We maintain a large quantity of sensitive information, including confidential business and personal information in connection with the conduct of our clinical trials and related to our employees, and we are subject to laws and regulations governing the privacy and security of such information. In the United States, there are numerous federal and state privacy and data security laws and regulations governing the collection, use, disclosure and protection of personal information, including federal and state health information privacy laws, federal and state security breach notification laws, and federal and state consumer protection laws. The legislative and regulatory landscape for privacy and data protection continues to evolve, and there has been an increasing focus on privacy and data protection issues, including with respect to regulatory enforcement and private litigation, which may affect our business and is expected to increase our compliance costs and exposure to liability. In the United States, numerous federal and state laws and regulations could apply to our operations or the operations of our partners, including state data breach notification laws, state health information privacy laws, and federal and state consumer protection laws and regulations (e.g., Section 5 of the Federal Trade Commission ("FTC") Act), that govern the collection, use, disclosure, and protection of health-related and other personal information. In addition, we may obtain health information from third parties (including research institutions from which we obtain clinical trial data) that may be subject to privacy and security requirements under HIPAA, as amended by HITECH and regulations promulgated thereunder. Depending on the facts and circumstances, we could be subject to significant penalties if we obtain, use, or disclose, or are subject to an actual or alleged data breach regarding, individually identifiable health information in a manner that is not authorized or permitted by HIPAA. In 2023, the SEC finalized rules requiring enhanced disclosures regarding cybersecurity risk management, strategy, and governance, as well as the timely reporting of material cybersecurity incidents. These rules mandate disclosures about our processes for identifying, assessing, and managing cybersecurity risks, the role of management and the board of directors in overseeing these risks, and specific incidents that materially affect us.
In the EEA, we are subject to the EU GDPR, which took effect in May 2018. The EU GDPR governs the collection, use, disclosure, transfer or other processing of personal data (i.e., data which identifies an individual or from which an individual is identifiable), including clinical trial data, and grants individuals various data protection rights (e.g., the right to erasure of personal data). The EU GDPR imposes a number of obligations on companies, including inter alia: (1) accountability and transparency requirements, and enhanced requirements for obtaining valid consent; (2) obligations to consider data protection as any new products or services are developed and to limit the amount of personal data processed; (3) obligations to implement appropriate technical and organizational measures to safeguard personal data and to report certain personal data breaches to the supervisory authority without undue delay (and no later than 72 hours where feasible); and (4) additional, more onerous requirements around the processing of special categories of personal data (including health data and genetic data). In addition, the EU GDPR prohibits the transfer of personal data from the EEA to the United States and other jurisdictions that the European Commission does not recognize as having "adequate" data protection laws unless a data transfer mechanism has been put in place. In July 2020, the Court of Justice of the EU ("CJEU") in the Schrems II decision limited how organizations could lawfully transfer personal data from the EEA to the United States by invalidating the EU-US Privacy Shield for purposes of international transfers and imposing further restrictions on use of the standard contractual clauses ("SCCs"), including a requirement for companies to carry out a transfer impact assessment, which among other things, assesses laws governing access to personal data in the recipient country and considers whether supplementary measures that provide privacy protections additional to those provided under SCCs will need to be implemented to ensure an essentially equivalent level of data protection to that afforded in the EEA. The European Commission subsequently issued new SCCs in June 2021 to account for the decision of the CJEU and recommendations made by the European Data Protection Board and which are in turn relatively more onerous. At present, there are few, if any, viable alternatives to the SCCs. However, on October 7, 2022, the Biden administration introduced an Executive Order to facilitate a new Trans-Atlantic Data Privacy Framework which will act as a successor to the invalidated EU-US Privacy Shield. On December 13, 2022, the European Commission also published its draft adequacy decision to reflect its view that the new Executive Order and Trans-Atlantic Data Privacy Framework, is able to meet the concerns raised in Schrems II. If the draft adequacy decision is approved and implemented, the agreement will facilitate the transatlantic flow of personal data and provide additional safeguards to data transfer mechanisms (including SCCs and Binding Corporate Rules) for companies transferring personal data from the EU to the US. However, before parties rely on the new framework, there are still legislative and regulatory steps that must be undertaken both in the US and in the EU. The EU GDPR imposes substantial fines for breaches and violations (up to the greater of €20 million or 4% of consolidated annual worldwide gross revenue), and confers a private right of action on data subjects and consumer associations to lodge complaints with supervisory authorities, seek judicial remedies and obtain compensation for damages resulting from violations of the EU GDPR. The EU GDPR increases our responsibility and liability in relation to personal data that we process, and additional mechanisms put in place to address compliance with the EU GDPR must be kept under review as the legislative and regulatory landscape for data protection in the EU continues to evolve.
Relatedly, following Brexit, the EU GDPR has been implemented in the United Kingdom (as the "UK GDPR"). The UK GDPR sits alongside the UK Data Protection Act 2018 which implements certain derogations in the EU GDPR into UK law. Under the UK GDPR, companies not established in the UK but that process personal data in relation to the offering of goods or services to individuals in the UK, or to monitor their behavior will be subject to the UK GDPR – the requirements of which are (at this time) largely aligned with those under the EU GDPR and as such, may lead to similar compliance and operational costs with potential fines of up to £17.5 million or 4% of global turnover. The UK Government has published its own form of SCCs, known as the International Data Transfer Agreement and International Data Transfer Addendum to the EU SCCs. The UK Information Commissioner's Office has also published its own version of the transfer impact assessment and recently revised guidance on international transfers, although entities may choose to adopt either the EU or UK style transfer impact assessment. In terms of international data transfers between the UK and US, it is understood that the UK and the US are also negotiating an adequacy agreement.
Compliance with these and any other applicable privacy and data security laws and regulations is a rigorous and time-intensive process, and we may be required to devote additional resources to and put in place additional mechanisms ensuring compliance with the new data protection and disclosure rules. Despite our efforts to comply with these laws and regulations, the inherent complexity of data security and cyber threats, and the newness of some of these requirements, such as the SEC's cybersecurity disclosure requirements, present a risk of non-compliance or insufficient disclosure, which could invite regulatory scrutiny and affect our operational and financial performance. Furthermore, the laws are not consistent, and compliance in the event of a widespread data breach is costly. In addition, states are constantly adopting new laws or amending existing laws, requiring attention to frequently changing regulatory requirements. For example, California enacted the California Consumer Privacy Act (the "CCPA"), which took effect on January 1, 2020, became enforceable by the California Attorney General on July 1, 2020, and was the first comprehensive state privacy law in the United States. The CCPA gives California residents expanded rights to access and delete their personal information, opt out of certain personal information sharing and receive detailed information about how their personal information is used by requiring covered companies to provide new disclosures to California consumers (as that term is broadly defined) and provide such consumers new ways to opt-out of certain sales of personal information. The CCPA provides for civil penalties for violations, as well as a private right of action for data breaches that is expected to increase data breach litigation. Further, the California Privacy Rights Act (the "CPRA"), which further amended the CCPA, went into effect on January 1, 2023. The CCPA, as amended by the CPRA, imposes additional data protection obligations on companies doing business in California, including additional consumer rights processes, limitations on data uses, new audit requirements for higher risk data, and opt outs for certain uses of sensitive data. It will also create a new California data protection agency authorized to issue substantive regulations and could result in increased privacy and information security enforcement. The majority of the provisions went into effect on January 1, 2023, and additional compliance investment and potential business process changes may be required. Although the CCPA currently exempts certain health-related information, including clinical trial data, the CCPA (as amended by the CPRA) may increase our compliance costs and potential liability. Similar laws have been adopted in other states or proposed in other states and at the federal level, and if passed, such laws may have potentially conflicting requirements that would make compliance challenging. While these proposals and new laws generally include exemptions for HIPAA-covered and clinical trial data, they add layers of complexity to compliance in the U.S. market, and could increase our compliance costs and adversely affect our business. Additionally, newly introduced state laws related to health privacy may result in additional compliance costs. For example, the state of Washington recently passed the "My Health My Data" Act, which will regulate "consumer health data," defined as "personal information that is linked or reasonably linkable to a consumer and that identifies a consumer's past, present, or future physical or mental health." The "My Health My Data" Act provides exemptions for personal data used or shared in research, including data subject to 45 C.F.R. Parts 46, 50, and 56. Additionally, Nevada recently enacted a consumer health data privacy bill, and other states could adopt health-specific privacy laws that could impact our business.
The FTC and many state attorneys general are interpreting existing federal and state consumer protection laws to impose evolving standards for the collection, use, dissemination and security of health-related and other personal information. For instance, the FTC has promulgated standards for fair information practices, which concern consumer notice, choice, security and access, and also require notice of certain health information breaches outside the HIPAA context. Privacy laws require us to publish statements that describe how we handle personal information and choices individuals may have about the way we handle their personal information. Violating individuals' privacy rights, publishing false or misleading information about security practices, or failing to take appropriate steps to keep individuals' personal information secure may constitute unfair or deceptive acts or practices in violation of Section 5 of the FTC Act. Additionally, the FTC published an advance notice of proposed rulemaking on commercial surveillance and data security in 2022 and may implement new trade regulation rules or other regulatory alternatives concerning the ways in which companies (1) collect, aggregate, protect, use, analyze, and retain consumer data, as well as (2) transfer, share, sell, or otherwise monetize that data in ways that are unfair or deceptive in the coming years. Federal regulators, state attorneys general and plaintiffs' attorneys have been and will likely continue to be active in this space, and if we do not comply with existing or new laws and regulations related to patient health information, we could be subject to criminal or civil sanctions.
Any actual or perceived failure by us to comply with applicable privacy and data security laws and regulations could result in regulatory investigations, reputational damage, orders to cease/ change our processing of our data, enforcement notices, and/ or assessment notices (for a compulsory audit). We may also face civil claims including representative actions and other class action type litigation (where individuals have suffered harm), potentially amounting to significant compensation or damages liabilities, as well as associated costs, diversion of internal resources, and reputational harm.