We retain confidential employee, applicant and customer personal, health and financial, and our own proprietary information and data essential to our operations. We rely on the effectiveness of our IT systems, policies and contracts and the policies of our third-party vendors, and their IT systems to safeguard information and data. Additionally, our cybersecurity controls depend on our customers, many of whom are individual or small healthcare providers with limited IT experience and inadequate or untested security protocols, to successfully manage data privacy and security requirements. It is critical that the facilities, infrastructure and IT systems on which we depend and the products and services we develop remain secure and be perceived as secure. Despite the implementation of security features in our products and services and security measures in our IT systems, we and our service providers, third-party vendors and other third parties could be targeted by or subject to physical break-ins, computer viruses and other malicious code, unauthorized or fraudulent access, programming errors or other technical malfunctions, hacking attacks, phishing and other social engineering attacks, malware, ransomware, employee error or malfeasance, cybersecurity attacks, malicious code, and other breaches of, or incidents impacting, IT systems or similar malicious or otherwise disruptive actions, including by organized groups and nation-state actors, which may disrupt or limit the availability of, or result in damage to, our IT systems and result in loss or unavailability of, damage to, or the unauthorized acquisition, use, disclosure, or other processing of confidential information. For example, we have experienced, and may again experience in the future, cybersecurity incidents, data incidents, and unauthorized internal employee exfiltration of information. This risk is exacerbated with the advancement of technologies like AI, which malicious third parties can use to create new, more sophisticated and more frequent or other attacks. There can be no assurance our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our systems and information or any other information we maintain or otherwise process.
Further, the frequency and sophistication of third-party cybersecurity attacks are increasing. Significant service disruptions, breaches, incidents, interruptions or other disruptive events impacting our infrastructure and IT systems, or other cybersecurity incidents, or any belief or reporting that any of the foregoing has occurred, could expose us to regulatory investigations, or other proceedings, private claims, demands, and litigation, impair our reputation and competitive position, distract management and require significant time and resources to address. Legal or regulatory action against us could prevent us from resolving issues quickly or force us to resolve them in unanticipated ways, cause us to incur significant expense and damages, or result in orders forcing us to cease operations or modify our business practices in ways that materially limit or restrict our products and services. Concerns over our practices with respect to privacy, data protection, data governance, and cybersecurity could adversely affect our reputation and deter customers and consumers from using our products and services. In addition, patient care could suffer, and we could be liable if our products, services or IT systems fail to timely deliver accurate and complete information. We have cybersecurity and other forms of insurance coverage related to cyberattacks, breaches, and other incidents or security problems, but we cannot guarantee applicable insurance will be available to us in the future on economically reasonable terms or at all. Damages and claims arising from incidents may not be covered, may exceed coverage limits, and may not cover the time and effort we incur investigating and responding to any incidents, or other costs or liabilities, which may be material. The costs to eliminate, mitigate, or recover from security problems and cybersecurity attacks and incidents could be material and require us to implement additional or different security controls or other measures and, depending on the nature and extent of the problem and the products, services or IT systems impacted, such security problems and cybersecurity attacks and incidents may result in network, IT system interruptions or other disruptions, decreased product sales, data loss, damage, unavailability, or other liabilities, any of which may have a material impact on our operations, net revenues and operating results.
Additionally, our iTero intraoral scanners may be independently or collectively the target of cybersecurity incidents or attacks or subject to security vulnerabilities, bugs, errors, defects, or viruses or other malicious code. Due to the large and growing number of these decentralized devices, we may be unable, or not have the capacity, knowledge or infrastructure, to respond to or remedy a cybersecurity incident in a timely manner. Any such cybersecurity incident may cause loss or damage to us, our customers or strategic business partners or may cause further malfunctions in, or damage to, our products, services, or IT systems, damage to, or loss, unavailability, or unauthorized acquisition, use, or other processing of our data, or disruption, interruption or temporary cessation of our operations. Further, any such security breach or incident, or other cybersecurity incident, or any belief or reporting that any of the foregoing has occurred, may otherwise have a negative impact upon our business or reputation.
We are also subject to federal, state, and foreign laws and regulations respecting the security and privacy of patient healthcare information applicable to healthcare providers and their business associates, such as HIPPA, the HITECH Act, and the Privacy Standards and Security Standards, as well as those relating to privacy, data security, content regulation and consumer protection, such as the California Consumer Protection Act, as amended by the California Privacy Rights Act (as amended, the "CCPA"). The CCPA requires covered businesses that process personal information of California residents to disclose certain practices, provides California residents with data privacy rights, imposes operational requirements, and provides for significant civil penalties for violations as well as a private right of action for certain data breaches and statutory damages. There are limited exemptions under the CCPA for protected health information covered by HIPAA and certain other state laws, but the CCPA and other new and evolving state laws could impact our business activities. Numerous other states have enacted laws relating to privacy, data protection, data governance and cybersecurity that either are in operation or slated to go into operation over the next several years. Many of these laws are comprehensive privacy laws similar to the CCPA. States also are enacting laws addressing specific subject matter, such as Washington's My Health, My Data Act, which includes a private right of action. Laws in all 50 U.S. states may require businesses to provide notice to individuals whose personal data has been disclosed as a result of a data breach. Outside of the U.S., relevant legal requirements continue to evolve. For example, the collection and use of health data and other personal information is governed in the EU by the General Data Protection Regulation ("GDPR"), which imposes significant obligations upon companies and rights for individuals, with substantial penalties for noncompliance up to the greater of €20,000,000 or 4% of the total worldwide annual turnover of the preceding financial year, and by certain EU member state-level legislation. Numerous other jurisdictions maintain similar legislation or other laws or regulations addressing privacy, data protection, data governance, or cybersecurity.
We are also subject to data export restrictions and international transfer laws and regulations that prohibit or impose conditions upon certain data transfers. The mechanisms upon which we and many other companies rely upon for European data transfers have been the subject of legal challenge, regulatory interpretation and judicial decisions by the EU courts and regulators, and may be subject to significant changes. Several countries, including the United States, China, Australia, and Japan, have established legal requirements for cross-border transfers of all or certain personal information and certain countries have also established legal requirements for data localization. These laws and regulations are constantly evolving and may be created, interpreted, applied or amended in ways that could restrict our activities in certain jurisdictions, limit our ability to provide our products and services in those jurisdictions, require us to modify our policies and practices and to engage in additional contractual negotiations, or increase our costs and obligations and impose limitations upon our ability to efficiently transfer personal data across borders. We have and likely will again in the future be required to implement new or expand existing data storage protocols, build new storage facilities, devote additional resources, and modify relevant policies or procedures to comply with the foregoing laws, any of which could be costly and which may adversely affect our business and our customers' businesses, our financial condition and our results of operations in those jurisdictions.
With laws, regulations and other obligations relating to privacy, data protection, data governance and cybersecurity imposing new and relatively burdensome obligations, and with substantial uncertainty over the interpretation and application of these and other obligations, we may face challenges in addressing their requirements and making necessary changes to our policies and practices and may incur significant costs and expenses in an effort to do so. Further, any failure or perceived failure by us or our vendors, customers, or service providers to comply with our applicable policies or notices relating to privacy, data protection, data governance or cybersecurity, our contractual or other obligations to third parties, or any of our other legal obligations, laws, rules, regulations or standards relating to privacy, data protection, data governance or cybersecurity, may result in governmental investigations or enforcement actions, litigation, claims and other proceedings, harm our reputation, and could result in significant liability.