We rely extensively on information technology ("IT") systems for the storage, processing, and transmission of our electronic, business-related, information assets used in or necessary to conduct business. We leverage our internal IT infrastructures, and those of our business partners or other third parties, to enable, sustain, and support our global business activities. In addition, we rely on networks and services, including internet sites, data hosting and processing facilities and tools and other hardware, software and technical applications and platforms, some of which are managed, hosted, provided and/or used by third-parties or their vendors, to assist in conducting our business. The data we store and process may include customer payment information, personal information concerning our employees, confidential financial information, and other types of sensitive business-related information. In limited instances, we may also come into possession of information related to patients of our physician customers. Numerous and evolving cybersecurity threats pose potential risks to the security of our IT systems, networks and services, as well as the confidentiality, availability and integrity of our data. In addition, the laws and regulations governing security of data on IT systems and otherwise collected, processed, stored, transmitted, disclosed and disposed of by companies are evolving, adding another layer of complexity in the form of new requirements. We have made, and continue to make investments, seeking to address these threats, including monitoring of networks and systems, hiring of third party service providers with expertise in cybersecurity, employee training and security policies for employees and third-party providers. The techniques used in these attacks change frequently and may be difficult to detect for periods of time and difficult to anticipate by implementing adequate preventative measures.
Our worldwide operations mean that we are subject to laws and regulations, including data protection and cybersecurity laws and regulations, in many jurisdictions. For example, the European Union ("EU") General Data Protection Regulation ("GDPR") requires us to manage personal data in the EU and may impose fines of up to four percent of our global revenue in the event of certain violations. In addition, legal requirements standards for cross-border personal data transfers from outside the United States are constantly changing, including the revisions made by the European Economic Area ("EEA") that require the use of revised Standard Contractual Clauses ("SCCs") for international data transfers from the EEA. The SCCs are required to be used for new agreements involving the cross-border transfer of personal data from the EEA and must be supplemented by an assessment and due diligence of the legal and regulatory landscape of the jurisdiction of the data importer, the channels used to transmit personal data and any sub-processors that may receive personal data. The UK has developed its own set of SCCs that must be used for transfers of personal data from the UK to the U.S. In July 2023, the European Commission determined that the Data Privacy Framework ("DPF"), a replacement for the invalidated EU-US Privacy Shield, ensures an adequate level of protection for EU personal data transferred to the United States. Compliance with these changes and any future changes to data transfer or privacy requirements could potentially require us to make significant technological and operational changes, any of which could result in substantial costs, and failure to comply with applicable data protection and transfer or privacy laws requirements could subject us to fines or regulatory oversight.
Likewise, the California Consumer Privacy Act ("CCPA") imposes obligations on companies that conduct business in California, and meet other requirements, with respect to the collection or sale of specified personal information. In November 2020, voters in the State of California approved the California Privacy Rights Act ("CPRA"), a ballot measure that amends and supplements the CCPA by, among other things, expanding certain rights relating to personal information and its use, collection, deletion, and disclosure by covered businesses. Compliance with the CCPA, the CPRA, and other state statutes, common law, or regulations designed to protect consumer, employee, or job applicant personal information could potentially require substantive technology infrastructure and process changes across many of the Company's businesses. Other jurisdictions are also implementing or proposing a variety of data privacy laws and regulations. Further, there has been a developing trend of civil lawsuits and class actions relating to breaches of consumer data held by large companies or incidents arising from other cyber-attacks. Any data security breaches, cyber-attacks, malicious intrusions or significant disruptions could result in actions by regulatory bodies and/or civil litigation, any of which could materially and adversely affect our business, results of operations, financial condition, cash flows, reputation or competitive position.
The costs of protecting IT systems and data may increase, and there can be no assurance that these added security efforts will prevent all breaches of our IT systems or thefts of our data. We may also be exposed to potential disruption in operations, loss of customers, reputational, competitive and business harm, and significant costs from remediation, litigation and regulatory actions if our business continuity plans do not effectively address the following failures on a timely basis:
- our IT systems are damaged or cease to function properly;- the networks or service providers we rely upon fail to function properly;- we fail to comply with an applicable law or regulation, such as the GDPR; or - we or one of our third-party providers suffer a loss or disclosure of our business or stakeholder information due to any number of causes ranging from catastrophic events or power outages to improper data handling or security breaches.