high match confidence
Sentence-level differences:
- Reworded sentence: "We are subject to a number of foreign, federal and state laws and regulations protecting the use, disclosure, and confidentiality of certain patient and consumer health and personal information, including patient records, and restricting the use and disclosure of that protected information, including state breach notification laws."
- Reworded sentence: "These frameworks, in addition to similar laws being enacted by other states and other jurisdictions, impose stringent cybersecurity standards and potentially significant non-compliance penalties, and involve the expenditure of significant resources and time and effort to comply."
- Reworded sentence: "We may be subject to inquiries, investigations and audits in Europe and around the world, particularly in the areas of consumer and data protection, 37 37 37 which will arise in the ordinary course of business and may increase in frequency as we continue to grow and expand our operations."
- Reworded sentence: "In the ordinary course of our business, we collect and store sensitive data, such as our proprietary business information and that of our clients, contractors, vendors and others as well as personally identifiable information of our customers, potential customers, vendors and others, which data may include sensitive information, in our data centers and on our networks."
- Reworded sentence: "Despite our security measures and business controls, our information technology and infrastructure may be vulnerable to attacks by hackers (including nation states or state-sponsored organizations), viruses, malware, breaches due to employee, contractor or vendor error, or malfeasance or other disruptions or subject to the inadvertent or intentional unauthorized release of information."
Current (2024):
We are subject to a number of foreign, federal and state laws and regulations protecting the use, disclosure, and confidentiality of certain patient and consumer health and personal information, including patient records, and restricting the use and disclosure of that protected…
Read full text
We are subject to a number of foreign, federal and state laws and regulations protecting the use, disclosure, and confidentiality of certain patient and consumer health and personal information, including patient records, and restricting the use and disclosure of that protected information, including state breach notification laws. Some of these laws include the Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act of 2009, or HITECH, the European Union’s General Data Protection Regulation, or GDPR, the UK Data Protection Act and the UK GDPR, and the California Consumer Privacy Act as amended, or CCPA, and the Washington My Health My Data Act, among others. Various U.S. state laws and regulations may also require us to notify affected individuals and state regulators in the event of a data breach involving personal information. Penalties for failure to adequately protect personal information, notify as required, or provide timely notice vary by jurisdiction. In the U.S., most state data breach notification laws consider violations to be unfair or deceptive trade practices and give the relevant state attorneys general (“AGs”) the authority to levy fines or bring enforcement actions. Such AG investigations—which are often time consuming, expensive, and burdensome—may lead to a resolution agreement, whereby certain obligations are performed and reports are made to the AG for a period of time, and/or civil penalties. Class action lawsuits against companies which experience a data breach involving personal information are also common. Additionally, the SEC and many jurisdictions have enacted or may enact laws and regulations requiring companies to disclose or otherwise provide notifications regarding data security breaches. For example, the SEC recently adopted cybersecurity risk management and disclosure rules, which require the disclosure of information pertaining to cybersecurity incidents and cybersecurity risk management, strategy, and governance. As our customer base grows to include U.S. federal government agencies, Dexcom may also need comply with Federal Risk and Authorization Management Program and Cybersecurity Maturity Model Certification requirements. These frameworks, in addition to similar laws being enacted by other states and other jurisdictions, impose stringent cybersecurity standards and potentially significant non-compliance penalties, and involve the expenditure of significant resources and time and effort to comply. As these laws and regulations continue develop in the United States and internationally, we may be required to expend significant time and resources in order to update existing processes or implement additional mechanisms as necessary to ensure compliance with such laws. In addition, foreign data protection, privacy, and other laws and regulations can be more restrictive than those in the United States. For example, data localization laws in some countries generally mandate that certain types of data collected in a particular country be stored and/or processed within that country. We may be subject to inquiries, investigations and audits in Europe and around the world, particularly in the areas of consumer and data protection, 37 37 37 which will arise in the ordinary course of business and may increase in frequency as we continue to grow and expand our operations. Legislators and regulators may make legal and regulatory changes, or interpret and apply existing laws, in ways that make our products less useful to our customers, require us to incur substantial costs, expose us to unanticipated civil or criminal liability, or cause us to change our business practices. These changes or increased costs could negatively impact our business and results of operations in material ways. In the ordinary course of our business, we collect and store sensitive data, such as our proprietary business information and that of our clients, contractors, vendors and others as well as personally identifiable information of our customers, potential customers, vendors and others, which data may include sensitive information, in our data centers and on our networks. Our employees, contractor and vendors may also have access to and may use personal health information in the ordinary course of our business. The secure processing, maintenance and transmission of this information is critical to our operations. Despite our security measures and business controls, our information technology and infrastructure may be vulnerable to attacks by hackers (including nation states or state-sponsored organizations), viruses, malware, breaches due to employee, contractor or vendor error, or malfeasance or other disruptions or subject to the inadvertent or intentional unauthorized release of information. Any such occurrence could compromise our networks and the information stored thereon could be accessed, publicly disclosed, lost or stolen. Any such access, disclosure or other loss of information could result in legal claims or proceedings, and liability under laws that protect the privacy of personal information, including regulatory penalties, disrupt our operations and the services we provide to our clients or damage our reputation, any of which could adversely affect our profitability, revenue and competitive position. As we grow and expand our administrative, customer, or IT support services, we may also utilize the services of personnel and contractors located outside of the United States to perform certain functions. While we make every effort to review our applicable contracts and other payor requirements, a local, state, or federal government agency or one of our customers may find the use of offshore resources to be a violation of a legal or contractual requirement, which could result in termination of the contractual relationship, penalties, or changes in our business operations that could adversely affect our business, financial condition, and results of operations. Additionally, while we have implemented industry standard security measures for offshore access to protected health information and other personal information, unauthorized access or disclosure of such information by offshore personnel could result in legal claims or proceedings, and liability under laws that protect the privacy of personal information and may incur regulatory penalties, disrupt our operations and the services we provide to our clients, damage to our reputation, or result in the termination of contractual relationships, penalties or the loss of coverage, any of which could adversely affect our profitability, revenue and competitive position.
View prior text (2023)
We are subject to a number of foreign, federal and state laws and regulations protecting the use, disclosure, and confidentiality of certain patient health and personal information, including patient records, and restricting the use and disclosure of that protected information, including state breach notification laws, the Health Insurance Portability and Accountability Act, as amended by the Health Information Technology for Economic and Clinical Health Act of 2009 (HIPAA), the European Union’s General Data Protection Regulation (GDPR), the UK Data Protection Act and the UK GDPR, and the California Consumer Privacy Act (CCPA), among others . As our customer base grows to include U.S. federal government agencies, Dexcom may also need comply with Federal Risk and Authorization Management Program and Cybersecurity Maturity Model Certification requirements. These frameworks, in addition to similar laws being enacted by other states and counties, impose stringent cybersecurity standards and potentially significant non-compliance penalties, involve the expenditure of significant resources, the investment of significant resources and the investment of significant time and effort to comply. As these laws and regulations continue develop in the United States and internationally, we may be required to expend significant time and resources in order to update existing processes or implement additional mechanisms as necessary to ensure compliance with such cybersecurity laws. In addition, foreign data protection, privacy, and other laws and regulations can be more restrictive than those in the United States. For example, data localization laws in some countries generally mandate that certain types of data collected in a particular country be stored and/or processed within that country. We may be subject to inquiries, investigations and audits in Europe and around the world, particularly in the areas of consumer and data protection, which will arise in the ordinary course of business and may increase in frequency as we continue to grow and expand our operations. Legislators and regulators may make legal and regulatory changes, or interpret and apply existing laws, in ways that make our products less useful to our customers, require us to incur substantial costs, expose us to unanticipated civil or criminal liability, or cause us to change our business practices. These changes or increased costs could negatively impact our business and results of operations in material ways. In the ordinary course of our business, we collect and store sensitive data, such as our proprietary business information and that of our clients, contractors, vendors and others as well as personally identifiable information of our customers, vendors and others, which data may include full names, social security numbers, addresses, and birth dates, in our data centers and on our networks. Our employees, contractor and vendors may also have access to and may use personal health information in the ordinary course of our business. The secure processing, maintenance and transmission of this information is critical to our operations. Despite our security measures and business controls, our information technology and infrastructure may be vulnerable to attacks by hackers, breaches due to employee, contractor or vendor error, or malfeasance or other disruptions or subject to the inadvertent or intentional unauthorized release of information. Any such occurrence could compromise our networks and the information stored thereon could be accessed, publicly disclosed, lost or stolen. Any such access, disclosure or other loss of information could result in legal claims or proceedings, and liability under laws that protect the privacy of personal information and regulatory penalties, disrupt our operations and the services we provide to our clients or damage our reputation, any of which could adversely affect our profitability, revenue and competitive position. As we grow and expand our administrative, customer support or IT support services, we may also utilize the services of personnel and contractors located outside of the United States to perform certain functions. While we make every effort to review our applicable contracts and other payor requirements, a local, state, or federal government agency or one of our customers may find the use of offshore resources to be a violation of a legal or contractual requirement, which could result in termination of the contractual relationship, penalties, or changes in our business operations that could adversely affect our business, financial condition, and results of operations. Additionally, while we have implemented industry standard security measures for offshore access to protected health information and other personal information, unauthorized access or disclosure of such information by offshore personnel could result in legal claims or proceedings, and liability under laws that protect the privacy of personal information and regulatory penalties, disrupt our operations and the services we provide to our clients, damage to our reputation or result in the termination of contractual relationships, penalties or the loss of coverage, any of which could adversely affect our profitability, revenue and competitive position.