Even if we, or any future collaborators, obtain orphan drug exclusivity for a product, that exclusivity may not effectively protect the product from competition because different drugs can be approved for the same condition and the same drug can be approved for different conditions. Even after an orphan drug is approved, the FDA can subsequently approve the same drug for the same condition if the FDA concludes that the later drug is clinically superior in that it is shown to be safer, more effective or makes a major contribution to patient care.
For example, even if SY-2101 were to be approved and receive orphan drug exclusivity, that would not preclude a competitor from asserting a separate “major contribution to patient care” argument based on a showing of clinical superiority to SY-2101 due to, for example, a change in an inactive ingredient that results in a more favorable profile or a statistically significant improvement in an important safety parameter. In addition, since healthcare providers can prescribe approved drug products for uses outside of their approved labeling, it is possible that another drug product could be approved for a different indication, such as relapsed/refractory APL, and be used “off label” in the up-front setting. On August 3, 2017, Congress passed the FDA Reauthorization Act of 2017 which, among other things, codified the FDA’s pre-existing regulatory interpretation, to require that a drug sponsor demonstrate the clinical superiority of an orphan drug that is otherwise the same as a previously approved drug for the same rare disease in order to receive orphan drug exclusivity. The new legislation reverses prior precedent holding that the Orphan Drug Act unambiguously requires that the FDA recognize the orphan exclusivity period regardless of a showing of clinical superiority. The FDA may further reevaluate the Orphan Drug Act and its regulations and policies. We do not know if, when, or how the FDA may change the orphan drug regulations and policies in the future, and it is uncertain how any changes might affect our business. Depending on what changes the FDA may make to its orphan drug regulations and policies, our business could be adversely impacted.
Our internal computer systems, or those of any collaborators or contractors or consultants, may fail or suffer security breaches, which could result in a material disruption of our product development programs.
Despite the implementation of security measures and certain data recovery measures, our internal computer systems and those of our current and any future collaborators and other contractors or consultants are vulnerable to damage from cyber-attacks, computer viruses, unauthorized access, sabotage, natural disasters, terrorism, war and telecommunication and electrical failures. We have experienced, and may experience in the future, security breaches of our information technology systems. Any system failure, accident or security breach that causes interruptions in our operations, for us or those third parties with which we contract, could result in a material disruption of our product development programs and our business operations, whether due to a loss of our trade secrets or other proprietary information or other similar disruptions, in addition to possibly requiring substantial expenditures of resources to remedy. For example, the loss of clinical trial data from an ongoing, completed or future clinical trial could result in delays in our regulatory approval efforts and significantly increase our costs to recover or reproduce the data. To the extent that any disruption or security breach results in a loss of, or damage to, our data or applications, or inappropriate disclosure of confidential or proprietary information, we may incur liabilities, our competitive position could be harmed and the further development and commercialization of our product candidates may be delayed. In addition, we may not have adequate insurance coverage to provide compensation for any losses associated with such events.
We could be subject to risks caused by misappropriation, misuse, leakage, falsification or intentional or accidental release or loss of information maintained in the information systems and networks of our company, including personal information of our employees. In addition, outside parties have attempted, and may in the future attempt, to penetrate our systems or those of our vendors or fraudulently induce our employees or employees of our vendors to disclose sensitive information to gain access to our data. Like other companies, we may experience threats to our data and systems, including malicious codes and viruses, and other cyber-attacks. The number and complexity of these threats