketing rules, change rules about the use of cookies, web beacons and related technologies, and significantly increase penalties for violations. Such regulations could limit our ability to collect, use and share EU and UK data, could cause our compliance costs to increase and could increase our potential liability, ultimately having an adverse impact on our business, and harm our business and financial condition.
In the US, numerous states have enacted or are in the process of enacting comprehensive data privacy laws and regulations governing the collection, use, and other processing of personal information and providing rights to state residents to access, delete, correct and opt out of the sale or use of their personal information for targeted advertising and for certain other uses of personal data. Our business operates in some, but not all, of these states. These laws are enforceable only by state attorney generals, district attorneys in some states, and in California, the state's new privacy agency; there is no private right of action to enforce these laws. Prosecutors can recover civil (and for California, administrative) penalties, often on a per-person and per-incident basis, which could be substantial. To date, there have been limited public enforcement actions, but that could change in the coming year. California's law also authorizes private parties to bring suits against regulated businesses for negligent data breaches, and plaintiffs can recover statutory damages for such claims, in addition to actual damages and injunctive relief; those cases are proliferating. These laws and expanded enforcement actions and authorities could increase our potential liability and could have an adverse impact on our business, including its financial condition.
In addition, the plaintiffs' bar is increasingly active and has brought hundreds of cases in recent years under privacy-related legal theories, including the California Invasion of Privacy Act (CIPA), otherwise known as California's wiretapping law. These cases typically concern allegations that the use of common third-party vendors or tools on a website constitute interceptions of confidential communications that allegedly constitute wiretapping, which can only be done with the consent of both parties to the communication. These wiretapping cases can be brought in a class action or in a mass arbitration setting. If such suits are brought against us, defending against them in court or in arbitration could substantially increase our legal costs, potential liability, and involve members of our legal teams to assist in defending these claims.
We make public statements about our use, collection, disclosure and other processing of PII through our privacy policies, information provided on our website and press statements. Although we endeavor to comply with our public statements and documentation, we may at times fail to do so or it may be alleged that we have failed to do so. The publication of our privacy policies and other statements that provide promises and assurances about data privacy and security can subject us to potential government or legal action if they are found to be deceptive, unfair or misrepresentation of our actual practices.
Specifically, the Federal Trade Commission ("FTC") and many state attorneys general are interpreting existing federal and state consumer protection laws to impose evolving standards for the collection, use, dissemination and security of personal information. Courts may also adopt the standards for fair information practices promulgated by the FTC, which concern consumer notice, choice, security and access. If such information that we publish is considered untrue, we may be subject to government claims of unfair or deceptive trade practices, which could lead to significant liabilities and consequences. Furthermore, according to the FTC, violating consumers' privacy rights or failing to take appropriate steps to keep consumers' personal information secure may constitute unfair acts or practices in, or affecting, commerce in violation of Section 5 of the FTC Act. Additionally, the FTC recently published an advance notice of proposed rulemaking on commercial surveillance and data security, and is seeking comment on whether it should implement new trade regulation rules or other regulatory alternatives concerning the ways in which companies (1) collect, aggregate, protect, use, analyze, and retain consumer data, as well as (2) transfer, share, sell, or otherwise monetize that data in ways that are unfair or deceptive.
Many of these laws and regulations are still evolving and being tested in courts and could be interpreted or applied in ways that could harm our business, particularly in the new and rapidly evolving industry in which we operate. Federal, state, local, provincial, and international regulators and industry groups may also consider and implement from time to time new data privacy, security and protection laws, rules, regulations and requirements that apply to our businesses, and we cannot yet determine the impact that such future laws, regulations and standards may have on our business. For example, laws in all 50 US states require businesses to provide notice under certain circumstances to customers whose PII has been disclosed as a result of a data breach. Compliance with evolving data privacy and security laws, rules, requirements and regulations may result in cost increases due to necessary changes to our systems and practices, new limitations or constraints on our business models, the development of new administrative processes and may prevent us from providing certain offerings in certain jurisdictions in which we currently operate and in which we may operate in the future. They also may impose further restrictions on our processing, sharing, transmission, collection, disclosure and use of PII in connection with the Soho House App or that are housed in one or more databases maintained by us or our third-party service providers. Any actual or perceived noncompliance with applicable data privacy, security and protection laws, rules and regulations, industry group requirements, contractual obligations, consent requirements or a security or data breach involving the misappropriation, loss or other unauthorized disclosure of personal, sensitive or confidential information, including PII, whether by us or by one of our third-party service providers, and lawsuits brought under state wiretapping laws could have a material adverse effect on our business, operations, brand, reputation and financial condition, including decreased revenue, material fines and penalties, litigation, increased financial processing fees, compensatory, statutory, punitive or other damages, adverse actions against our licenses to do business and injunctive relief by court or consent order.