SlideShare a Scribd company logo
Revised October 2013

Security Breach Notification Chart
Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding
security breach notification. The chart is for informational purposes only and is intended as an aid in
understanding each state’s sometimes unique security breach notification requirements. Lawyers,
compliance professionals, and business owners have told us that the chart has been helpful when
preparing for and responding to data breaches. We hope that you find it useful as well.

Alabama*
Alaska
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of
Columbia
Florida
Georgia
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas

Kentucky*
Louisiana
Maine
Maryland
Massachusetts
Michigan
Minnesota
Mississippi
Missouri
Montana
Nebraska
Nevada
New
Hampshire
New Jersey
New Mexico*
New York
North Carolina

North Dakota
Ohio
Oklahoma
Oregon
Pennsylvania
Puerto Rico
Rhode Island
South Carolina
South Dakota*
Tennessee
Texas
Utah
Vermont
Virginia
Washington
West Virginia
Wisconsin
Wyoming

* No legislation specifically pertaining to security breach notification. For entities doing business in Texas,
see Texas law.

This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific
facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Alaska
Alaska Stat. § 45.48.010
et seq.
H.B. 65 (signed into law June
13, 2008, Chapter 92 SLA 08)
Effective July 1, 2009

Application. Any person, state, or local governmental agency (excepting the
judicial branch), or person with more than 10 employees (collectively, Entity)
that owns or licenses PI in any form in AK that includes PI of an AK resident.
•

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on state
residents, whether or not the Entity conducts business in AK.

Security Breach Definition. An unauthorized acquisition or reasonable
belief of unauthorized acquisition of PI that compromises the security,
confidentiality, or integrity of the PI maintained by the Entity. Acquisition
includes acquisition by photocopying, facsimile, or other paper-based method;
a device, including a computer, that can read, write, or store information that
is represented in numerical form; or a method not identified in this paragraph.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
a legitimate purpose of the Entity is not a breach of the security of the
information system if the employee or agent does not use the PI for a
purpose unrelated to a legitimate purpose of the Entity and does not
make further unauthorized disclosure of the PI.

Notification Obligation. Any Entity to which the statute applies shall
disclose the breach to each AK resident whose PI was subject to the breach
after discovering or being notified of the breach.
•

Notification is not required if, after an appropriate investigation and
after written notification to the state AG, the Entity determines that
there is not a reasonable likelihood that harm to the consumers
whose PI has been acquired has resulted or will result from the
breach. The determination shall be documented in writing and the
documentation shall be maintained for five years.

Notification of Consumer Reporting Agencies. If an Entity is required to
notify more than 1,000 AK residents of a breach, the Entity shall also notify
without unreasonable delay all consumer credit reporting agencies that
compile and maintain files on consumers on a nationwide basis and provide
the agencies with the timing, distribution, and content of the notices to AK
residents. Entities subject to the Gramm-Leach-Bliley Act are exempt from
this requirement and are not required to notify consumer reporting agencies.
Third-Party Data Notification. If a breach of the security of the information
system containing PI on an AK resident that is maintained by an Entity that
does not own or have the right to license the PI occurs, the Entity shall notify
the Entity that owns or licensed the use of the PI about the breach and
cooperate as necessary to allow the Entity that owns or licensed the use of
the PI to comply with the statute.
Timing of Notification. The disclosure shall be made in the most
expeditious time possible and without unreasonable delay consistent with any
measures necessary to determine the scope of the breach and to restore the

-1This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
reasonable integrity of the information system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when the data element is not encrypted, redacted or is encrypted and the
encryption key has been accessed or acquired:
•

Social Security Number;

•

Number on a driver license or number on a state identification; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to the individual’s financial
account.

PI does not include publicly available information that is lawfully made
available to the general public from the federal, state, or local government.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice;

•

Telephonic notice; or

•

Electronic notice if the Entity’s primary method of communication with
the AK resident is by electronic means or is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity can demonstrate that the cost of
providing notice will exceed $150,000 or that the affected class of persons to
be notified exceeds 300,000. Substitute notice shall consist of all of the
following:
•

Email notice if the Entity has email addresses for the state resident
subject to the notice;

•

Conspicuous posting of the notice on the Web site of the Entity if the
Entity maintains one; and

•

Notification to major statewide media.

Penalties.
•

An Entity that is a governmental agency is liable to the state for a civil
penalty of up to $500 for each state resident who was not notified (the
total penalty may not exceed $50,000) and may be enjoined from
further violations.

•

An Entity that is not a governmental agency is liable to the state for a
civil penalty of up to $500 for each state resident who was not notified
(the total civil penalty may not exceed $50,000).

-2This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation. Notice required by the statute must be made after the
law enforcement agency determines that notification will no longer
impede the investigation.

•

Private Right of Action. A person injured by a breach may bring an
action against a non-governmental Entity.

•

Waiver Not Permitted.

-3This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Arizona
Ariz. Rev. Stat. § 44-7501

Application. Any person or entity (collectively, Entity) that conducts business
in AZ and that owns or licenses unencrypted computerized data that includes
PI.
•

S.B. 1338 (signed into law April
26, 2006, Chapter 232)
Effective December 31, 2006

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on state
residents, whether or not the Entity conducts business in the state.

Security Breach Definition. An unauthorized acquisition of and access to
unencrypted or unredacted computerized data that materially compromises
the security or confidentiality of PI maintained by an Entity as part of a
database of PI regarding multiple individuals and that causes or is reasonably
likely to cause substantial economic loss to an individual.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
the purposes of the Entity is not a breach of the security system if the
PI is not used for a purpose unrelated to the Entity or subject to
further willful unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall notify
the individuals affected when it becomes aware of an incident of unauthorized
acquisition and access to unencrypted or unredacted computerized data that
includes an individual’s PI.
•

An Entity is not required to disclose a breach of the system if the
Entity or a law enforcement agency, after a reasonable investigation,
determines that a breach of the security of the system has not
occurred or is not reasonably likely to occur.

Third-Party Data Notification. If an Entity maintains unencrypted data that
includes PI that the Entity does not own, the Entity shall notify and cooperate
with the owner or the licensee of the information of any breach of the security
of the system following discovery of the breach without unreasonable delay.
Cooperation shall include sharing information relevant to the breach of the
security of the system with the owner or licensee. The person or entity that
owns or licenses the computerized data shall provide notice to the individual.
The Entity that maintained the data under an agreement with the owner or
licensee is not required to provide notice to the individual unless the
agreement stipulates otherwise.
Timing of Notification. The disclosure shall be made in the most expedient
manner possible and without unreasonable delay consistent with any
measures necessary to determine the nature and scope of the breach, to
identify the individual affected or to restore the reasonable integrity of the data
system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when the data element is not encrypted, redacted or secured by any other
method rendering the element unreadable or unusable:

-4This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Social Security Number;

•

Number on a driver license issued pursuant to § 28-3166 or number
on a nonoperating identification license issued pursuant to § 28-3165;
or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to the individual’s financial
account.

PI does not include publicly available information that is lawfully made
available to the general public from the federal, state, or local government.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice;

•

Telephonic notice; or

•

Electronic notice if the Entity’s primary method of communication with
the individual is by electronic means or is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity can demonstrate that the cost of
providing notice will exceed $50,000 or that the affected class of persons to
be notified exceeds 100,000. Substitute notice shall consist of all of the
following:
•

Email notice if the Entity has email addresses for the individuals
subject to the notice;

•

Conspicuous posting of the notice on the Web site of the Entity if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Compliance with Other Laws.
•

Primary Regulator. Notification pursuant to laws, rules, regulations,
guidance, or guidelines established by an Entity’s primary or
functional state regulator is sufficient for compliance.

•

Gramm-Leach-Bliley Act. The provisions of this statute shall not
apply to any Entity who is subject to the provisions of Title V of the
Gramm-Leach-Bliley Act.

•

HIPAA-Covered Entities. A provider of health care, health care
service plan, health insurer, or a covered entity governed by the
medical privacy and security rules issued by the federal Department
of Health and Human Services pursuant to the Health Insurance
Portability and Accountability Act of 1996 (HIPAA) shall be deemed in
-5-

This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
compliance with this chapter.
Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation. Notice required by the statute must be made after the
law enforcement agency determines that notification will no longer
impede the investigation.

•

AG Enforcement. The state AG may seek actual damages for willful
and knowing violations, as well as a civil penalty not to exceed
$10,000 per breach or series of similar breaches.

-6This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Arkansas
Ark. Code § 4-110-101 et seq.
S.B. 1167 (signed into law
March 31, 2005, Act 1526)
Effective August 12, 2005

Application. Any person, business or state agency (collectively, Entity) that
acquires, owns, or licenses computerized data that includes PI.
•

The provisions governing maintenance of PI are applicable to any
Entity maintaining information on AR residents, whether or not
organized or licensed under the laws of AR.

Security Breach Definition. An unauthorized acquisition of computerized
data that compromises the security, confidentiality, or integrity of PI
maintained by an Entity.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
the legitimate purposes of the Entity is not a breach of the security of
the system if the PI is not otherwise used or subject to further
unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security of the system following discovery or
notification of the breach of the security of the system to any resident of AR
whose unencrypted PI was, or is reasonably believed to have been, acquired
by an unauthorized person.
•

Notification is not required if after a reasonable investigation the
Entity determines there is no reasonable likelihood of harm to
consumers.

Third-Party Data Notification. If an Entity maintains computerized data that
includes PI that the Entity does not own that Entity shall notify the owner or
licensee of the information of any breach of the security of the system
immediately following discovery if the PI was, or is reasonably believed to
have been, acquired by an unauthorized person.
Timing of Notification. The disclosure shall be made in the most expedient
time and manner possible and without unreasonable delay, subject to any
measures necessary to determine the scope of the breach and to restore the
reasonable integrity of the data system.
Personal Information Definition. An individual’s first name, or first initial
and his or her last name, in combination with any one or more of the following
data elements when either the name or the data element is not encrypted or
redacted:
•

Social Security Number;

•

Driver license number or AR identification card number;

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account; or

•

Medical information (any individually identifiable information, in

-7This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
electronic or physical form, regarding the individual’s medical history
or medical treatment or diagnosis by a health care professional).
PI does not include any publicly available directories containing information
an individual has voluntarily consented to have publicly disseminated or listed,
such as name, address, or telephone number.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic mail notice if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, or that the affected class of persons
to be notified exceeds 500,000, or the Entity does not have sufficient contact
information. Substitute notice shall consist of all of the following:
•

Email notice when the Entity has email addresses for the subject
persons;

•

Conspicuous posting of the notice on the Web site of the Entity if the
Entity maintains one; and

•

Notification to statewide media.

Exception: Own Notification Policy. Any Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and is otherwise consistent with the timing requirements of the
statute shall be deemed to be in compliance with the notification requirements
of the statute if the Entity notifies affected persons in accordance with its
policies in the event of a security breach.
Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation. Notice required by the statute must be made after the
law enforcement agency determines that notification will no longer
impede the investigation.

•

AG Enforcement.

-8This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

California
Cal. Civ. Code § 1798.29;
1798.80 et seq.
S.B. 1386 (signed into law
September 25, 2002)
Effective July 1, 2003
S.B. 24 (signed into law August
31, 2011)

Application. Any person, business, or state agency (collectively, Entity) that
does business in CA and owns or licenses computerized data that contains
PI.
•

Security Breach Definition. An unauthorized acquisition of computerized
data that compromises the security, confidentiality, or integrity of PI
maintained by the Entity.
•

Effective January 1, 2012
S.B. 46 (signed into law
September 27, 2013)
Effective January 1, 2014

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on CA
residents, whether or not the Entity conducts business in CA.

Good-faith acquisition of PI by an employee or agent of the Entity for
the purposes of the Entity is not a breach of the security of the
system, provided that the PI is not used or subject to further
unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security of the system following discovery or
notification of the breach in the security of the data to any CA resident whose
unencrypted PI was, or is reasonably believed to have been, acquired by an
unauthorized person.
Attorney General Notification. If an Entity is required to notify more than
500 CA residents, the Entity shall electronically submit a single sample copy
of the notification, excluding any personally identifiable information, to the
Attorney General.
Third-Party Data Notification. If an Entity maintains computerized data that
includes PI that the Entity does not own, the Entity must notify the owner or
licensee of the information of any breach of the security of the data
immediately following discovery if the PI was, or is reasonably believed to
have been, acquired by an unauthorized person.
Timing of Notification. The disclosure shall be made in the most expedient
time possible and without unreasonable delay, consistent with the legitimate
needs of law enforcement and any measures necessary to determine the
scope of the breach and restore the reasonable integrity of the data system.
Personal Information Definition.
(1) An individual’s first name or first initial and last name in combination with
any one or more of the following data elements, when either the name or the
data elements are not encrypted:
•

Social Security Number;

•

Driver license number or CA identification card number;

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial

-9This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
account;
•

Medical information (any information regarding an individual’s medical
history, mental or physical condition, or medical treatment or
diagnosis by a health care professional); or

•

Health insurance information (an individual’s health insurance policy
number or subscriber identification number, any unique identifier used
by a health insurer to identify the individual, or any information in an
individual’s application and claims history, including any appeals
records).

(2) Effective January 1, 2014: User name or email address, in combination
with a password or security question and answer that would permit access to
an online account.
PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Effective January 1, 2014: For breaches of login credentials for an email
account furnished by the Entity, notice may not be provided to the breached
email address, but may be provided by one of the following methods:
•

Written notice;

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act); or

•

Clear and conspicuous notice delivered to the CA resident online
when the CA resident is connected to the online account from an IP
address or online location from which the Entity knows the CA
resident customarily accesses the account.

The notice shall be written in plain language and shall include a description of
the following:
•

The date of the notice;

•

Name and contact information of the reporting person or Entity;

•

Type of PI subject to the unauthorized access and acquisition;

•

The date, estimated date, or date range during which the breach
occurred, if it can be determined;

- 10 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Whether notification was delayed as a result of law enforcement
investigation, if that can be determined;

•

A general description of the breach incident, if that information is
possible to determine at the time the notice is provided;

•

The toll-free telephone numbers and addresses of the major credit
reporting agencies if the breach exposed a social security number or
a driver's license or California identification card number.

At the Entity’s discretion, the notice may also include:
•

Information about what the Entity has done to protect individuals
whose information has been breached;

•

Advice on steps that the person whose information was breached
may take to protect him or herself

Effective January 1, 2014: For breaches of only user name or email address,
in combination with a password or security question and answer that would
permit access to an online account, notice may be provided in electronic or
other form and should direct CA residents to:
•

Promptly change their password, security question or answer, or

•

Take other appropriate steps to protect the online account with the
Entity and all other online accounts with the same user name or email
address and password or security question or answer.

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, or that the affected class of subject
persons to be notified exceeds 500,000, or the Entity does not have sufficient
contact information. Substitute notice shall consist of all of the following:
•

Email notice when the Entity has an email address for the subject
persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media and the California Office of
Privacy Protection. State agencies using substitute notice must notify
the California Office of Information Security within the Office of
Technology.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and is otherwise consistent with the timing requirements of the
statute shall be deemed in compliance with the notification requirements of
the statute if it notifies subject persons in accordance with its policies in the
event of a security breach.

- 11 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Exception: HIPAA-Covered Entities. A covered entity under the Health
Insurance Portability and Accountability Act of 1996 (HIPAA) will be deemed
to have complied with the notice requirements in this state law if it has
complied with the notice requirements in Section 13402(f) of the Health
Information Technology for Economic and Clinical Health Act (HITECH).
Other Key Provisions:
•

Delay for Law Enforcement. Notification may be delayed if the law
enforcement agency determines that the notification will impede a
criminal investigation. The notification required by the statute shall be
made after the law enforcement agency determines that it will not
compromise the investigation.

•

Private Right of Action. Any customer injured by a violation of this
title may institute a civil action to recover damages. In addition, any
business that violates, proposes to violate, or has violated this title
may be enjoined.

•

Waiver Not Permitted.

- 12 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Colorado
Colo. Rev. Stat. § 6-1-716

Application. Any individual or commercial entity (collectively, Entity) that
conducts business in CO and that owns or licenses computerized data that
includes PI.
•

H.B. 1119 (signed into law April
24, 2006)
Effective September 1, 2006

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on CO
residents, whether or not the Entity conducts business in CO.

Security Breach Definition. An unauthorized acquisition of unencrypted
computerized data that compromises the security, confidentiality, or integrity
of PI maintained by an Entity.
•

Good-faith acquisition of PI by an employee or agent of an Entity for
the purposes of the Entity is not a breach of the security of the system
if the PI is not used for or is not subject to further unauthorized
disclosure.

Notification Obligation. An Entity that conducts business in CO and that
owns or licenses computerized data that includes PI about a resident of CO
shall, when it becomes aware of a breach of the security of the system, give
notice as soon as possible to the affected CO resident.
•

Notification is not required if after a good-faith, prompt and
reasonable investigation, the Entity determines that misuse of PI
about a CO resident has not occurred and is not likely to occur.

Notification to Consumer Reporting Agencies. If an Entity is required to
notify more than 1,000 CO residents, the Entity shall also notify, without
unreasonable delay, all consumer reporting agencies that compile and
maintain files on consumers on a nationwide basis of the anticipated date of
the notification to the residents and the approximate number of residents who
are to be notified. This paragraph shall not apply to a person who is subject to
Title V of the Gramm-Leach-Bliley Act.
Third-Party Data Notification. If an Entity maintains computerized data that
includes PI that the Entity does not own or license the Entity shall give notice
to and cooperate with the owner or licensee of the information of any breach
of the security of the system immediately following discovery of a breach, if
misuse of PI about a CO resident occurred or is likely to occur. Cooperation
includes sharing with the owner or licensee information relevant to the breach,
except that such cooperation shall not be deemed to require the disclosure of
confidential business information or trade secrets.
Timing of Notification. Notice shall be made in the most expedient time
possible and without unreasonable delay, consistent with any measures
necessary to determine the scope of the breach and to restore the reasonable
integrity of the computerized data system.
Personal Information Definition. A CO resident’s first name or first initial
and last name in combination with any one or more of the following data
elements that relate to the resident, when the data elements are not
- 13 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
encrypted, redacted, or secured by any other method rendering the name or
the element unreadable or unusable:
•

Social Security Number;

•

Driver license number or other identification card number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to a financial account.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government records
or widely distributed media.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice to the postal address listed in the Entity’s records;

•

Telephonic notice; or

•

Electronic notice, if a primary means of communication by the Entity
with a CO resident is by electronic means or the notice provided is
consistent with the provisions regarding electronic records and
signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice will exceed $250,000, or that the affected class of persons to
be notified exceeds 250,000 CO residents, or the Entity does not have
sufficient contact information to provide notice. Substitute notice shall consist
of all of the following:
•

Email notice if the Entity has email addresses for the members of the
affected class of CO residents;

•

Conspicuous posting of the notice on the Web site of the Entity if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. Any Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and whose procedures are otherwise consistent with the
timing requirements of the statute shall be deemed to be in compliance with
the notice requirements of the statute if the Entity notifies affected CO
customers in accordance with its policies in the event of a breach of the
security of the system.
Exception: Compliance with Other Laws.
•

Primary Regulator. Notification pursuant to laws, rules, regulations,
guidance, or guidelines established by an Entity’s primary or
functional state regulator is sufficient for compliance.

- 14 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Gramm-Leach-Bliley Act. The provisions of this statute shall not
apply to any Entity who is subject to Title V of the Gramm-LeachBliley Act.

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation and the law enforcement agency has notified the Entity
that conducts business in CO not to send notice required by the
statute.

•

AG Enforcement. The AG may seek direct damages and injunctive
relief.

- 15 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Connecticut
Conn. Gen. Stat. § 36a-701b

Application. Any person, business or agency (collectively, Entity) that
conducts business in CT, and who, in the ordinary course of such Entity’s
business, owns, licenses, or maintains computerized data that includes PI.
•

S.B. 650 (signed into law June
8, 2005, Public Act 05-148)
Effective January 1, 2006
H.B. 6001 (signed into law
June 15, 2012, Public Act 12-1)
Effective October 1, 2012

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on CT
residents, whether or not the Entity conducts business in CT.

Security Breach Definition. Unauthorized access to or acquisition of
electronic files, media, databases, or computerized data containing PI when
access to the PI has not been secured by encryption or by any other method
or technology that renders the PI unreadable or unusable.
Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of security following the discovery of the breach to any
CT resident whose PI was, or is reasonably believed to have been, accessed
by an unauthorized person through such breach.
•

Notification is not required if, after an appropriate investigation and
consultation with relevant federal, state, and local agencies
responsible for law enforcement, the Entity reasonably determines
that the breach will not likely result in harm to the individuals whose PI
has been acquired and accessed.

Notification Obligation to Attorney General. Any Entity that is required
under the statute to notify CT residents of any breach of security shall not
later than the time when notice is provided to the resident also provide notice
of the breach of security to the Attorney General.
Third-Party Data Notification. If an Entity maintains computerized data that
includes PI that the Entity does not own the Entity shall notify the owner or
licensee of the information of any breach of the security of the data
immediately following its discovery if the PI was, or is reasonably believed to
have been, accessed by an unauthorized person.
Timing of Notification. The disclosure shall be made without unreasonable
delay, consistent with any measures necessary to determine the nature and
scope of the breach, to identify individuals affected, or to restore the
reasonable integrity of the data system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements:
•

Social Security Number;

•

Driver license number or CT identification card number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account.

- 16 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government records
or widely distributed media.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice;

•

Telephonic notice; or

•

Electronic notice, provided it is consistent with the provisions
regarding electronic records and signatures set forth in 15 U.S.C.
§ 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, or that the affected class of subject
persons to be notified exceeds 500,000 persons, or the Entity does not have
sufficient contact information. Substitute notice shall consist of all the
following:
•

Email notice when the Entity has an email address for the affected
persons;

•

Conspicuous posting of the notice on the Web site of the Entity if the
Entity maintains one; and

•

Notification to major statewide media, including newspapers, radio
and television.

Exception: Own Notification Policy. Any Entity that maintains its own
security breach procedures as part of an information security policy for the
treatment of PI and otherwise complies with the timing requirements of the
statute shall be deemed to be in compliance with the security breach
notification requirements of the statute, provided such Entity notifies subject
persons in accordance with its policies in the event of a breach of security.
Exception: Compliance with Other Laws.
•

Primary Regulator. Notification pursuant to laws, rules, regulations,
guidance, or guidelines established by an Entity’s primary or
functional state regulator is sufficient for compliance.

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed for a
reasonable period of time if a law enforcement agency determines
that the notice will impede a criminal investigation and such law
enforcement agency has made a request that notification be delayed.
Notice required by the statute must be made after the law
enforcement agency determines that notification will no longer
impede the investigation and so notifies the Entity of such

- 17 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
determination.
•

AG Enforcement. The AG may seek direct damages and injunctive
relief.

•

Notice to the Insurance Department. Pursuant to Bulletin IC-25
(Aug. 18, 2010), all licensees and registrants of the Connecticut
Insurance Department are required to notify the Department of any
information security incident which affects any CT residents as soon
as the incident is identified, but no later than five calendar days after
the incident is identified.

- 18 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Delaware
Del. Code Ann. tit. 6 § 12B-101
et seq.
H.B. 116 (signed into law June
28, 2005)
Effective June 28, 2005
H.B. 247 (signed into law June
10, 2010)

Application. Any individual or commercial entity (collectively, Entity) that
conducts business in DE and that owns or licenses computerized data that
includes PI about a resident of DE.
•

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on DE
residents, whether or not the Entity conducts business in DE.

Security Breach Definition. An unauthorized acquisition of unencrypted
computerized data that compromises the security, confidentiality, or integrity
of PI maintained by an Entity.
•

Effective June 10, 2010

Good-faith acquisition of PI by an employee or agent of an Entity for
the purposes of the Entity is not a breach of the security of the
system, provided that the PI is not used or subject to further
unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall, when it
becomes aware of a breach of the security of the system, notify the affected
DE resident.
•

Notification is not required if after a good-faith, reasonable, and
prompt investigation the Entity determines there is no reasonable
likelihood of harm to consumers.

Third-Party Data Notification. An Entity that maintains computerized data
that includes PI that the Entity does not own or license shall give notice to and
cooperate with the owner or licensee of the information of any breach of the
security of the system immediately following discovery of the breach, if
misuse of PI about a DE resident occurred or is reasonably likely to occur.
Cooperation includes sharing with the owner or licensee information relevant
to the breach.
Timing of Notification. Notice shall be made in good faith, in the most
expedient time possible and without unreasonable delay, consistent with any
measures necessary to determine the scope of the breach and to restore the
reasonable integrity of the computerized data system.
Personal Information Definition. A DE resident’s first name or first initial
and last name, in combination with any one or more of the following data
elements that relate to the resident, when either the name or the data
elements are not encrypted:
•

Social Security Number;

•

Driver license number or DE identification card number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to a resident’s financial account.

PI does not include publicly available information that is lawfully made

- 19 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice;

•

Telephonic notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice will exceed $75,000, or that the affected class of DE
residents to be notified exceeds 100,000 residents, or the Entity does not
have sufficient contact information to provide notice. Substitute notice shall
consist of all of the following:
•

Email notice if the Entity has email addresses for the members of the
affected class of DE residents;

•

Conspicuous posting of the notice on the Web site of the Entity if the
Entity maintains one; and

•

Notice to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI, and whose procedures are otherwise consistent with the
timing requirements of the statute, is deemed to be in compliance with the
notice requirements of the statute if the Entity notifies affected DE residents in
accordance with its policies in the event of a breach of the security of the
system.
Exception: Compliance with Other Laws.
•

Primary Regulator. Notification pursuant to laws, rules, regulations,
guidance, or guidelines established by an Entity’s primary or
functional state regulator is sufficient for compliance.

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation. Notice required by the statute must be made without
unreasonable delay and as soon as possible after the law
enforcement agency determines that notification will no longer
impede the investigation.

•

AG Enforcement. The Attorney General may bring an action to
address violations of this chapter and for other relief that may be

- 20 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
necessary to ensure compliance and recover direct economic
damages.

- 21 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

District of Columbia
D.C. Code § 28-3851 et seq.

Application. Any person or entity (collectively, Entity) who conducts
business in DC and who, in the course of such business, owns or licenses
computerized or other electronic data that includes PI.
•

Council Bill 16-810 (signed into
law March 8, 2007)
Effective July 1, 2007

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on DC
residents, whether or not the Entity conducts business in DC.

Security Breach Definition. An unauthorized acquisition of computerized or
other electronic data, or any equipment or device storing such data that
compromises the security, confidentiality, or integrity of PI maintained by the
Entity.
•

Acquisition of data that has been rendered secure, so as to be
unusable by an unauthorized third party, shall not be deemed to be a
breach of the security of the system.

•

Good-faith acquisition of PI by an employee or agent of the Entity for
the purposes of the Entity is not a breach of the security of the system
if the PI is not used improperly or subject to further unauthorized
disclosure.

Notification Obligation. Any Entity to which the statute applies, and who
discovers a breach of the security system, shall promptly notify any DC
resident whose PI was included in the breach.
Notification to Consumer Reporting Agencies. If any Entity is required to
notify more than 1,000 persons of a breach of security, the Entity shall also
notify, without unreasonable delay, all consumer reporting agencies that
compile and maintain files on consumers on a nationwide basis, as defined by
section § 603(p) of the federal Fair Credit Reporting Act, of the timing,
distribution and content of the notices. This subsection shall not apply to an
Entity who is required to notify consumer reporting agencies of a breach
pursuant to Title V of the Gramm-Leach-Bliley Act.
Third-Party Data Notification. Any Entity that maintains, handles, or
otherwise possesses computerized or other electronic data that includes PI
that the Entity does not own shall notify the owner or licensee of the
information of any breach of the security of the system in the most expedient
time possible following discovery.
Timing of Notification. The notification shall be made in the most expedient
time possible and without unreasonable delay, consistent with any measures
necessary to determine the scope of the breach and restore the reasonable
integrity of the data system.
Personal Information Definition. Any number or code or combination of
numbers or codes, such as account number, security code, access code, or
password, that allows access to or use of an individual’s financial or credit
account, or an individual’s first name or first initial and last name, or phone

- 22 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
number, or address, and any one or more of the following data elements:
•

Social Security Number;

•

Driver license number or DC identification card number; or

•

Credit card number or debit card number.

Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if the customer has consented to receipt of
electronic notice consistent with the provisions regarding electronic
records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice to persons would exceed $50,000, that the number of
persons to receive notice under the statute exceeds 100,000, or that the
Entity does not have sufficient contact information. Substitute notice shall
consist of all of the following:
•

Email notice when the Entity has an email address for the subject
persons;

•

Conspicuous posting of the notice on the Web site of the Entity if the
Entity maintains one; and

•

Notice to major local and, if applicable, national media.

Exception: Own Notification Policy. Any Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and whose procedures are otherwise consistent with the
timing requirements of the statute shall be deemed in compliance with the
notification requirements of the statute if the Entity provides notice, in
accordance with its policies, reasonably calculated to give actual notice to
persons to whom notice is otherwise required to be given under the statute.
•

Notice under this section may be given by email if the Entity’s primary
method of communication with the DC resident is by email.

Exception: Compliance with Other Laws.
•

Gramm-Leach-Bliley Act. The provisions of this statute shall not
apply to any Entity who is subject to the provisions of Title V of the
Gramm-Leach-Bliley Act.

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation. Notice required by the statute must be made without
unreasonable delay and as soon as possible after the law

- 23 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
enforcement agency determines that notification will no longer
impede the investigation.
•

AG Enforcement. The AG may seek direct damages and injunctive
relief.

•

Private Right of Action. Any District of Columbia resident injured by
a violation may institute a civil action to recover actual damages, the
costs of the action, and reasonable attorney’s fees. Actual damages
shall not include dignitary damages, including pain and suffering.

•

Waiver Not Permitted.

- 24 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Florida
Fla. Stat. § 817.5681
H.B. 481 (signed into law June
14, 2005)
Effective July 1, 2005

Application. Any person, firm, association, joint adventure, partnership,
syndicate, corporation, and all other groups or combinations (collectively,
Entity) who conduct business in FL and maintain computerized data in a
system that includes PI.
•

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on FL
residents, whether or not the Entity conducts business in FL.

Security Breach Definition. An unlawful and unauthorized acquisition of
computerized data that materially compromises the security, confidentiality, or
integrity of PI maintained by the Entity.
•

Good-faith acquisition of PI by an employee or agent of the Entity is
not a breach of the security of the system, provided the information is
not used for a purpose unrelated to the business or subject to further
unauthorized use.

Notification Obligation. An Entity that conducts business in FL and
maintains computerized data in a system that includes PI shall provide notice
of any breach of the security of the system, following a determination of the
breach, to any resident of FL whose unencrypted PI was, or is reasonably
believed to have been, acquired by an unauthorized person.
•

Notification is not required if, after an appropriate investigation or after
consultation with relevant federal, state, and local agencies
responsible for law enforcement, the Entity reasonably determines
that the breach has not and will not likely result in harm to the
individuals whose PI has been acquired and accessed. Such a
determination must be documented in writing and the documentation
must be maintained for five years.

Notification to Consumer Reporting Agencies. If an Entity discovers
circumstances requiring notification pursuant to this section of more than
1,000 persons at a single time, the Entity shall also notify, without
unreasonable delay, all consumer reporting agencies that compile and
maintain files on consumers on a nationwide basis of the timing, distribution,
and content of the notices.
Third-Party Data Notification. Any Entity that maintains computerized data
that includes PI on behalf of another business entity shall disclose to the
business entity for which the information is maintained any breach of the
security of the system as soon as practicable, but no later than 10 days
following the determination, if the PI was, or is reasonably believed to have
been, acquired by an unauthorized person. The Entity that maintains the data
on behalf of another business entity and the business entity on whose behalf
the data is maintained may agree who will provide the notice, if any is
required, provided only a single notice for each breach of the security system
shall be required. If agreement regarding notification cannot be reached, the
Entity with the direct business relationship with the FL resident shall be
- 25 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
subject to these provisions.
Timing of Notification. Notification shall be made without unreasonable
delay, subject to any measures necessary to determine the presence, nature,
and scope of the breach and restore the reasonable integrity of the system.
•

Notification must be made no later than 45 days following the
determination of the breach.

Personal Information Definition. An individual’s first name, first initial and
last name, or any middle name and last name, in combination with any one or
more of the following data elements when the data elements are not
encrypted:
•

Social Security Number;

•

Driver license or FL identification card number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government records
or widely distributed media.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if the Entity has a valid email address for the subject
person and the subject person has agreed to accept communications
electronically, or if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, the affected class of subject
persons to be notified exceeds 500,000, or the Entity does not have sufficient
contact information. Substitute notice shall consist of all of the following:
•

Email notice when the Entity has an email address for the subject
persons;

•

Conspicuous posting of the notice on the Web site of the Entity, if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. Any Entity who maintains its own
notification procedures as part of an information security or privacy policy for
the treatment of PI, which procedures are otherwise consistent with the timing

- 26 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
requirements of this statute, shall be deemed in compliance with the
notification requirements of the statute if the Entity notifies subject persons in
accordance with the Entity’s policies in the event of a breach of security of the
system.
Penalties. An Entity that violates the statute in the following manner is
subject to the following administrative fines:
•

An Entity that fails to notify subject persons or another Entity following
the determination of a breach is liable for a fine per breach, not to
exceed $500,000, (i) in the amount of $1,000 for each day the breach
goes undisclosed for up to 30 days and, thereafter, $50,0000 for each
30-day period or portion therefore for up to 180 days; or (ii) if
notification is not made within 180 days, any Entity required to make
notification who fails to do so is subject to a fine of up to $500,000.

•

An Entity required to document a failure to notify affected persons
who fails to document the failure, or who, if documentation was
created, fails to maintain the documentation for the full five years is
liable for a fine of up to $50,000 for such failure.

Exception: Compliance with Other Laws.
•

Primary Regulator. Notification pursuant to laws, rules, regulations,
guidance, or guidelines established by an Entity’s primary or
functional state regulator is sufficient for compliance.

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation. Notice required by the statute must be made without
unreasonable delay and as soon as possible after the law
enforcement agency determines that notification will no longer
impede the investigation.

•

Department of Legal Affairs Enforcement. Allows the DLA to
assess and collect the fines provided under the statute.

- 27 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Georgia
Ga. Code § 10-1-910 et seq.
S.B. 230 (signed into law May
5, 2005)
Effective May 5, 2005
S.B. No. 236 (signed into law
May 24, 2007)

Application. Any person or entity who, for monetary fees or dues, engages
in whole or in part in the business of collecting, assembling, evaluating,
compiling, reporting, transmitting, transferring, or communicating information
concerning individuals for the primary purpose of furnishing PI to nonaffiliated
third parties, or any state or local agency or subdivision thereof including any
department, bureau, authority, public university or college, academy,
commission, or other government entity (collectively, Entity) that maintains
computerized data that includes PI of individuals. The statute shall not apply
to any governmental agency whose records are maintained primarily for traffic
safety, law enforcement, or licensing purposes or for purposes of providing
public access to court records or to real or personal property information.
•

Effective May 24, 2007

The provisions governing maintenance of PI are applicable to any
Entity maintaining information on GA residents, whether or not
organized or licensed under the laws of GA.

Security Breach Definition. An unauthorized acquisition of an individual’s
electronic data that compromises the security, confidentiality, or integrity of PI
of such individual maintained by an Entity.
•

Good-faith acquisition or use of PI by an employee or agent of an
Entity for the purposes of such Entity is not a breach of the security of
the system, provided that the PI is not used or subject to further
unauthorized disclosure.

Notification Obligation. Any Entity that maintains computerized data that
includes PI of individuals shall give notice of any breach of the security of the
system following discovery or notification of the breach to any resident of GA
whose unencrypted PI was, or is reasonably believed to have been, acquired
by an unauthorized person.
Notification to Consumer Reporting Agencies. In the event an Entity
discovers circumstances requiring notification of more than 10,000 residents
of GA at one time, the Entity shall also notify, without unreasonable delay, all
consumer reporting agencies that compile and maintain files on consumers
on a nationwide basis of the timing, distribution, and content of the notices.
Third-Party Data Notification. If an Entity maintains computerized data on
behalf of another Entity that includes PI of individuals that the Entity does not
own, it shall notify the other Entity of any breach of the security of the system
within 24 hours following discovery, if the PI was, or is reasonably believed to
have been, acquired by an unauthorized person.
Timing of Notification. The notice shall be made in the most expedient time
possible and without unreasonable delay, consistent with any measures
necessary to determine the scope of the breach and restore the reasonable
integrity, security, and confidentiality of the data system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,

- 28 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
when either the name or the data elements are not encrypted or redacted:
•

Social Security Number;

•

Driver license or GA identification card number;

•

Account number or credit card number or debit card number if
circumstances exist wherein such a number could be used without
additional identifying information, access codes, or passwords;

•

Account passwords or personal identification numbers or other
access codes; or

•

Any of the above items when not in connection with the individual’s
first name or first initial and last name, if the information compromised
would be sufficient to perform or attempt to perform identity theft
against the person whose information was compromised.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If an Entity demonstrates that the cost of
providing notice would exceed $50,000, that the affected class of individuals
to be notified exceeds 100,000, or that the Entity does not have sufficient
contact information to provide written or electronic notice to such individuals.
Substitute notice shall consist of all of the following:
•

Email notice, if the Entity has an email address for the individuals to
be notified;

•

Conspicuous posting of the notice on the Entity’s Web site, if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. Any Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and whose procedures are otherwise consistent with the
timing requirements of the statute shall be deemed to be in compliance with
the notification requirements of the statute if it notifies the individuals who are
the subjects of the notice in accordance with its policies in the event of a
breach of the security of the system.
Other Key Provisions:

- 29 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation. Notice required by the statute must be made without
unreasonable delay and as soon as possible after the law
enforcement agency determines that notification will no longer
impede the investigation.

- 30 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Hawaii
H.R.S. § 487N-1 et seq.
S.B. 2290 (signed into law May
25, 2006, Act 135)
Effective January 1, 2007
S.B. 2402 (signed into law April
17, 2008, Act 19)
Effective April 17, 2008

Application. Any sole proprietorship, partnership, corporation, association,
or other group, however organized, and whether or not organized to operate
at a profit, including financial institutions organized, chartered, or holding a
license or authorization certificate under the laws of HI, any other state, the
United States, or any other country, or the parent or the subsidiary of any
such financial institution, and any entity whose business is records
destruction, or any government agency that collects PI for specific
government purposes (collectively, Entity) that owns or licenses PI of
residents of HI in any form (whether computerized, paper, or otherwise).
•

The provisions governing maintenance of PI are applicable to any
Entity maintaining information on HI residents, whether or not the
Entity conducts business in HI.

Security Breach Definition. Any unauthorized access to and acquisition of
unencrypted or unredacted records or data containing PI where illegal use of
the PI has occurred, or is reasonably likely to occur, where such unauthorized
access and acquisition creates a risk of harm to a person. Any incident of
unauthorized access to and acquisition of encrypted records or data
containing PI along with the confidential process or key constitutes a security
breach.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
a legitimate purpose is not a security breach, provided that the PI is
not used for a purpose other than a lawful purpose of the business
and is not subject to further unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall provide
notice to the affected person of a security breach following discovery or
notification of the breach.
Attorney General/Agency Notification. If more than 1,000 persons are
notified at one time under this section, the business shall notify the State of
Hawaii’s Office of Consumer Protection of the timing, content, and distribution
of the notice.
Notification to Consumer Reporting Agencies. If more than 1,000 persons
are notified at one time pursuant to this section, the Entity shall notify in
writing, without unreasonable delay, all consumer reporting agencies that
compile and maintain files on consumers on a nationwide basis of the timing,
distribution, and content of the notice.
Notification Obligation for Government Agencies. A government agency
shall submit a written report to the legislature within 20 days after discovery of
a security breach at the government agency that details information relating to
the nature of the breach, the number of individuals affected by the breach, a
copy of the notice of security breach that was issued, the number of
individuals to whom the notice was sent, whether the notice was delayed due
to law enforcement considerations, and any procedures that have been
implemented to prevent the breach from reoccurring. In the event that a law

- 31 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
enforcement agency informs the government agency that notification may
impede a criminal investigation or jeopardize national security, the report to
the legislature may be delayed until 20 days after the law enforcement agency
has determined that notice will no longer impede the investigation or
jeopardize national security.
Third-Party Data Notification. Any business located in HI or any business
that conducts business in HI that maintains or possesses records or data
containing PI of residents of HI that the business does not own or license,
shall notify the owner or licensee of the PI of any security breach immediately
following discovery of the breach.
Timing of Notification. The disclosure notification shall be made without
unreasonable delay, consistent with any measures necessary to determine
sufficient contact information, determine the scope of the breach, and restore
the reasonable integrity, security, and confidentiality of the data system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when either the name or the data elements are not encrypted:
•

Social Security Number;

•

Driver license number or HI identification card number; or

•

Account number, credit card number, debit card number, access
code, or password that would permit access to an individual’s
financial account.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice to the last available address the Entity has on record;

•

Telephonic notice, provided that contact is made directly with the
affected persons; or

•

Email notice, for those persons for whom an Entity has a valid email
address and who have agreed to receive communications
electronically if the notice provided is consistent with the provisions
regarding electronic records and signatures set forth in 15 U.S.C.
§ 7001 (E-SIGN Act).

The notice shall be clear and conspicuous and shall include a description of
the following:
•

The incident in general terms;

•

Type of PI subject to the unauthorized access and acquisition;

- 32 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

The general acts of the Entity to protect the PI from further
unauthorized access;

•

A telephone number that the person may call for further information
and assistance, if one exists; and

•

Advice that directs the person to remain vigilant by reviewing account
statements and monitoring free credit reports.

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $100,000, or that the affected class of persons
to be notified exceeds 200,000, or if the Entity does not have sufficient
contact information or consent to satisfy the required notice, for only those
affected persons without sufficient contact information or consent, or if the
Entity is unable to identify particular affected persons, for only those
unidentifiable affected persons. Substitute notice shall consist of all the
following:
•

Email notice when the Entity has an email address for the subject
persons;

•

Conspicuous posting of the notice on the Entity’s Web site, if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Compliance with Other Laws.
•

Federal Interagency Guidance. A financial institution that is subject
to and in compliance with the Federal Interagency Guidance
Response Programs for Unauthorized Access to Customer
Information and Customer Notice, issued on March 7, 2005, by the
Board of Governors of the Federal Reserve System, the Federal
Deposit Insurance Corporation, the Office of the Comptroller of the
Currency, and the Office of Thrift Supervision, and any revisions,
additions, or substitutions relating to said interagency guidance, shall
be deemed to be in compliance.

•

HIPAA-Covered Entities. A provider of health care, health care
service plan, health insurer, or a covered entity governed by the
medical privacy and security rules issued by the federal Department
of Health and Human Services pursuant to the Health Insurance
Portability and Accountability Act of 1996 (HIPAA) shall be deemed in
compliance with this chapter.

Penalties. Any Entity that violates any provisions of the statute is subject to
penalties of not more than $2,500 for each violation.
Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law

- 33 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
enforcement agency determines that the notice will impede a criminal
investigation or jeopardize national security and requests a delay;
provided that such request is made in writing, or the Entity documents
the request contemporaneously in writing, including the name of the
law enforcement officer making the request and the officer’s law
enforcement agency engaged in the investigation. The notice shall
be provided without unreasonable delay after the law enforcement
agency communicates to the Entity its determination that notice will
no longer impede the investigation or jeopardize national security.
•

AG Enforcement.

•

Waiver Not Permitted.

- 34 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Idaho
Idaho Code § 28-51-104
et seq.
S.B. 1374 (signed into law
March 30, 2006, Chapter 258)
Effective July 1, 2006
H.B. 566 (signed into law
March 31, 2010)

Application. Any agency, individual or commercial entity (collectively, Entity)
that conducts business in ID and that owns or licenses computerized data that
includes PI about a resident of ID.
•

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on ID
residents, whether or not the Entity conducts business in ID.

Security Breach Definition. An illegal acquisition of unencrypted
computerized data that materially compromises the security, confidentiality, or
integrity of PI for one or more persons maintained by Entity.
•

Effective July 1, 2010

Good-faith acquisition of PI by an employee or agent of an Entity for
the purposes of the Entity is not a breach of the security of the
system, provided that the PI is not used or subject to further
unauthorized disclosure.

Notification Obligation. An Entity to which the statute applies shall give
notice as soon as possible to the affected ID resident.
•

Notification is not required if after a good-faith, reasonable and
prompt investigation the Entity determines that the PI has not been
and will not be misused.

Notification Obligation for State Agencies. When an agency becomes
aware of a security breach, it shall, within 24 hours, notify the office of the ID
Attorney General.
•

A state agency must also report a security breach to the office of the
chief information officer within the department of administration,
pursuant to the information technology resource management council
policies.

Third-Party Data Notification. An Entity that maintains computerized data
that includes PI that the Entity does not own or license shall give notice to and
cooperate with the owner or licensee of the information of any breach of the
security of the system immediately following discovery of the breach, if
misuse of PI about an ID resident occurred or is reasonably likely to occur.
Cooperation includes sharing with the owner or licensee information relevant
to the breach.
Timing of Notification. Notice must be made in the most expedient time
possible and without unreasonable delay, consistent with any measures
necessary to determine the scope of the breach, to identify the individuals
affected, and to restore the reasonable integrity of the computerized data
system.
Personal Information Definition. An ID resident’s first name or first initial
and last name in combination with any one or more of the following data
elements that relate to the resident, when either the name or the data element
are not encrypted:

- 35 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Social Security Number;

•

Driver license number or identification card number; or

•

Account number or credit card number in combination with any
required security code, access code, or password that would permit
access to a resident’s financial account.

Notice Required. Notice may be provided by one of the following methods:
•

Written notice to the most recent address the Entity has in its records;

•

Telephonic notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity required to provide notice
demonstrates that the cost of providing notice would exceed $25,000, or that
the number of ID residents to be notified exceeds 50,000, or that the Entity
does not have sufficient contact information to provide notice. Substitute
notice consists of all of the following:
•

Email notice if the Entity has email addresses for the affected ID
residents;

•

Conspicuous posting of the notice on the Web site of the Entity if the
Entity maintains one; and

•

Notice to major statewide media.

Exception: Own Notification Policy. Any Entity that maintains its own
notice procedures as part of an information security policy for the treatment of
PI, and whose procedures are otherwise consistent with the timing
requirements of the statute is deemed to be in compliance with the notice
requirements if the Entity notifies affected ID residents in accordance with its
policies in the event of a breach of the security of the system.
Exception: Compliance with Other Laws.
•

Primary Regulator. Notification pursuant to laws, rules, regulations,
guidance, or guidelines established by an Entity’s primary or
functional state regulator is sufficient for compliance.

Penalties. Any Entity that intentionally fails to give notice in accordance with
the statute shall be subject to a fine of not more than $25,000 per breach of
the security of the system.
Penalties for Government Disclosure. Any governmental employee that
intentionally discloses personal information not subject to disclosure
otherwise allowed by law shall be subject to a fine of not more than $2,000,
by imprisonment in the county jail for a period of not more than 1 year, or

- 36 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
both.
Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation. Notice required by the statute must be made as soon
as possible after the law enforcement agency determines that
notification will no longer impede the investigation.

•

Primary State Regulator Enforcement. Authorizes primary state
regulator to bring a civil action against an Entity that it believes to
have violated the statute by failing to give notice to enforce
compliance with the statute and enjoin the Entity from further
violation.

- 37 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Illinois
815 Ill. Comp. Stat. 530/5,
530/10, 530/12, 530/15,
530/20, 530/25
H.B. 1633 (signed into law
June 16, 2005, Public Act 9436)
Effective June 27, 2006
H.B. 3025 (signed Aug. 22,
2011, Public Act 97-483)
Effective Jan. 1, 2012

Application. Any data collector, which includes, but is not limited to,
government agencies, public and private universities, privately and publicly
held corporations, financial institutions, retail operators, and any other entity
that, for any purpose, handles, collects, disseminates, or otherwise deals with
nonpublic PI (collectively, Entity) that owns or licenses PI concerning an IL
resident.
•

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on IL
residents, whether or not the Entity conducts business in IL.

Security Breach Definition. An unauthorized acquisition of computerized
data that compromises the security, confidentiality, or integrity of PI
maintained by the Entity.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
a legitimate purpose of the Entity does not constitute a security
breach, provided that the PI is not used for a purpose unrelated to the
Entity’s business or subject to further unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall notify
the resident at no charge that there has been a breach following discovery or
notification of the breach. Note: Illinois may take the position that any
unauthorized acquisition or use by a third party triggers the notification
obligation, regardless of materiality or ownership of the data.
Notification Obligation for State Agencies. Any state agency that collects
PI and has had a breach of security of the system data or written material
shall submit a report within five business days of the discovery or notification
of the breach to the General Assembly listing the breaches and outlining any
corrective measures that have been taken to prevent future breaches of the
security of the system data or written material. Any agency that has
submitted a report under the statute shall submit an annual report listing all
breaches of security of the system data or written materials and the corrective
measures that have been taken to prevent future breaches.
Third-Party Data Notification. Any Entity that maintains or stores
computerized data that includes PI that the Entity does not own or license
shall notify the owner or licensee of the information of any breach of the
security of the data immediately following discovery, if the PI was, or is
reasonably believed to have been, acquired by an unauthorized person. In
addition, such Entities shall cooperate with the data owner or licensee in
matters relating to the breach, including (1) giving notice of the (approximate)
date and nature of the breach and (2) informing the owner or licensee of steps
taken or planned relating to the breach.
Timing of Notification. The disclosure notification shall be made in the most
expedient time possible and without unreasonable delay, consistent with any
measures necessary to determine the scope of the breach and restore the
reasonable integrity, security, and confidentiality of the data system.

- 38 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when either the name or the data elements are not encrypted or redacted:
•

Social Security Number;

•

Driver license number or IL identification card number; or

•

Account number or credit card number or debit card number or an
account number or credit card number in combination with any
required security code, access code, or password that would permit
access to an individual’s financial account.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if consistent with the provisions regarding electronic
records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act).

Contents of Notice. The notice shall include:

•

The toll-free numbers and addresses for consumer reporting
agencies;

•

The toll-free number, address, and website address for the Federal
Trade Commission; and

•

A statement that the individual can obtain information from these
sources about fraud alerts and security freezes.

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, or that the affected class of subject
persons to be notified exceeds 500,000, or the Entity does not have sufficient
contact information. Substitute notice shall consist of all of the following:
•

Email notice if the Entity has an email address for subject persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and is otherwise consistent with the timing requirements of the
statute, shall be deemed in compliance with the notification requirements of
the statute if the Entity notifies subject persons in accordance with its policies
in the event of a breach of the security of the system data.

- 39 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation and provides the Entity with a written request of delay.
Notice required by the statute must be made without unreasonable
delay and as soon as possible after the law enforcement agency
determines that notification will no longer impede the investigation.

•

Waiver Not Permitted.

•

Violation of the statute constitutes an unlawful practice under the IL
Consumer Fraud and Deceptive Business Practices Act.

- 40 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Indiana
Ind. Code § 4-1-11 et
seq.; § 24-4.9-1 et seq.

Application. Any individual, corporation, business trust, estate, trust,
partnership, association, nonprofit corporation or organization, cooperative,
state agency or any other legal entity (collectively, Entity) that owns or
licenses computerized data that includes PI.
•

S.B. 503 (signed into law April
26, 2005, Act 503)
Effective July 1, 2006
H.E.A. No. 1197 (signed into
law March 24, 2008)
H.E.A. No. 1121 (signed into
law May 12, 2009)

The provisions governing maintenance of PI are applicable to any
Entity maintaining information on IN residents, whether or not
organized or licensed under the laws of IN.

Security Breach Definition. An unauthorized acquisition of computerized
data that compromises the security, confidentiality, or integrity of PI
maintained by an Entity. The term includes the unauthorized acquisition of
computerized data that has been transferred to another medium, including
paper, microfilm, or a similar medium, even if the transferred data are no
longer in a computerized format.
•

Unauthorized acquisition of a portable electronic device on which PI
is stored does not constitute a security breach if all PI on the device is
protected by encryption and the encryption key: (i) has not been
compromised or disclosed, and (ii) is not in the possession of or
known to the person who, without authorization, acquired or has
access to the portable electronic device.

•

Good-faith acquisition of PI by an employee or agent of the Entity for
lawful purposes of the Entity does not constitute a security breach if
the PI is not used or subject to further unauthorized disclosure.

Effective July 1, 2009

Notification Obligation. Any Entity, after discovering or being notified of a
breach of the security of data, shall disclose the breach to an IN resident
whose unencrypted PI was or may have been acquired by an unauthorized
person or whose encrypted PI was or may have been acquired by an
unauthorized person with access to the encryption key if the Entity knows, or
should know, or should have known that the unauthorized acquisition
constituting the breach has resulted in or could result in identity deception (as
defined in IND. CODE § 35-43-5-3.5), identity theft, or fraud affecting the IN
resident.
Attorney General Notification. If the Entity makes such a disclosure, the
data base owner shall also disclose the breach to the attorney general.
Notification to Consumer Reporting Agencies. An Entity required to make
a disclosure to more than 1,000 consumers shall also disclose to all
consumer reporting agencies that compile and maintain files on consumers
on a nationwide basis information necessary to assist the consumer reporting
agency in preventing fraud, including PI of an IN resident affected by the
breach of the security of a system.
Third-Party Data Notification. An Entity that maintains computerized data
that includes PI but that does not own or license the PI shall notify the owner
of the PI if the Entity discovers that PI was or may have been acquired by an

- 41 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
unauthorized person.
Timing of Notification. The disclosure notification shall be made without
unreasonable delay and consistent with any measures necessary to
determine the scope of the breach and restore the integrity of the system.
Personal Information Definition. A Social Security Number that is not
encrypted or redacted, or an individual’s first and last names, or first initial and
last name, and one or more of the following data elements that are not
encrypted or redacted:
•

A driver license number or IN identification card number;

•

A credit card number; or

•

A financial account number or debit card number in combination with
a security code, password, or access code that would permit access
to the person’s account.

PI does not include information that is lawfully obtained from publicly available
information or from federal, state, or local government records lawfully made
available to the general public.
Notice Required. Notice may be provided by one of the following methods:
•

Mail;

•

Telephone;

•

Fax; or

•

Email, if the Entity has the email address of the affected IN resident.

State agencies are subject to slightly different notice requirements.
Substitute Notice Available. If an Entity demonstrates that the cost of the
disclosure exceeds $250,000, or that the affected class of subject persons to
be notified exceeds 500,000. Substitute notice shall consist of all of the
following:
•

Conspicuous posting of the notice on the Web site of the Entity, if the
Entity maintains one; and

•

Notice to major news reporting media in the geographic area where
IN residents affected by the breach of the security of a system reside.

Exception: Own Notification Policy. Any Entity that maintains its own
disclosure procedures as part of an information privacy policy or a security
policy is not required to make a separate disclosure under the statute if the
Entity’s information privacy policy or security policy is at least as stringent as
the disclosure requirements under the statute.
Exception: Compliance with Other Laws. This section does not apply to an
Entity that maintains its own data security procedures as part of an

- 42 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
information privacy, security policy, or compliance plan under:
•

The Gramm-Leach-Bliley Act;

•

The Health Insurance Portability and Accountability Act of 1996
(HIPAA);

•

The USA Patriot Act (P.L. 107-56);

•

Executive Order 13224;

•

The Driver Privacy Protection Act (18 U.S.C. § 2781 et seq.); or

•

The Fair Credit Reporting Act (15 U.S.C. § 1681 et seq.)

if the Entity’s information privacy, security policy, or compliance plan requires
the Entity to maintain reasonable procedures to protect and safeguard from
unlawful use or disclosure PI of IN residents that is collected or maintained by
the Entity and the Entity complies with the Entity’s information privacy,
security policy, or compliance plan.
Other Key Provisions:
•

AG Enforcement. A person that knowingly or intentionally fails to
comply with the database maintenance obligations commits a
deceptive act that is actionable only by the state AG. Penalties
include injunctive relief, a civil penalty of not more than $150,000 per
violation, and reasonable costs.

- 43 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Iowa
Iowa Code § 715C.1-2
2007 S.F. 2308 (signed into
law May 9, 2008)
Effective July 1, 2008

Application. Any individual, corporation, business trust, estate, trust,
partnership, limited liability company, association, joint venture, government,
governmental subdivision, agency, or instrumentality, public corporation, or
any other legal or commercial entity (collectively, Entity) that owns or licenses
computerized data that includes an IA resident’s PI that is used in the course
of the Entity’s business, vocation, occupation, or volunteer activities and that
was subject to a breach of security.
Security Breach Definition. Unauthorized acquisition of PI maintained in
computerized form by an Entity that compromises the security, confidentiality,
or integrity of the PI.
•

Good-faith acquisition of PI by an Entity or that Entity’s employee or
agent for a legitimate purpose of that Entity is not a breach of
security, provided that the PI is not used in violation of applicable law
or in a manner that harms or poses an actual threat to the security,
confidentiality, or integrity of the PI.

Notification Obligation. Any Entity to which the statute applies shall give
notice of the breach of security following discovery of such breach of security,
or receipt of notification of such breach, to any IA resident whose PI was
included in the information that was breached.
•

Notification is not required if, after an appropriate investigation or after
consultation with the relevant federal, state, or local agencies
responsible for law enforcement, the Entity determines that no
reasonable likelihood of financial harm to the IA residents whose PI
has been acquired has resulted or will result from the breach. Such a
determination must be documented in writing and the documentation
must be maintained for five years.

Third-Party Data Notification. Any Entity who maintains or otherwise
possesses PI on behalf of another Entity shall notify the owner or licensor of
the information of any breach of security immediately following discovery of
such breach if an IA resident’s PI was included in the information that was
breached.
Timing of Notification. The notification shall be made in the most
expeditious manner possible and without unreasonable delay, consistent with
any measures necessary to sufficiently determine contact information for the
affected IA residents, determine the scope of the breach, and restore the
reasonable integrity, security, and confidentiality of the data.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements
that relate to the individual if any of the data elements are not encrypted,
redacted, or otherwise altered by any method or technology in such a manner
that the name or data elements are unreadable:
•

Social Security Number;

- 44 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Driver license number or other unique identification number created
or collected by a government body;

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account;

•

Unique electronic identifier or routing code, in combination with any
required security code, access code, or password that would permit
access to an individual’s financial account; or

•

Unique biometric data, such as a fingerprint, retina or iris image, or
other unique physical representation or digital representation of
biometric data.

PI does not include information that is lawfully obtained from publicly available
sources, or from federal, state, or local government records lawfully made
available to the general public.
Notice Required. Notice shall include, at a minimum, all of the following:
•

A description of the breach of security;

•

The approximate date of the breach of security;

•

The type of PI obtained as a result of the breach of security;

•

Contact information for consumer reporting agencies; and

•

Advice to the consumer to report suspected incidents of identity theft
to local law enforcement or the attorney general.

Notification may be provided by one of the following methods:
•

Written notice to the last available address the Entity has in the
Entity’s records; or

•

Electronic notice if the Entity’s customary method of communication
with the resident is by electronic means or is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, that the affected class of IA
residents to be notified exceeds 350,000 persons, or if the Entity does not
have sufficient contact information to provide notice. Substitute notice shall
consist of the following:
•

Electronic mail notice when the Entity has an electronic mail address
for the affected IA residents;

•

Conspicuous posting of the notice or a link to the notice on the

- 45 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
Entity’s Web site, if the Entity maintains one; and
•

Notification to major statewide media.

Exception: Own Notification Policy. Any Entity that maintains its own
disclosure procedures as part of an information privacy policy or a security
policy is not required to make a separate disclosure under the statute if the
Entity’s information privacy policy or security policy is at least as stringent as
the disclosure requirements under the statute.
Exception: Compliance with Other Laws.
•

Federal Regulator. This statute does not apply to an Entity that
complies with notification requirements or breach of security
procedures that provide greater protection to PI and at least as
thorough disclosure requirements than that provided by this section
pursuant to the rules, regulations, procedures, guidance, or
guidelines established by the Entity’s primary or functional federal
regulator.

•

More Protective Law. This statute does not apply to an Entity that
complies with a state or federal law that provides greater protection to
PI and at least as thorough disclosure requirements for breach of
security or PI than that provided by the statute.

•

Gramm-Leach-Bliley Act. This statute does not apply to an Entity
that is subject to and complies with regulations promulgated pursuant
to Title V of the Gramm-Leach-Bliley Act.

Other Key Provisions:
•

Delay for Law Enforcement. The consumer notification
requirements of this section may be delayed if a law enforcem ent
agency determines that the notification will impede a criminal
investigation and the agency has made a written request that the
notification be delayed. The notification required by this section shall
be made after the law enforcement agency determines that the
notification will not compromise the investigation and notifies the
Entity required to give notice in writing.

•

AG Enforcement.

- 46 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Kansas
Kan. Stat. § 50-7a01 et seq.
S.B. 196 (signed into law April
19, 2006)
Effective January 1, 2007

Application. Any individual, partnership, corporation, trust, estate,
cooperative, association, government, or governmental subdivision or agency
or other entity (collectively, Entity) that conducts business in KS and that
owns or licenses computerized data that includes PI.
•

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on KS
residents, whether or not the Entity conducts business in KS.

Security Breach Definition. Any unauthorized access to and acquisition of
unencrypted or unredacted computerized data that compromises the security,
confidentiality, or integrity of PI maintained by an Entity and that causes, or
such Entity reasonably believes has caused or will cause, identity theft to any
consumer.
•

Good-faith acquisition of PI by an employee or agent of an Entity for
the purposes of the Entity is not a breach of the security of the
system, provided that the PI is not used for or is not subject to further
unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall, when it
becomes aware of any breach of the security of the system, give notice as
soon as possible to the affected KS resident.
•

Notification is not required if after a good-faith, reasonable and
prompt investigation the Entity determines that the PI has not been
and will not be misused.

Notification to Consumer Reporting Agencies. In the event that an Entity
must notify more than 1,000 consumers at one time, the Entity shall also
notify, without unreasonable delay, all consumer reporting agencies that
compile and maintain files on consumers on a nationwide basis of the timing,
distribution and content of the notices.
Third-Party Data Notification. An Entity that maintains computerized data
that includes PI that the Entity does not own or license shall give notice to the
owner or licensee of the information of any breach of the security of the data
following discovery of a breach, if the PI was, or is reasonably believed to
have been, accessed and acquired by an unauthorized person.
Timing of Notification. Notice must be made in the most expedient time
possible and without unreasonable delay, consistent with any measures
necessary to determine the scope of the breach and to restore the reasonable
integrity of the computerized data system.
Personal Information Definition. A consumer’s first name or first initial and
last name linked to any one or more of the following data elements that relate
to the consumer, when the data elements are neither encrypted nor redacted:
•

Social Security Number;

- 47 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Driver license number or KS identification card number; or

•

Account number or credit card number or debit card number, alone or
in combination with any required security code, access code or
password that would permit access to a consumer’s financial account.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity required to provide notice
demonstrates that the cost of providing notice will exceed $100,000, or that
the affected class of consumers to be notified exceeds 5,000, or that the
Entity does not have sufficient contact information to provide notice.
Substitute notice shall consist of all of the following:
•

Email notice, if the Entity has email addresses for the affected class
of consumers;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI, and whose procedures are otherwise consistent with the
timing requirements of the statute, is deemed to be in compliance with the
notice requirements of the statute if the Entity notifies affected consumers in
accordance with its policies in the event of a breach of security of the system.
Exception: Compliance with Other Laws.
•

Primary Regulator. Notification pursuant to laws, rules, regulations,
guidance, or guidelines established by an Entity’s primary or
functional state or federal regulator is sufficient.

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation. Notice shall be made in good faith, without
unreasonable delay and as soon as possible after the law
enforcement agency determines that notification will no longer

- 48 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
impede the investigation.
•

AG Enforcement. Allows the state AG (or insurance commissioner
in the case of an insurance company) to bring actions at law or equity
to enforce compliance and enjoin future violations.

- 49 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Louisiana
La. Rev. Stat. § 51:3071
et seq.
La. Admin. Code tit. 16, pt. III,
§ 701
S.B. 205 (signed into law July
12, 2005, Act 499)
Effective January 1, 2006

Application. Any individual, corporation, partnership, sole proprietorship,
joint stock company, joint venture, or any other legal entity that conducts
business in LA or that owns or licenses computerized data that includes PI, or
any agency that owns or licenses computerized data that includes PI
(collectively, Entity).
•

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on LA
residents, whether or not the Entity conducts business in LA.

Security Breach Definition. The compromise of the security, confidentiality,
or integrity of computerized data that results in, or there is a reasonable basis
to conclude has resulted in, the unauthorized acquisition of and access to PI
maintained by an Entity.
•

Good-faith acquisition of PI by an employee of the Entity for the
purposes of the Entity is not a breach of the security of the system,
provided that the PI is not used for, or is not subject to, unauthorized
disclosure.

Notification Obligation. Any Entity to which the statute applies shall,
following discovery of a breach of the security of the system containing such
data, notify any resident of the state whose PI was, or is reasonably believed
to have been, acquired by an unauthorized person.
•

Notification is not required if after a reasonable investigation the
Entity determines that there is not a reasonable likelihood of harm to
customers.

Attorney General Notification. When notice to LA citizens is required by the
statute, the Entity shall provide written notice detailing the breach of the
security of the system to the Consumer Protection Section of the Attorney
General’s Office. Notice shall include the names of all LA citizens affected by
the breach. Notice to the state AG shall be timely if received within 10 days of
distribution of notice to LA citizens. Each day notice is not received by the
state AG shall be deemed a separate violation.
Third-Party Data Notification. Any individual, corporation, partnership, sole
proprietorship, joint stock company, joint venture, or any other legal entity that
maintains computerized data that includes PI that the agency or person does
not own shall notify the owner or licensee of the information if the PI was, or is
reasonably believed to have been, acquired by an unauthorized person
through a breach of security of the system containing such data, following
discovery by the agency or person of a breach of the security system.
Timing of Notification. The notification required pursuant to the statute shall
be made in the most expedient time possible and without unreasonable delay,
consistent with any measures necessary to determine the scope of the
breach, prevent further disclosures, and restore the reasonable integrity of the
data system.

- 50 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when the name or the data element is not encrypted or redacted:
•

Social Security Number;

•

Driver license number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account.

Notice Required. Notice may be provided by one of the following methods:
•

Written notification; or

•

Electronic notification, if the notification provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If an Entity demonstrates that the cost of
providing notification would exceed $250,000, or that the affected class of
persons to be notified exceeds 500,000, or the Entity does not have sufficient
contact information. Substitute notice shall consist of all of the following:
•

Email notification when the Entity has an email address for the
subject persons;

•

Conspicuous posting of the notification on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. Any Entity that maintains notification
procedures as part of its information security policy for the treatment of PI
which is otherwise consistent with the timing requirements of the statute shall
be deemed to be in compliance with the notification requirements of the
statute if the Entity notifies subject persons in accordance with the policy and
procedures in the event of a breach of a security of the system.
Exception: Compliance with Other Laws.
•

Federal Interagency Guidance. A financial institution that is subject to
and in compliance with the Federal Interagency Guidance Response
Programs for Unauthorized Access to Consumer Information and
Customer Notice, issued on March 7, 2005, by the Board of
Governors of the Federal Reserve System, the Federal Deposit
Insurance Corporation, the Office of the Comptroller of the Currency,
and the Office of Thrift Supervision, and any revisions, additions, or
substitutions relating to said interagency guidance, shall be deemed
to be in compliance.

- 51 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Penalties.
•

A civil action may be instituted to recover actual damages resulting
from the failure to disclose in a timely manner to a person that there
has been a breach of the security system resulting in the disclosure of
a person’s PI.

•

Failure to provide timely notice may be punishable by a fine not to
exceed $5,000 per violation. Notice to the state AG shall be timely if
received within 10 days of distribution of notice to LA citizens. Each
day notice is not received by the state AG shall be deemed a
separate violation.

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation. Notice required by the statute must be made without
unreasonable delay and as soon as possible after the law
enforcement agency determines that notification will no longer
impede the investigation.

•

Private Right of Action. A civil action may be instituted to recover
actual damages resulting from the failure to disclose in a timely
manner to a person that there has been a breach of the security
system resulting in the disclosure of a person’s PI.

- 52 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Maine
10 Me. Rev. Stat. § 1346
et seq.
L.D. 1671 (signed into law
June 10, 2005, Chapter 379)
Effective January 31, 2006
H.P. 672 (signed into law May
19, 2009, Chapter 161)
Effective May 19, 2009

Application. Any individual, partnership, corporation, limited liability
company, trust, estate, cooperative, association or other entity, including
agencies of state government, the University of Maine System, the Maine
Community College System, Maine Maritime Academy and private colleges
and universities, or any information broker, which means a person who, for
monetary fees or dues, engages in whole or in part in the business of
collecting, assembling, evaluating, compiling, reporting, transmitting,
transferring or communicating information concerning individuals for the
primary purpose of furnishing PI to nonaffiliated third parties (collectively,
Entity) that maintains computerized data that includes PI. The provisions
governing maintenance of PI are applicable to any Entity maintaining
information on ME residents, whether or not organized or licensed under the
laws of ME.
Security Breach Definition. An unauthorized acquisition, release or use of
an individual’s computerized data that includes PI that compromises the
security, confidentiality or integrity of PI of the individual maintained by an
Entity.
•

Good-faith acquisition, release or use of PI by an employee or agent
of an Entity on behalf of the Entity is not a breach of the security of
the system if the PI is not used for or subject to further unauthorized
disclosure to another person.

Notification Obligation. If an Entity that maintains computerized data that
includes PI becomes aware of a breach of the security of the system, the
Entity shall give notice of the breach following discovery or notification of the
security breach to a resident of ME whose PI has been, or is reasonably
believed to have been, acquired by an unauthorized person.
•

Notification is not required if after conducting a good-faith, reasonable
and prompt investigation, the Entity determines that there is not a
reasonable likelihood that the PI has been or will be misused.

Attorney General/State Agency Notification. When notice of a breach of
the security of the system is required, the Entity shall notify the appropriate
state regulators within the Department of Professional and Financial
Regulation, or if the Entity is not regulated by the department, the state AG.
Notification to Consumer Reporting Agencies. If an Entity must notify
more than 1,000 persons at a single time, the Entity shall also notify, without
unreasonable delay, consumer reporting agencies that compile and maintain
files on consumers on a nationwide basis. Notification must include the date
of the breach, an estimate of the number of persons affected by the breach, if
known, and the actual or anticipated date that persons were or will be notified
of the breach.
Third-Party Data Notification. A third party that maintains, on behalf of
another Entity, computerized data that includes PI that the third party does not
own shall notify the owner of the PI of a breach of the security of the system

- 53 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
immediately following discovery if the PI was, or is reasonably believed to
have been, acquired by an unauthorized person.
Timing of Notification. The notices must be made as expediently as
possible and without unreasonable delay, consistent with measures
necessary to determine the scope of the security breach and restore the
reasonable integrity, security, and confidentiality of the data in the system.
Personal Information Definition. An individual’s first name, or first initial,
and last name in combination with any one or more of the following data
elements, when either the name or the data elements are not encrypted or
redacted:
•

Social Security Number;

•

Driver license number or ME identification card number;

•

Account number or credit card number or debit card number if
circumstances exist wherein such a number could be used without
additional identifying information, access codes or passwords;

•

Account passwords or PI numbers or other access codes; or

•

Any of the above data elements when not in connection with the
individual’s first name, or first initial, and last name, if the information
compromised would be sufficient to permit a person to fraudulently
assume or attempt to assume the identity of the person whose
information was compromised.

Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity maintaining PI demonstrates that
the cost of providing notice would exceed $5,000, that the affected class of
individuals to be notified exceeds 1,000, or that the person maintaining PI
does not have sufficient contact information to provide written or electronic
notice to those individuals. Substitute notice shall consist of all of the
following:
•

Email notice, if the Entity has email addresses for the individuals to
be notified;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Penalties. Provides for civil penalties in the amount of $500 per violation, up

- 54 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
to a maximum of $2,500 per day; equitable relief; or enjoinment from future
violations.
Other Key Provisions:
•

Delay for Law Enforcement. If, after the completion of the required
investigation, notification is required under this section, the
notification required by this section may be delayed for no longer than
seven business days after a law enforcement agency determines that
the notification will not compromise a criminal investigation.

•

AG Enforcement. Enforced by state AG and/or where applicable,
the Department of Professional and Financial Regulation Office of
Consumer Credit Regulation.

- 55 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Maryland
Md. Code Com. Law § 14-3501
et seq.
H.B. 208 (signed into law April
3, 2007)

Application. A sole proprietorship, partnership, corporation, association, or
any other business entity, whether or not organized to operate at a profit,
including a financial institution organized, chartered, licensed, or otherwise
authorized under the laws of MD, any other state, the United States, or any
other country (collectively, Entity) that owns or licenses computerized data
that includes PI of an individual residing in MD.
•

Effective January 1, 2008

The provisions governing maintenance of PI are applicable to any
Entity maintaining information on MD residents, whether or not
organized or licensed under the laws of MD.

Security Breach Definition. The unauthorized acquisition of computerized
data that compromises the security, confidentiality, or integrity of the PI
maintained by an Entity.
•

A good-faith acquisition of PI by an employee or agent of an Entity for
the purposes of the business, provided that the PI is not used or
subject to further unauthorized disclosure, does not constitute a
security breach.

Notification Obligations. An Entity to which the statute applies, when it
discovers or is notified of a breach of the security of the system, shall notify
the individual of the breach.
•

Notification is not required if after a good-faith, reasonable and
prompt investigation the Entity determines that the PI of the individual
was not and will not be misused as a result of the breach. If after the
investigation is concluded, the Entity determines that notification is
not required, the Entity shall maintain records that reflect its
determination for three years after the determination is made.

Attorney General Notification. Prior to giving the notification required under
the statute, an Entity shall provide notice of a breach of the security of a
system to the state Office of the Attorney General.
Notification to Consumer Reporting Agencies. If an Entity must notify
1,000 or more individuals, the Entity also shall notify, without unreasonable
delay, each consumer reporting agency that compiles and maintains files on
consumers on a nationwide basis of the timing, distribution, and content of the
notices.
Third-Party Data Notification. An Entity that maintains computerized data
that includes PI that the Entity does not own or license shall notify the owner
or licensee of the PI of a breach of the security of the system if it is likely that
the breach has resulted or will result in the misuse of PI of an individual
residing in MD.
•

Notification required by a third-party Entity shall be given as soon as
reasonably practicable after the Entity discovers or is notified of the
breach of the security of a system.

- 56 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

A third-party Entity shall share with the owner or licensee information
relative to the breach.

Timing of Notification. The notification required shall be given as soon as
reasonably practicable, consistent with measures necessary to determine the
scope of the breach of the security of a system, identify the individuals
affected, or restore the integrity of the system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when the name or the data elements are not encrypted, redacted, or
otherwise protected by another method that renders the information
unreadable or unusable:
•

Social Security Number;

•

Driver license number;

•

Account number or credit card number or debit card number, that in
combination with any required security code, access code, or
password, would permit access to an individual’s financial account; or

•

An Individual Taxpayer Identification Number.

PI does not include (i) publicly available information that is lawfully made
available to the general public from federal, state, or local government
records; (ii) information that an individual has consented to have publicly
disseminated or listed; or (iii) information that is disseminated or listed in
accordance with the federal Health Insurance Portability and Accountability
Act (HIPAA).
Notice Required. Notice may be provided by one of the following methods:
•

Written notice sent to the most recent address of the individual in the
records of the business;

•

Telephonic notice, to the most recent telephone number of the
individual in the records of the business; or

•

Electronic mail to the most recent email address of the individual in
the records of the business if the individual has expressly consented
to receive email notice.

Notification shall include:
•

To the extent possible, a description of the categories of information
that were, or are reasonably believed to have been, acquired by an
unauthorized person, including which of the elements of PI were, or
are reasonably believed to have been acquired;

•

Contact information for the business making the notification, including
the business’s address, telephone number, and toll-free telephone

- 57 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
number if one is maintained;
•

The toll-free telephone numbers and addresses for the major
consumer reporting agencies; and

•

The toll-free telephone numbers, addresses, and Web site addresses
for (i) the Federal Trade Commission; and (ii) the state AG, along with
a statement that the individual can obtain information from these
sources about steps the individual can take to avoid identity theft.

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $100,000, or that the affected class of
individuals to be notified exceeds 175,000, or the Entity does not have
sufficient contact information to give notice. Substitute notice shall consist of
all of the following:
•

Email notice to an individual entitled to notification, if the business has
an email address for the individual to be notified;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains a Web site; and

•

Notification to statewide media.

Exception: Compliance with Other Laws.
•

Primary Regulator. An Entity that complies with the requirements for
notification procedures under the rules, regulations, procedures, or
guidelines established by the primary or functional federal or state
regulator of the Entity shall be deemed to be in compliance with the
statute.

•

Gramm-Leach-Bliley Act. An Entity or the affiliate of an Entity that is
subject to and in compliance with the Gramm-Leach-Bliley Act, the
federal Interagency Guidelines Establishing Information Security
Standards, and the federal Interagency Guidance on Response
Programs for Unauthorized Access to Customer Information and
Customer Notice, and any revisions, additions, or substitutions, shall
be deemed to be in compliance with this subtitle.

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation or jeopardize homeland or national security. Notification
shall be given as soon as reasonably practicable after the law
enforcement agency determines that it will not impede a criminal
investigation and will not jeopardize homeland or national security.

•

AG Enforcement.

•

Private Right of Action. Consumers may bring actions under Title

- 58 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
13 of the Maryland Code, the Unfair and Deceptive Trade Practices
Act.
•

Waiver Not Permitted.

- 59 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Massachusetts
Mass. Gen. Laws 93H § 1
et seq.
201 C.M.R. 17.00
H.B. 4144 (signed into law
August 3, 2007)
Effective October 31, 2007

Application. A natural person, corporation, association, partnership or other
legal entity, or any agency, executive office, department, board, commission,
bureau, division or authority of MA, or any of its branches, or any political
subdivision thereof (collectively, Entity) that owns, licenses, maintains or
stores data that includes PI about a resident of MA.
•

The provisions governing maintenance of PI are applicable to any
Entity maintaining information on MA residents, whether or not
organized or licensed under the laws of MA.

Security Breach Definition. An unauthorized acquisition or unauthorized
use of unencrypted data or encrypted electronic data and the confidential
process or key that is capable of compromising the security, confidentiality, or
integrity of PI, maintained by an Entity that creates a substantial risk of
identity theft or fraud against a MA resident.
•

A good-faith but unauthorized acquisition of PI by an Entity, or
employee or agent thereof, for the lawful purpose of such Entity, is
not a breach of security unless the PI is used in an unauthorized
manner or subject to further unauthorized disclosure.

Notification Obligation. An Entity to which the statute applies shall provide
notice to the affected residents, as soon as practicable and without
unreasonable delay, when the Entity knows or has reason to know of a
breach of security, or when the Entity knows or has reason to know that the PI
of such resident was acquired or used by an unauthorized person or used for
an unauthorized purpose. Note: MA may take the position that any
unauthorized acquisition or use by a third party triggers the notification
obligation, regardless of materiality or ownership of the data.
Attorney General/State Agency Notification. Notice must be provided to
the state Attorney General and the director of consumer affairs and business
regulation.
•

Upon receipt of notice, the director of consumer affairs and business
regulation shall identify any relevant consumer reporting agency or
state agency and forward the names of the identified consumer
reporting agencies and state agencies to the notifying Entity. The
Entity shall, as soon as practicable and without unreasonable delay,
also provide notice to consumer reporting agencies and state
agencies identified by the director of consumer affairs and business
regulation.

Notification Obligation of an Agency Within the Executive Department.
If an agency is within the executive department, it shall provide written
notification of the nature and circumstances of the breach or unauthorized
acquisition or use of the information to the technology division and the division
of public records as soon as practicable and without unreasonable delay
following discovery of the breach of security or unauthorized acquisition or
use, and shall comply with all policies and procedures adopted by that
- 60 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
division pertaining to the reporting and investigation of such an incident.
Third-Party Data Notification. An Entity that maintains or stores, but does
not own or license data that includes PI about a resident of MA, shall provide
notice, as soon as practicable and without unreasonable delay, when such
Entity (i) knows or has reason to know of a breach of security or (ii) when the
Entity knows or has reason to know that the PI of such resident was acquired
or used by an unauthorized person or used for an unauthorized purpose, to
the owner or licensor.
Such Entity shall cooperate with the owner or licensor of such PI. Cooperation
shall include, but not be limited to: (i) informing the owner or licensor of the
breach of security or unauthorized acquisition or use, (ii) the date or
approximate date of such incident and the nature thereof, and (iii) any steps
the Entity has taken or plans to take relating to the incident, except that such
cooperation shall not be deemed to require the disclosure of confidential
business information or trade secrets, or to provide notice to a resident that
may not have been affected by the breach of security or unauthorized
acquisition or use.
Timing of Notification. The notification shall be given as soon as practicable
and without unreasonable delay following discovery of the breach.
Personal Information Definition. A resident’s first name and last name or
first initial and last name in combination with any one or more of the following
data elements that relates to such resident:
•

Social Security Number;

•

Driver license or MA identification card number; or

•

Financial account number, or credit card number, with or without any
required security code, access code, personal ID number or
password, that would permit access to a resident’s financial account.

PI does not include information that is lawfully obtained from publicly available
information, or from federal, state, or local government records lawfully made
available to the general public.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if notice provided is consistent with the provisions
regarding electronic records and signatures set forth in 15 U.S.C.
§ 7001 (E-SIGN Act).

The notice to be provided to the AG, director of consumer affairs, and
consumer reporting agencies or state agencies, if any, shall include, but not
be limited to: (i) the nature of the breach of security or unauthorized
acquisition or use, (ii) the number of residents of MA affected by such incident
at the time of notification, and (iii) any steps the Entity has taken or plans to

- 61 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
take relating to the incident.
Notice to be provided to the resident shall include, but not be limited to: (i) the
consumer’s rights to obtain a police report, (ii) how to request a security
freeze and the necessary information to be provided when requesting the
security freeze, and (iii) any fees required to be paid to any of the consumer
reporting agencies. The notification shall not include the nature of the breach
or unauthorized acquisition or use of the number of residents of MA affected
by said breach or unauthorized access or use.
Substitute Notice Available. If the Entity required to provide notice
demonstrates that the cost of providing written notice will exceed $250,000, or
that the affected class of MA residents to be notified exceeds 500,000
residents, or the Entity does not have sufficient contact information to provide
notice. Substitute notice shall consist of all of the following:
•

Email notice, if the Entity has email addresses for the members of the
affected class of MA residents;

•

Clear and conspicuous posting of the notice on the home page of the
Entity’s Web site if the Entity maintains one; and

•

Publication in or broadcast through media or medium that provides
notice throughout MA.

Exception: Compliance with Other Laws.
•

Primary Regulator. Notification pursuant to laws, rules, regulations,
guidance, or guidelines established by an Entity’s primary or
functional state or federal regulator is sufficient for compliance.

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation and has notified the AG, in writing, thereof and informs
the Entity of such determination. Notice required by the statute must
be made without unreasonable delay and as soon as possible after
the law enforcement agency determines that notification will no longer
impede the investigation. The Entity shall cooperate with law
enforcement in its investigation of any breach of security or
unauthorized acquisition or use, which shall include the sharing of
information relevant to the incident; provided, however, that such
disclosure shall not require the disclosure of confidential business
information or trade secrets.

•

AG Enforcement. Penalties include civil penalties, damages, and
injunctive relief.

- 62 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Michigan
Mich. Comp. Laws § 445.63,
72 et seq.

Application. Any individual, partnership, corporation, limited liability
company, association, or other legal entity, or any department, board,
commission, office, agency, authority, or other unit of state government of MI
(collectively, Entity) that owns or licenses data including PI of a MI resident.
•

S.B. 309 (signed into law
December 30, 2006, Pub. Act.
566)
Effective July 2, 2007
S.B. No. 223 (signed into law
December 21, 2010)

The provisions governing maintenance of PI are applicable to any
Entity maintaining information on MI residents, whether or not
organized or licensed under the laws of MI.

Security Breach Definition. The unauthorized access and acquisition of
data that compromises the security or confidentiality of PI maintained by an
Entity as part of a database of PI regarding multiple individuals.
•

Effective April 1, 2011.

A good-faith but unauthorized acquisition of PI by an employee or
other individual, where the access was related to the activities of the
Entity, is not a breach of security unless the PI is misused or
disclosed to an unauthorized person. In making this determination an
Entity shall act with the care an ordinarily prudent Entity in a like
position would exercise under similar circumstances.

Notification Obligation. An Entity to which the statute applies shall provide
notice of the breach to each resident of MI if (i) the resident’s unencrypted
and unredacted PI was accessed and acquired by an unauthorized person or
(ii) the resident’s PI was accessed and acquired in encrypted form by a
person with unauthorized access to the encryption key.
•

Notification is not required if the Entity determines that the security
breach has not or is not likely to cause substantial loss or injury to, or
result in identity theft with respect to, one or more residents of MI.

Notification to Consumer Reporting Agencies. If an Entity notifies 1,000 or
more Michigan residents, the Entity shall, after notifying those residents, notify
each consumer reporting agency that compiles and maintains files on
consumers on a nationwide basis of the security breach without unreasonable
delay. A notification under this subsection shall include the number and
timing of notices that the person or agency provided to residents of this state.
This subsection does not apply if the person or agency is subject to Title V of
the Gramm-Leach-Bliley Act.
Third-Party Data Notification. An Entity that maintains a database that
includes data that the Entity does not own or license that discovers a breach
of the security of the database shall provide a notice to the owner or licensor
of the information of the security breach, unless the Entity determines that the
security breach has not or is not likely to cause substantial loss or injury to, or
result in identity theft with respect to one or more residents of MI.
Timing of Notification. The notification shall be given without unreasonable
delay following discovery of the breach, consistent with measures necessary
to determine the scope of the breach of the security of a system or restore the
integrity of the system.

- 63 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Personal Information Definition. The first name or first initial and last name
linked to one or more of the following data elements of a resident of MI:
•

Social Security Number;

•

Driver license number or MI identification card number; or

•

Demand deposit or other financial account number, or credit card or
debit card number, in combination with any required security code,
access code, or password that would permit access to any of the
resident’s financial accounts.

Notice Required. Notice may be provided by one of the following methods:
•

Written notice sent to the recipient at the recipient’s postal address in
the records of the Entity;

•

Telephonic notice given by an individual who represents the Entity if
(i) the notice is not given in whole or in part by use of a recorded
message, (ii) the recipient has expressly consented to receive notice
by telephone, or if the recipient has not expressly consented to
receive notice by telephone, the Entity also provides notice pursuant
to the above methods if the notice by telephone does not result in a
live conversation between the individual representing the Entity and
the recipient within three business days after the initial attempt to
provide telephonic notice; or

•

Written notice sent electronically to the recipient if (i) the recipient has
expressly consented to receive electronic notice, (ii) the Entity has an
existing business relationship with the recipient that includes periodic
email communications and based on those communications the Entity
reasonably believes that it has the recipient’s current email address,
or (iii) the Entity conducts its business primarily through Internet
account transactions or on the Internet.

A notice under the statute shall:
•

Be written in a clear and conspicuous manner, and shall clearly
communicate the content required;

•

Describe the security breach in general terms;

•

Describe the type of PI that is the subject of the unauthorized access
or use;

•

If applicable, generally describe what the agency or person providing
the notice has done to protect data from further security breaches;

•

Include a telephone number where a notice recipient may obtain
assistance or additional information; and

•

Remind notice recipients of the need to remain vigilant for incidents of

- 64 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
fraud and identity theft.
Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000 or that the Entity has to provide
notice to more than 500,000 residents of MI. Substitute notice shall consist of
all of the following:
•

Email notice if the Entity has email addresses for any of the residents
of MI who are entitled to receive notice;

•

Conspicuous posting on the Entity’s Web site if the Entity maintains
one; and

•

Notification to major statewide media, which notice shall include a
telephone number or Web site address that a person may use to
obtain additional assistance and information.

A public utility that sends monthly billing or account statements to its
customers may provide notice of a security breach to its customers as
provided under the statute or by providing all of the following:
•

As applicable, email notice in accordance with the statute;

•

Notice to the media reasonably calculated to inform the utility’s
customers of the breach;

•

Conspicuous posting of notice of the security breach on the Web site
of the utility; and

•

Written notice sent in conjunction with the billing or account statement
sent to the customer at his or her postal address in the utility’s
records.

Exception: Compliance with Other Laws.
•

Federal Interagency Guidance. A financial institution that is subject
to and in compliance with the Federal Interagency Guidance
Response Programs for Unauthorized Access to Consumer
Information and Customer Notice, issued on March 7, 2005, by the
Board of Governors of the Federal Reserve System, the Federal
Deposit Insurance Corporation, the Office of the Comptroller of the
Currency, and the Office of Thrift Supervision, and any revisions,
additions, or substitutions relating to said interagency guidance, shall
be deemed to be in compliance.

•

HIPAA-Covered Entities. A provider of health care, health care
service plan, health insurer, or a covered entity governed by the
medical privacy and security rules issued by the federal Department
of Health and Human Services pursuant to the Health Insurance
Portability and Accountability Act of 1996 (HIPAA) shall be deemed in
compliance with this chapter.

- 65 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Penalties. Provides for criminal penalties for notice of a security breach that
has not occurred, where such notice is given with the intent to defraud. The
offense is a misdemeanor, punishable by imprisonment for not more than 30
days or a fine of not more than $250 per violation (or both). (The penalty is
the same for second and third violations, except that the fine increases to
$500 per violation and $750 per violation, respectively.) Similarly, Entities
who distribute an advertisement or make any other solicitation that
misrepresents to the recipient that a security breach has occurred that may
affect the recipient are punishable by imprisonment for not more than 93 days
or a fine of not more than $1,000 per violation (or both). (The penalty is the
same for second and third violations, except that the fine increases to $2,000
per violation and $3,000 per violation, respectively.)
Entities who fail to provide notice may be ordered to pay a civil fine of not
more than $250 for each failure to provide notice, capped at $750,000 per
security breach. These penalties do not affect the availability of civil remedies
under state or federal law.
Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation or jeopardize homeland or national security. Notification
shall be given as soon as reasonably practicable after the law
enforcement agency determines that it will not impede a criminal
investigation and will not jeopardize homeland or national security.

•

AG Enforcement.

•

Provides that Entities may deliver notice pursuant to an agreement
with another Entity, if the agreement does not conflict with the
Michigan law.

- 66 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Minnesota
Minn. Stat. § 325E.61
H.F. 2121 (signed into law
June 2, 2005, Chapter 167)
Effective January 1, 2006

Application. Any person or business that conducts business in MN, and that
owns or licenses data that includes PI.
•

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on MN
residents, whether or not the Entity conducts business in MN.

Security Breach Definition. An unauthorized acquisition of computerized
data that compromises the security, confidentiality, or integrity of PI
maintained by the Entity.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
the purposes of the Entity is not a breach of the security of the
system, provided that the PI is not used or subject to further
unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security of the system following discovery or
notification of the breach in the security of the data to any resident of MN
whose unencrypted PI was, or is reasonably believed to have been, acquired
by an unauthorized person.
Notification to Consumer Reporting Agencies. If an Entity notifies more
than 500 persons at one time, the Entity shall also notify, within 48 hours, all
consumer reporting agencies that compile and maintain files on consumers
on a nationwide basis of the timing, distribution, and content of the notices.
Third-Party Data Notification. Any Entity that maintains data that includes
PI that the Entity does not own shall notify the owner or licensee of the
information of any breach of the security of the data immediately following
discovery, if the PI was, or is reasonably believed to have been, acquired by
an unauthorized person.
Timing of Notification. The disclosure must be made in the most expedient
time possible and without unreasonable delay, consistent with any measures
necessary to determine the scope of the breach, identify the individuals
affected, and restore the reasonable integrity of the data system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when the data element is not secured by encryption or another method of
technology that makes electronic data unreadable or unusable, or was
secured and the encryption key, password, or other means necessary for
reading or using the data was also acquired:
•

Social Security Number;

•

Driver license number or MN identification card number; or

•

Account number or credit card number or debit card number, in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
- 67 -

This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
account.
PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice to the most recent available address the Entity has in
its records; or

•

Electronic notice, if the Entity’s primary method of communication with
the individual is by electronic means, or if the notice provided is
consistent with the provisions regarding electronic records and
signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000 or that the Entity has to provide
notice to more than 500,000 residents, or the Entity does not have sufficient
contact information. Substitute notice shall consist of all of the following:
•

Email notice if Entity has Email address for subject persons;

•

Conspicuous posting of the notice on the Entity’s Website if the Entity
maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and whose procedures are otherwise consistent with the
timing requirements of the statute, shall be deemed to be in compliance with
the notification requirements of the statute, if the Entity notifies subject
persons in accordance with its policies in the event of a breach of security of
the system.
Exception: Compliance with Other Laws.
•

HIPAA-Covered Entities. A provider of health care, health care
service plan, health insurer, or a covered entity governed by the
medical privacy and security rules issued by the federal Department
of Health and Human Services pursuant to the Health Insurance
Portability and Accountability Act of 1996 (HIPAA) shall be deemed in
compliance with this chapter.

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed to a date
certain if a law enforcement agency determines that the notice will
impede a criminal investigation.

•

AG Enforcement.

- 68 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Private Right of Action.

•

Waiver Not Permitted.

•

Does not apply to any “financial institution,” as defined by 15 U.S.C.
§ 6809(3).

- 69 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Mississippi
Miss. Code § 75-24-29
H.B. 582 (signed into law
April 7, 2010)
Effective July 1, 2011

Application. Any person who conducts business in MS and who, in the
ordinary course of the person’s business functions, owns, licenses, or
maintains the PI of any MS resident.
Security Breach Definition. An unauthorized acquisition of electronic files,
media, databases or computerized data containing personal information of
any MS resident when access to the PI has not been secured by encryption
or by any other method of technology that renders the PI unreadable or
unusable.
Notification Obligation. A person who conducts business in MS shall
disclose any breach of security to all affected individuals. Notification is not
required if, after an appropriate investigation, the person reasonably
determines that the breach will not likely result in harm to the affected
individuals.
Third-Party Data Notification. A person who maintains computerized data
which includes PI that the person does not own or license shall notify the
owner or licensee of the information of any breach of security as soon as
practical following its discovery, if the personal information was, or is
reasonably believed to have been, acquired by an unauthorized person for
fraudulent purposes.
Timing of Notification. Notice shall be provided without unreasonable delay
subject to the completion of an investigation by the person to determine the
nature and scope of the incident, to identify the affected individuals, or to
restore the reasonable integrity of the system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when the data element is not secured by encryption or another method of
technology that makes electronic data unreadable or unusable:
•

Social Security Number;

•

Driver license number or MS identification card number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice,

•

Telephonic notice, or

- 70 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Electronic notice, if the Entity’s primary method of communication with
the individual is by electronic means, or if the notice provided is
consistent with the provisions regarding electronic records and
signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $5,000 or that the Entity has to provide notice
to more than 5,000 residents. Substitute notice shall consist of all of the
following:
•

Email notice if the Entity has Email addresses for subject persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and whose procedures are otherwise consistent with the
timing requirements of the statute, shall be deemed to be in compliance with
the notification requirements of the statute, if the Entity notifies subject
persons in accordance with its policies in the event of a breach of security of
the system.
Exception: Compliance with Federal Regulations.
•

Any person that maintains a security breach procedure pursuant to
the rules, regulations, or guidelines established by the primary federal
functional regulator shall be deemed to be in compliance with this
section, provided the person notifies affected individuals in
accordance with the policies or the rules, regulations, procedures, or
guidelines.

Other Key Provisions:
•

Delay for Law Enforcement. Any notification shall be delayed for a
reasonable period of time if a law enforcement agency determines
that the notification will impede a criminal investigation or national
security and the law enforcement agency has made a request that the
notification be delayed. Any such delayed notification shall be made
after the law enforcement agency determines that notification will not
compromise the criminal investigation or national security and so
notifies the person of that determination.

•

AG Enforcement. Failure to comply with the requirements of the act
shall constitute an unfair trade practice and shall be enforced by the
Attorney General.

- 71 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Missouri
Mo. Rev. Stat. § 407.1500
H.B. 62
Effective August 28, 2009

Application. Any individual, corporation, business trust, estate, trust,
partnership, limited liability company, association, joint venture, government,
governmental subdivision, governmental agency, governmental
instrumentality, public corporation, or any other legal or commercial entity
(collectively, Entity) that owns or licenses PI of residents of MO or any person
that conducts business in MO that owns or licenses PI of a resident of MO.
Security Breach Definition. Unauthorized access to and unauthorized
acquisition of PI maintained in computerized form by an Entity that
compromises the security, confidentiality, or integrity of the PI.
•

Good-faith acquisition of PI by an Entity or that Entity’s employee or
agent for a legitimate purpose of that Entity is not a breach of
security, provided that the PI is not used in violation of applicable law
or in a manner that harms or poses an actual threat to the security,
confidentiality, or integrity of the PI.

Notification Obligation. Any Entity to which the statute applies shall provide
notice to the affected consumer that there has been a breach of security
following discovery or notification of the breach.
•

Notification is not required if, after an appropriate investigation by the
Entity or after consultation with the relevant federal, state, or local
agencies responsible for law enforcement, the Entity determines that
a risk of identity theft or other fraud to any consumer is not
reasonably likely to occur as a result of the breach. Such a
determination shall be documented in writing and the documentation
shall be maintained for five years.

Notification of Consumer Reporting Agencies. In the event an Entity
notifies more than 1,000 consumers at one time pursuant to this section, the
Entity shall notify, without unreasonable delay, all consumer reporting
agencies that compile and maintain files on consumers on a nationwide basis
of the timing, distribution, and content of the notice.
Attorney General Notification. In the event an Entity provides notice to
more than 1,000 consumers at one time pursuant to this section, the Entity
shall notify, without unreasonable delay, the state AG’s office of the timing,
distribution, and content of the notice.
Third-Party Data Notification. Any Entity that maintains or possesses
records or data containing PI of residents of MO that the Entity does not own
or license, or any Entity that conducts business in MO that maintains or
possesses records or data containing PI of a resident of MO that the person
does not own or license, shall notify the owner or licensee of the information
of any breach of security immediately following discovery of the breach,
consistent with the legitimate needs of law enforcement as provided in this
section.
Timing of Notification. The disclosure notification shall be made without

- 72 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
unreasonable delay and consistent with any measures necessary to
determine sufficient contact information and to determine the scope of the
breach and restore the reasonable integrity, security, and confidentiality of the
data system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements
that relate to the individual if any of the data elements are not encrypted,
redacted, or otherwise altered by any method or technology in such a manner
that the name or data elements are unreadable or unusable:
•

Social Security Number;

•

Driver license number or other unique identification number created
or collected by a government body;

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account;

•

Unique electronic identifier or routing code, in combination with any
required security code, access code, or password that would permit
access to an individual’s financial account;

•

Medical information (information regarding an individual’s medical
history, mental or physical condition, or medical treatment or
diagnosis by a health care professional); or

•

Health insurance information (an individual’s health insurance policy
number, subscriber identification number, or any unique identifier
used by a health insurer to identify the individual).

PI does not include information that is lawfully obtained from publicly available
sources, or from federal, state, or local government records lawfully made
available to the general public.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice;

•

Telephonic notice, if such contact is made directly with the affected
consumers; or

•

Electronic notice for those consumers for whom the person has a
valid e-mail address and who have agreed to receive communications
electronically, if the notice provided is consistent with the provisions
regarding electronic records and signatures set forth in 15 U.S.C.
§ 7001 (E-SIGN Act).

The notice shall at minimum include a description of the following:
•

The incident in general terms;

- 73 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

The type of PI that was obtained as a result of the breach of security;

•

A telephone number that the affected consumer may call for further
information and assistance, if one exists;

•

Contact information for consumer reporting agencies; and

•

Advice that directs the affected consumer to remain vigilant by
reviewing account statements and monitoring free credit reports.

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $100,000, or that the class of affected
consumers to be notified exceeds 150,000, or that the Entity does not have
sufficient contact information, for only those affected consumers without
sufficient contact information or consent, or that the Entity is unable to identify
particular affected consumers, for only those unidentifiable consumers.
Substitute notice shall consist of all the following:
•

E-mail notice when the Entity has an electronic mail address for the
affected consumer;

•

Conspicuous posting of the notice or a link to the notice on the
Entity’s Web site if the Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own notice
procedures as part of an information security policy for the treatment of PI,
and whose procedures are otherwise consistent with the timing requirements
of this section, is deemed to be in compliance with the notice requirements of
this section if the Entity notifies affected consumers in accordance with its
policies in the event of a breach of security of the system.
Exception: Compliance with Other Laws.
•

An Entity that is regulated by state or federal law and that maintains
procedures for a breach of the security of the system pursuant to the
laws, rules, regulations, guidance, or guidelines established by its
primary or functional state or federal regulator is deemed to be in
compliance with this section if the Entity notifies affected consumers
in accordance with the maintained procedures when a breach occurs.

•

A financial institution that is: (i) subject to and in compliance with the
Federal Interagency Guidance Response Programs for Unauthorized
Access to Customer Information and Customer Notice, issued on
March 29, 2005, by the board of governors of the Federal Reserve
System, the Federal Deposit Insurance Corporation, the Office of the
Comptroller of the Currency, and the Office of Thrift Supervision, and
any revisions, additions, or substitutions relating to said interagency
guidance; or (ii) subject to and in compliance with the National Credit
Union Administration regulations in 12 C.F.R. Part 748; or (iii) subject

- 74 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
to and in compliance with the provisions of Title V of the GrammLeach-Bliley Act shall be deemed to be in compliance with this
section.
Penalties/Enforcement. The state AG shall have exclusive authority to bring
an action to obtain actual damages for a willful and knowing violation of this
section and may seek a civil penalty not to exceed $150,000 per breach of the
security of the system or series of breaches of a similar nature that are
discovered in a single investigation.
Other Key Provisions:
•

Delay for Law Enforcement. The notice required by this section
may be delayed if a law enforcement agency informs the Entity that
notification may impede a criminal investigation or jeopardize national
or homeland security, provided that such request by law enforcement
is made in writing or the Entity documents such request
contemporaneously in writing, including the name of the law
enforcement officer making the request and the officer’s law
enforcement agency engaged in the investigation. The notice
required by this section shall be provided without unreasonable delay
after the law enforcement agency communicates to the Entity its
determination that notice will no longer impede the investigation or
jeopardize national or homeland security.

- 75 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Montana
Mont. Code § 30-14-1701
et seq.
H.B. 732 (signed into law April
28, 2005, Chapter 518)
Effective March 1, 2006

Application. Any person or business (collectively, Entity) that conducts
business in MT and that owns or licenses computerized data that includes PI.
•

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on MT
residents, whether or not the Entity conducts business in MT.

Security Breach Definition. Any unauthorized acquisition of computerized
data that materially compromises the security, confidentiality, or integrity of PI
maintained by the Entity and causes or is reasonably believed to cause loss
or injury to a MT resident.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
the purpose of the Entity is not a breach of the security of the data
system, provided that the PI is not used or subject to further
unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security of the data system following discovery or
notification of the breach to any resident of MT whose unencrypted PI was or
is reasonably believed to have been acquired by an unauthorized person.
Notification of Consumer Reporting Agencies. If a business notifies an
individual of a breach and suggests, indicates or implies that the individual
may obtain a credit report, the business must coordinate with the credit
reporting agency as to the timing, content and distribution of notice to the
individual (but this may not unreasonably delay disclosure of the breach).
Third-Party Data Notification. Any Entity that maintains computerized data
that includes PI that the Entity does not own shall notify the owner or licensee
of the information of any breach of the security of the data system
immediately following discovery if the PI was or is reasonably believed to
have been acquired by an unauthorized person.
Timing of Notification. Disclosure is to be made without unreasonable
delay, consistent with any measures necessary to determine the scope of the
breach and restore the reasonable integrity of the data system.
Personal Information Definition. An individual’s name, signature, address,
or telephone number, in combination with one or more additional pieces of
information about the individual, consisting of the individual’s passport
number, driver license number, state identification number, or tribal
identification card number, insurance policy number, bank account number,
credit card number, debit card number, passwords or personal identification
numbers required to obtain access to the individual’s finances, or any other
financial information as provided by rule. A Social Security Number, in and of
itself, constitutes personal information.
PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government

- 76 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice;

•

Telephonic notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, or that the affected class of subject
persons to be notified exceeds 500,000, or the Entity does not have sufficient
contact information. Substitute notice shall consist of email notice when the
Entity has an email address for the subject persons and one of the following:
•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to applicable local or statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and that does not unreasonably delay notice is considered to
be in compliance with the notification requirements of the statute if the Entity
notifies subject persons in accordance with its policies in the event of a
breach of security of the data system.
Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that it will impede a criminal
investigation and requests a delay in notification. The notification
must be made after law enforcement agency determines that it will
not compromise the investigation.

- 77 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Nebraska
Neb. Rev. Stat. § 87-801
et seq.
L.B. 876 (signed into law April
10, 2006)

Application. An individual, government agency, corporation, business trust,
estate, trust, partnership, limited partnership, limited liability partnership,
limited liability company, association, organization, joint venture, government,
governmental subdivision, agency, or instrumentality, or any other legal entity,
whether for profit or not for profit (collectively, Entity), that conducts business
in NE and that owns or licenses computerized data that includes PI about a
resident of NE.
•

Effective July 14, 2006

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining information on NE
residents, whether or not the Entity conducts business in NE.

Security Breach Definition. An unauthorized acquisition of unencrypted
computerized data that compromises the security, confidentiality, or integrity
of PI maintained by an Entity.
•

Good-faith acquisition of PI by an employee or agent of an Entity for
the purposes of the Entity is not a breach of the security of the system
if the PI is not used or subject to further unauthorized disclosure.

•

Acquisition of PI pursuant to a search warrant, subpoena, or other
court order or pursuant to a subpoena or order of a state agency is
not a breach of the security of the system.

Notification Obligation. Any Entity to which the statute applies shall, when it
becomes aware of a breach of the security of the system and determines that
the use of information about a NE resident for an unauthorized purpose has
occurred or is reasonably likely to occur, give notice to the affected NE
resident.
•

Notification is not required if after a good-faith, reasonable and
prompt investigation the Entity determines that it is unlikely that PI
has been or will be used for an unauthorized purpose.

Third-Party Data Notification. An Entity that maintains computerized data
that includes PI that the Entity does not own or license shall give notice to and
cooperate with the owner or licensee of the information of any breach of the
security of the system when it becomes aware of a breach if use of PI about a
NE resident for an unauthorized purpose occurred or is reasonably likely to
occur. Cooperation includes, but is not limited to, sharing with the owner or
licensee information relevant to the breach, not including information
proprietary to the Entity.
Timing of Notification. Notice shall be made as soon as possible and
without unreasonable delay, consistent with any measures necessary to
determine the scope of the breach and to restore the reasonable integrity of
the computerized data system.
Personal Information Definition. A NE resident’s first name or first initial
and last name in combination with any one or more of the following data
elements that relate to the resident if either the name or the data elements are
- 78 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
not encrypted, redacted, or otherwise altered by any method or technology in
such a manner that the name or data elements are unreadable:
•

Social Security Number;

•

Driver license number or state identification card number;

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to a resident’s financial account;

•

Unique electronic ID number or routing code, in combination with any
required security code, access code, or password; or

•

Unique biometric data, such as a fingerprint, voice print, or retina or
iris image, or other unique physical representation.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice;

•

Telephonic notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice will exceed $75,000, that the affected class of NE residents
to be notified exceeds 100,000 residents, or that the Entity does not have
sufficient contact information to provide notice. Substitute notice requires all
of the following:
•

Email notice if the Entity has email addresses for the members of the
affected class of NE residents;

•

Conspicuous posting of the notice on the Entity’s Web site if it
maintains one; and

•

Notice to major statewide media.

Substitute Notice Exception. If the Entity has 10 employees or fewer and
demonstrates that the cost of providing notice will exceed $10,000. Substitute
notice requires all of the following:
•

Email notice if the Entity has email addresses for the members of the
affected class of NE residents;

•

Notification by a paid advertisement in a local newspaper that is
distributed in the geographic area in which the Entity is located, which

- 79 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
advertisement shall be of sufficient size that it covers at least onequarter of a page in the newspaper and shall be published in the
newspaper at least once a week for three consecutive weeks;
•

Conspicuous posting of the notice on the Entity’s Web site if it
maintains one; and

•

Notification to major media outlets in the geographic area in which the
Entity is located.

Exception: Own Notification Policy. An Entity that maintains its own notice
procedures which are part of an information security policy for the treatment
of PI and which are otherwise consistent with the timing requirements of the
statute, is deemed to be in compliance with the notice requirements of the
statute if the Entity notifies affected NE residents in accordance with its notice
procedures in the event of a breach of the security of the system.
Exception: Compliance with Other Laws.
•

Primary Regulator. An Entity that is regulated by state or federal law
and that maintains procedures for a breach of the security of the
system pursuant to the laws, rules, regulations, guidance, or
guidelines established by its primary or functional state or federal
regulator is deemed to be in compliance with the notice requirements
of the statute if the Entity notifies affected NE residents in accordance
with the maintained procedures in the event of a breach of the
security of the system.

Other Key Provisions:
•

Delay for Law Enforcement. Notice may be delayed if a law
enforcement agency determines that the notice will impede a criminal
investigation. Notice shall be made in good-faith, without
unreasonable delay, and as soon as possible after the law
enforcement agency determines that notification will no longer
impede the investigation.

•

AG Enforcement. AG may issue subpoenas and seek and recover
direct economic damages for each affected NE resident injured by a
violation of the statute.

•

Waiver Not Permitted.

- 80 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Nevada
Nev. Rev. Stat. § 603A.010
et seq.

Application. Any governmental agency, institution of higher education,
corporation, financial institution or retail operator, or any other type of
business entity or association (collectively, Entity), that owns or licenses
computerized data that includes PI.

S.B. 347 (signed into law June
17, 2005, Chapter 485)

Security Breach Definition. An unauthorized acquisition of computerized
data that materially compromises the security, confidentiality, or integrity of PI
maintained by Entity.

Effective October 1, 2005:
Provisions regarding (i) forgery
laboratories, (ii) crimes against
older and vulnerable persons,
(iii) requirements for state
actors, and (iv) credit card
issuer requirements
Effective January 1, 2006:
(i) credit card issuer
requirements, (ii) data
destruction requirements,
(iii) ”reasonable protections”
requirements, (iv) security
breach notification provisions
Effective January 1, 2008:
Encryption provisions
S.B. No. 186 (signed into law
June 15, 2011)
Effective October 1, 2011

•

Good-faith acquisition of PI by an employee or agent of the Entity for
the legitimate purposes of the Entity is not a breach of the security of
the system if the PI is not otherwise used or subject to further
unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security of the system data following discovery or
notification of the breach to any resident of NV whose unencrypted PI was, or
is reasonably believed to have been, acquired by an unauthorized person.
Notification to Consumer Reporting Agencies. If an Entity determines that
notification is required to be given to more than 1,000 persons at any one
time, the Entity shall also notify, without unreasonable delay, all consumer
reporting agencies that compile and maintain files on consumers on a
nationwide basis of the time the notification is distributed and the content of
the notification.
Third-Party Data Notification. If an Entity maintains computerized data that
includes PI that the Entity does not own, the Entity must notify the owner or
licensee of the information of any breach of the security of the system data
immediately following discovery if the PI was, or is reasonably believed to
have been, acquired by an unauthorized person.
Timing of Notification. The disclosure shall be made in the most expedient
time possible and without unreasonable delay, consistent with any measures
necessary to determine the scope of the breach and restore the reasonable
integrity of the system data.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when the name and data elements are not encrypted:
•

Social Security Number;

•

Driver license number or NV identification card number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account.

PI does not include the last four digits of a Social Security Number or publicly

- 81 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
available information that is lawfully made available to the general public.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, the affected class of subject
persons to be notified exceeds 500,000, or the Entity does not have sufficient
contact information. Substitute notice shall consist of all of the following:
•

Email notice when the Entity has an email addresses for the subject
persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification policies and procedures as part of an information security policy
for the treatment of PI that is otherwise consistent with the timing
requirements of the statute shall be deemed in compliance with the
notification requirements of the statute if it notifies subject persons in
accordance with its policies and procedures in the event of a security breach.
Exception: Compliance with Other Laws.
•

Gramm-Leach-Bliley Act. An Entity that is subject to and complies
with the privacy and security provisions of the Gramm-Leach-Bliley
Act shall be deemed to be in compliance with the notification
requirements.

Other Key Provisions:
•

Delay for Law Enforcement. The notification required by the statute
may be delayed if a law enforcement agency determines that the
notification will impede a criminal investigation. The notification must
be made after the law enforcement agency determines that the
notification will not compromise the investigation.

•

AG Enforcement. If the state AG or a district attorney of any county
has reason to believe that any person is violating, proposes to violate
or has violated the provisions of the statute, he may bring an action
against that person to obtain a temporary or permanent injunction
against the violation.

•

Right of Action for Data Collector. A data collector that provides

- 82 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
the requisite notice may commence an action for damages against a
person that unlawfully obtained or benefited from personal
information obtained from records maintained by the data collector.
•

Special Notification Obligations for Government Agencies and
Elected Officers. See Nev. Rev. Stat. § 242.181.

•

Special Rules Applicable to Electronic Health Records. See Nev.
Rev. Stat. §§ 439, 603A.100.

•

Waiver Not Permitted.

- 83 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

New Hampshire
N.H. Rev. Stat. § 359-C:19
et seq.
H.B. 1660 (signed into law
June 2, 2006)

Application. Any individual, corporation, trust, partnership, incorporated or
unincorporated association, limited liability company, or other form of entity, or
any agency, authority, board, court, department, division, commission,
institution, bureau, or other state governmental entity, or any political
subdivision of the state (collectively, Entity) doing business in NH that owns or
licenses computerized data that includes PI.
•

Effective January 1, 2007

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining PI, whether or not
the Entity does business in NH.

Security Breach Definition. An unauthorized acquisition of computerized
data that compromises the security or confidentiality of PI maintained by an
Entity doing business in NH.
•

Good-faith acquisition of PI by an employee or agent of an Entity for
the purposes of the Entity’s business shall not be considered a
security breach, provided that the PI is not used or subject to further
unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies, when it
becomes aware of a security breach and determines that misuse of the
information has occurred or is reasonably likely to occur, or if a determination
cannot be made, shall notify the affected individuals.
•

Notification is not required if it is determined that misuse of the
information has not occurred and is not reasonably likely to occur.

Notification to Consumer Reporting Agencies. If an Entity is required to
notify more than 1,000 consumers, the Entity shall also notify, without
unreasonable delay, all consumer reporting agencies that compile and
maintain files on consumers on a nationwide basis of the anticipated date of
the notification, the approximate number of consumers who will be notified,
and the content of the notice. This obligation does not apply to entities subject
to Title V of the Gramm-Leach-Bliley Act.
Attorney General/Regulator Notification. An Entity engaged in trade or
commerce that is subject to N.H. Rev. Stat. § 358-A:3(I) (trade or commerce
that is subject to the jurisdiction of the bank commissioner, the director of
securities regulation, the insurance commissioner, the public utilities
commission, the financial institutions and insurance regulators of other states,
or federal banking or securities regulators who possess the authority to
regulate unfair or deceptive trade practices) shall also notify the regulator
which has primary regulatory authority over such trade or commerce. All
other Entities shall notify the state AG. The notice shall include the anticipated
date of the notice to the individuals and the approximate number of individuals
in NH who will be notified.
Third-Party Data Notification. If an Entity maintains computerized data that
includes PI that the Entity does not own, the Entity shall notify and cooperate

- 84 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
with the owner or licensee of the information of any breach of the security of
the data immediately following discovery if the PI was acquired by an
unauthorized person. Cooperation includes sharing with the owner or licensee
information relevant to the breach, except that such cooperation shall not be
deemed to require the disclosure of confidential or business information or
trade secrets.
Timing of Notification. The Entity shall notify the affected individuals as
soon as possible.
Personal Information Definition. An individual’s first name or initial and last
name in combination with any one or more of the following data elements,
when either the name or the data elements are not encrypted:
•

Social Security Number;

•

Driver license number or other government identification number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account.

Data shall not be considered to be encrypted if it is acquired in combination
with any required key, security code, access code, or password that would
permit access to the encrypted data.
PI shall not include information that is lawfully made available to the general
public from federal, state, or local government records.
Notice Required. Notice shall include at a minimum:
•

A description of the incident in general terms;

•

The approximate date of the breach;

•

The type of PI obtained as a result of the security breach; and

•

The telephonic contact information of the Entity.

Notice shall be provided by one of the following methods:
•

Written notice;

•

Telephonic notice, provided that a log of each such notification is kept
by the person or business who notifies affected persons;

•

Electronic notice, if the Entity’s primary means of communication with
affected individuals is by electronic means; or

•

Notice pursuant to the Entity’s internal notification procedures
maintained as part of an information security policy for the treatment
of PI.

Substitute Notice Available. If the Entity demonstrates that the cost of

- 85 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
providing notice would exceed $5,000, the affected class of subject
individuals to be notified exceeds 1,000, or the Entity does not have sufficient
contact information or consent to provide written, electronic or telephonic
notice. Substitute notice shall consist of all of the following:
•

Email notice when the Entity has an email address for the affected
individuals;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Compliance with Other Laws.
•

Primary Regulator. An Entity engaged in trade or commerce that
maintains procedures for security breach notification pursuant to laws,
rules, regulations, guidance, or guidelines issued by a state or federal
regulator shall be deemed to be in compliance with this subdivision if
it acts in accordance with such laws, rules, regulations, guidance or
guidelines.

Other Key Provisions:
•

Delay for Law Enforcement. The notification may be delayed if a
law enforcement agency or national or homeland security agency
determines that the notification will impede a criminal investigation or
jeopardize national or homeland security.

•

AG Enforcement.

•

Private Right of Action. Any person injured by any violation may
bring a civil action. If the court finds for the plaintiff, recovery shall be
in the amount of actual damages. If the court finds that the act or
practice was willful or knowing, it shall award as much as three times
but not less than two times, such amount. In addition, a prevailing
plaintiff shall be awarded the costs of the suit and attorney’s fees, as
determined by the court. Injunctive relief shall be available to private
individuals under this chapter without bond, subject to the discretion
of the court.

•

Waiver Not Permitted.

- 86 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

New Jersey
N.J. Stat. § 56:8-163
A. 4001 (signed Sept. 22,
2005)
Effective January 1, 2006 (all
provisions except those
governing police reports, which
are effective on Sept. 22, 2005)

Application. NJ, and any county, municipality, district, public authority, public
agency, and any other political subdivision or public body in NJ, any sole
proprietorship, partnership, corporation, association, or other entity, however
organized and whether or not organized to operate at a profit, including a
financial institution organized, chartered, or holding a license or authorization
certificate under the law of NJ, any other state, the United States, or of any
other country, or the parent or the subsidiary of a financial institution, that
conducts business in NJ (collectively, Entity) that compiles or maintains
computerized records that include PI.
•

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining PI, whether or not
the Entity conducts business in NJ.

Security Breach Definition. Unauthorized access to electronic files, media
or data containing PI that compromises the security, confidentiality or integrity
of PI when access to the PI has not been secured by encryption or by any
other method or technology that renders the PI unreadable or unusable.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
a legitimate business purpose is not a breach of security, provided
that the PI is not used for a purpose unrelated to the business or
subject to further unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of security of computerized records following discovery or
notification of the breach to any customer who is a resident of NJ whose PI
was, or is reasonably believed to have been, accessed by an unauthorized
person.
•

Disclosure of a breach of security to a customer shall not be required
if the Entity establishes that misuse of the information is not
reasonably possible. Any determination shall be documented in
writing and retained for five years.

Notification to Consumer Reporting Agencies. If an Entity discovers
circumstances requiring notification pursuant to this section of more than
1,000 persons at one time, the Entity shall also notify, without unreasonable
delay, all consumer reporting agencies that compile or maintain files on
consumers on a nationwide basis of the timing, distribution and content of the
notices.
Attorney General/Police Notification. Any Entity required under this section
to disclose a breach of security of a customer’s PI shall, prior to disclosure to
the customer, report the breach of security and any information pertaining to
the breach to the Division of State Police in the Department of Law and Public
Safety for investigation or handling, which may include dissemination or
referral to other appropriate law enforcement entities.
Third-Party Data Notification. An Entity that compiles or maintains

- 87 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
computerized records that include PI on behalf of another Entity shall notify
that Entity of any breach of security of the computerized records immediately
following discovery, if the PI was, or is reasonably believed to have been,
accessed by an unauthorized person.
Timing of Notification. The disclosure to a customer shall be made in the
most expedient time possible and without unreasonable delay, consistent with
any measures necessary to determine the scope of the breach and restore
the reasonable integrity of the data system.
Personal Information Definition. An individual’s first name or first initial and
last name linked with any one or more of the following data elements:
•

Social Security Number;

•

Driver license number or state identification card number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account.

Dissociated data that, if linked, would constitute PI is PI if the means to link
the dissociated data were accessed in connection with access to the
dissociated data. PI shall not include publicly available information that is
lawfully made available to the general public from federal, state or local
government records, or widely distributed media.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, or that the affected class of subject
individuals to be notified exceeds 500,000, or the Entity does not have
sufficient contact information. Substitute notice shall consist of all of the
following:
•

Email notice when the Entity has email addresses;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI, and is otherwise consistent with the requirements of the
statute, shall be deemed in compliance with the notification requirements of

- 88 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
the statute if it notifies subject customers in accordance with its policies in the
event of a breach of security of the system.
Other Key Provisions:
•

Delay for Law Enforcement. The notification required by this
section shall be delayed if a law enforcement agency determines that
the notification will impede a criminal or civil investigation and that
agency has made a request that the notification be delayed.

- 89 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

New York
N.Y. Gen. Bus. Law § 899-aa
A.B. 4254 (signed into law
August 10, 2005)

Application. Any person, business, or state entity (excepting the judiciary,
cities, counties, municipalities, villages, towns and other local agencies)
(collectively, Entity) which conducts business in New York state and which
owns or licenses computerized data which includes private information.
•

N.Y. State Tech. Law § 208
Effective December 7, 2005
S. 2605-D (signed into law
March 28, 2013)

The provisions governing maintenance of private information that the
Entity does not own appear applicable to any Entity maintaining
private information, whether or not the Entity conducts business in
NY.

Security Breach Definition. Unauthorized acquisition or acquisition without
valid authorization of computerized data that compromises the security,
confidentiality, or integrity of PI maintained by a business. In determining
whether information has been acquired, or is reasonably believed to have
been acquired, by an unauthorized person or a person without valid
authorization, Entities may consider the following factors, among others:
•

Indications that the information is in the physical possession and
control of an unauthorized person, such as a lost or stolen computer
or other device containing information;

•

Indications that the information has been downloaded or copied; or

•

Effective March 28, 2013

Indications that the information was used by an unauthorized person,
such as fraudulent accounts opened or instances of identity theft
reported.

Good-faith acquisition of PI by an employee or agent of the Entity for the
purposes of the Entity is not a breach of the security of the system, provided
that the private information is not used or subject to unauthorized disclosure.
Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security following discovery or notification of the
breach in the security of the system to any resident of NY whose private
information was, or is reasonably believed to have been, acquired by a
person without valid authorization.
Notification to Consumer Reporting Agencies. If more than 5,000 NY
residents are to be notified at one time, the Entity shall also notify consumer
reporting agencies as to the timing, content and distribution of the notices and
approximate number of affected persons.
Attorney General/Agency Notification. If any NY residents are to be
notified, the Entity shall notify the state Attorney General, the consumer
protection board, the division of state police, and the state Office of
Information Technology Services as to the timing, content and distribution of
the notices and approximate number of affected persons. The state AG’s
website has a form to be used for notifications.
Third-Party Data Notification. Any Entity that maintains computerized data
that includes private information that the Entity does not own shall notify the

- 90 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
owner or licensee of the information of any breach of the security of the
system immediately following discovery, if the private information was, or is
reasonably believed to have been, acquired by a person without valid
authorization.
Timing of Notification. The disclosure shall be made in the most expedient
time possible and without unreasonable delay, consistent with any measures
necessary to determine the scope of the breach and restore the reasonable
integrity of the system.
Personal Information Definition. Information concerning a natural person
which, because of name, number, personal mark, or other identifier, can be
used to identify such natural person
Private Information Definition. Personal information consisting of any
information in combination with any one or more of the following data
elements, when either the personal information or the data element is not
encrypted, or encrypted with an encryption key that has also been acquired:
•

Social Security Number;

•

Driver license number or non-driver identification card number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account.

Notice Required. Notice shall include:
•

Contact information for the Entity making the notification; and

•

A description of the categories of information that were, or are
reasonably believed to have been, acquired by a person without valid
authorization, including specification of which of the elements of PI
and private information were, or are reasonably believed to have
been, so acquired.

The notice required shall be directly provided to the affected persons by one
of the following methods:
•

Written notice;

•

Telephonic notice, provided that a log of each such notification is kept
by the Entity; or

•

Electronic notice, provided that the person to whom notice is required
has expressly consented to receiving said notice in electronic form
and a log of each such notification is kept by the Entity who notifies
affected persons in such form; provided further, however, that in no
case shall any Entity require a person to consent to accepting said
notice in said form as a condition of establishing any business

- 91 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
relationship or engaging in any transaction.
Substitute Notice Available. If the Entity demonstrates to the state AG that
the cost of providing notice would exceed $250,000, or that the affected class
of subject persons to be notified exceeds 500,000, or the Entity does not have
sufficient contact information. Substitute notice shall consist of all of the
following:
•

Email notice when the Entity has an email addresses for the subject
persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Other Key Provisions:
•

Delay for Law Enforcement. The notification required by this
section may be delayed if a law enforcement agency determines that
such notification impedes a criminal investigation. The required
notification shall be made after such law enforcement agency
determines that such notification does not compromise such
investigation.

•

AG Enforcement. The AG may bring an action to enjoin and restrain
the continuation of such violation.

- 92 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

North Carolina
N.C. GEN. STAT. §§ 75-61, 7565
Effective December 1, 2005
S.B. 1048 (signed into law
September 21, 2005)
Amended by S.B. 1017 (signed
into law July 27, 2009)

Application. Any sole proprietorship, partnership, corporation, association,
or other group, however organized and whether or not organized to operate at
a profit, including a financial institution organized, chartered, or holding a
license or authorization certificate under the laws of any state or country, or
the parent or the subsidiary of any such financial institution, but not including
any government or governmental subdivision or agency (collectively, Entity)
that owns or licenses PI of residents of NC or any Entity that conducts
business in NC that owns or licenses PI in any form (computerized, paper, or
otherwise).
Security Breach Definition. An incident of unauthorized access to and
acquisition of unencrypted and unredacted records or data containing PI
where illegal use of the PI has occurred or is reasonably likely to occur or that
creates a material risk of harm to a consumer. Any incident of unauthorized
access to and acquisition of encrypted records or data containing PI along
with the confidential process or key shall constitute a security breach.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
a legitimate purpose is not a security breach, provided that the PI is
not used for a purpose other than a lawful purpose of the Entity and is
not subject to further unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall provide
notice to the affected person that there has been a security breach following
discovery or notification of the breach.
Notification to Consumer Reporting Agencies. In the event an Entity
provides notice to more than 1,000 persons at one time pursuant to this
section, the Entity shall notify, without unreasonable delay, all consumer
reporting agencies that compile and maintain files on consumers on a
nationwide basis of the timing, distribution, and content of the notice.
Attorney General Notification. In the event a business provides notice to an
affected person pursuant to this section, the business shall notify without
unreasonable delay the Consumer Protection Division of the state AG’s office
of the nature of the breach, the number of consumers affected by the breach,
steps taken to investigate the breach, steps taken to prevent a similar breach
in the future, and information regarding the timing, distribution, and content of
the notice. The AG’s website contains a form to be used for notification.
Third-Party Data Notification. Any business that possesses records
containing PI of residents of NC that the business does not own or license, or
conducts business in NC that possesses records containing PI that the
business does not own or license shall notify the owner or licensee of the
information of any security breach immediately following discovery of the
breach.
Timing of Notification. The disclosure shall be made without unreasonable
delay, consistent with any measures necessary to determine sufficient contact
information, determine the scope of the breach and restore the reasonable

- 93 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
integrity, security, and confidentiality of the data system.
Personal Information Definition. A person’s first name or first initial and last
name in combination with any of the following identifying information:
•

Social Security Number;

•

Drivers license, NC identification card or passport numbers;

•

Checking account numbers;

•

Savings account numbers;

•

Credit card numbers;

•

Debit card numbers;

•

PIN;

•

Digital signatures;

•

Any other numbers or information that can be used to access a
person’s financial resources;

•

Biometric data; or

•

Fingerprints.

Additionally, if (but only if) any of the following information “would permit
access to a person’s financial account or resources,” it is considered PI when
taken in conjunction with a person’s first name, or first initial and last name:
•

Electronic ID numbers;

•

Email names or addresses;

•

Internet account numbers;

•

Internet ID names;

•

Parent’s legal surname prior to marriage; or

•

Passwords.

PI does not include publicly available directories containing information an
individual has voluntarily consented to have publicly disseminated or listed,
including name, address, and telephone number, and does not include
information made lawfully available to the general public from federal, state,
or local government records
Notice Required. Notice must be clear, conspicuous, and shall include all of
the following:
•

A description of the incident in general terms;

•

A description of the type of PI that was subject to the unauthorized

- 94 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
access and acquisition;
•

A description of the general acts of the business to protect the PI from
further unauthorized access;

•

A telephone number for the business that the person may call for
further information and assistance, if one exists;

•

Advice that directs the person to remain vigilant by reviewing account
statements and monitoring free credit reports;

•

The toll-free numbers and addresses for the major consumer
reporting agencies; and

•

The toll-free numbers, addresses, and Web site addresses for the
Federal Trade Commission and the NC AG’s office, along with a
statement that the individual can obtain information from these
sources about preventing identity theft.

It may be provided by one of the following methods:
•

Written notice;

•

Telephonic notice provided that contact is made directly with the
affected persons; or

•

Electronic notice, for those persons for whom it has a valid e-mail
address and who have agreed to receive communications
electronically if the notice provided is consistent with the provisions
regarding electronic records and signatures set forth in 15 U.S.C.
§ 7001 (E-SIGN Act).

Substitute Notice Available. If the business demonstrates that the cost of
providing notice would exceed $250,000 or that the affected class of subject
persons to be notified exceeds 500,000, or if the business does not have
sufficient contact information or consent to provide notice as required under
the statute, for only those affected persons without sufficient contact
information or consent, or if the business is unable to identify particular
affected persons, for only those unidentifiable affected persons. Substitute
notice shall consist of all the following:
•

Email notice when the Entity has an email address for the subject
persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Compliance with Other Laws.
•

A financial institution that is subject to and in compliance with the
Federal Interagency Guidance Response Programs for Unauthorized

- 95 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
Access to Consumer Information and Customer Notice, issued on
March 7, 2005, by the Board of Governors of the Federal Reserve
System, the Federal Deposit Insurance Corporation, the Office of the
Comptroller of the Currency, and the Office of Thrift Supervision, and
any revisions, additions, or substitutions relating to said Interagency
Guidance, shall be deemed to be in compliance.
Other Key Provisions:
•

Delay for Law Enforcement. The notice required by this section
shall be delayed if a law enforcement agency informs the business
that notification may impede a criminal investigation or jeopardize
national or homeland security, provided that such request is made in
writing or the business documents such request contemporaneously
in writing, including the name of the law enforcement officer making
the request and the officer’s law enforcement agency engaged in the
investigation. The notice required shall be provided without
unreasonable delay after the law enforcement agency communicates
to the business its determination that notice will no longer impede the
investigation or jeopardize national or homeland security.

•

AG Enforcement. Civil and criminal penalties available.

•

Private Right of Action. An individual injured as a result of a
violation of this section may institute a civil action.

•

Waiver Not Permitted.

- 96 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

North Dakota
N.D. Cent. Code § 51-30-01
et seq.
S.B. 2251 (signed into law April
22, 2005)
Effective June 1, 2005
H.B. 1435 (signed into law April
18, 2013)

Application. Any Entity that conducts business in ND and that owns or
licenses computerized data that includes PI.
•

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining PI, whether or not
the Entity conducts business in ND.

Security Breach Definition. Unauthorized acquisition of computerized data
when access to PI has not been secured by encryption or by any other
method or technology that renders the electronic files, media, or data bases
unreadable or unusable.
•

Good-faith acquisition of PI by an employee or agent of the Entity is
not a breach of the security of the system if the PI is not used or
subject to further unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security of the system following discovery or
notification of the breach in the security of the data to any resident of ND
whose unencrypted PI was, or is reasonably believed to have been, acquired
by an unauthorized person.
Third-Party Data Notification. Any person that maintains computerized data
that includes PI that the person does not own shall notify the owner or
licensee of the information of the breach of the security of the data
immediately following the discovery, if the PI was, or is reasonably believed to
have been, acquired by an unauthorized person.
Timing of Notification. The disclosure must be made in the most expedient
time possible and without unreasonable delay, consistent with any measures
necessary to determine the scope of the breach and to restore the integrity of
the data system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any of the following data elements, when the
name and the data elements are not encrypted:
•

Social Security Number;

•

The operator’s license number assigned to an individual by the
department of transportation;

•

A non-driver color photo identification card number assigned to the
individual by the department of transportation;

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
accounts;

•

The individual’s date of birth;

- 97 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

The maiden name of the individual’s mother;

•

Medical information;

•

Health insurance information;

•

An identification number assigned to the individual by the individual’s
employer; or

•

The individual’s digitized or other electronic signature.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the person demonstrates that the cost of
providing notice would exceed $250,000, the affected class of subject
individuals to be notified exceeds 500,000, or the person does not have
sufficient contact information. Substitute notice shall consist of all of the
following:
•

Email notice when the person has an email address for the subject
persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and is otherwise consistent with the timing requirements of
this chapter is deemed to be in compliance with the notification requirements
of this chapter if the Entity notifies subject individuals in accordance with its
policies in the event of a breach of security of the system.
Exception: Compliance with Other Laws.
•

A financial institution, trust company, or credit union that is subject to,
examined for, and in compliance with the Federal Interagency
Guidance on Response Programs for Unauthorized Access to
Customer Information and Customer Notice is deemed to be in
compliance with this chapter.

•

An Entity, business associate, or subcontractor that is subject to the

- 98 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
breach notification requirements of title 45 of the Code of Federal
Regulations, part 164, subpart D, is considered to be in compliance
with this chapter.
Other Key Provisions:
•

Delay for Law Enforcement. The notification required by this chapter
may be delayed if a law enforcement agency determines that the
notification will impede a criminal investigation. The required
notification must be made after the law enforcement agency
determines that the notification will not compromise the investigation.

•

AG Enforcement.

- 99 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Ohio
Ohio Rev. Code § 1349.19

Application. Any individual, corporation, business trust, estate, trust,
partnership, or association (collectively, Entity) that conducts business in OH
and owns or licenses computerized data that includes PI.
•

H.B. 104 (signed into law Nov.
17, 2005), amended by S.B.
126 (signed into law Dec. 29,
2006)
Effective February 17, 2006
(amendment to exclude
“covered entities” under HIPAA
effective March 30, 2007)

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining PI, whether or not
the Entity conducts business in OH.

Security Breach Definition. Unauthorized access to and acquisition of
computerized data that compromises the security or confidentiality of PI
owned or licensed by an Entity and that causes, reasonably is believed to
have caused, or reasonably is believed will cause a material risk of identity
theft or other fraud to the person or property of OH.
Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security of the system, following its discovery or
notification of the breach of the security of the system, to any individual whose
principal mailing address as reflected in the records of the Entity is in OH and
whose PI was, or reasonably is believed to have been, accessed and
acquired by an unauthorized person if the access and acquisition by the
unauthorized person causes or reasonably is believed will cause a material
risk of identity theft or other fraud to the resident.
Notification to Consumer Reporting Agencies. If an Entity discovers
circumstances that require disclosure under this section to more than 1,000
residents of OH involved in a single occurrence of a breach of the security of
the system, the Entity shall notify, without unreasonable delay, all consumer
reporting agencies that compile and maintain files on consumers on a
nationwide basis of the timing, distribution, and content of the disclosure given
by the Entity to the residents of OH. This requirement does not apply to
“covered entities” as defined in the Health Insurance Portability and
Accountability Act of 1996 (HIPAA).
Third-Party Data Notification. Any Entity that, on behalf of or at the
direction of another Entity or on behalf of or at the direction of any
governmental entity, is the custodian of or stores computerized data that
includes PI shall notify that other Entity or governmental entity of any breach
of the security of the system in an expeditious manner, if the PI was, or
reasonably is believed to have been, accessed and acquired by an
unauthorized person and if the access and acquisition by the unauthorized
person causes or reasonably is believed will cause a material risk of identity
theft or other fraud to a resident of OH.
Timing of Notification. The disclosure shall be made in the most expedient
time possible but not later than 45 days following discovery or notification of
the breach in the security of the system, consistent with any measures
necessary to determine the scope of the breach, including which residents’ PI
was accessed and acquired, and to restore the reasonable integrity of the
data system.

- 100 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Personal Information Definition. An individual’s name, consisting of the
individual’s first name or first initial and last name, in combination with and
linked to any one or more of the following data elements, when the data
elements are not encrypted, redacted, or altered by any method or technology
in such a manner that the data elements are unreadable:
•

Social Security Number;

•

Driver license number or state identification card number; or

•

Account number or credit card number or debit card number in
combination with and linked to any required security code, access
code, or password that would permit access to an individual’s
financial account.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government records
or any of the following that are widely distributed:
•

Any news, editorial, or advertising statement published in any bona
fide newspaper, journal, or magazine, or broadcast over radio or
television, or any type of media similar in nature;

•

Any gathering or furnishing of information or news by any bona fide
reporter, correspondent, or news bureau to any bona fide newspaper,
journal, magazine, radio or television news media, or any type of
media similar in nature; or

•

Any publication designed for and distributed to members of any bona
fide association or charitable or fraternal nonprofit corporation, or any
type of media similar in nature.

Notice Required. Notice may be provided by any of the following methods:
•

Written notice;

•

Telephonic notice; or

•

Electronic notice, if the Entity’s primary method of communication with
the resident to whom the disclosure must be made is by electronic
means.

Substitute Notice Available. If the Entity demonstrates that the cost of
providing disclosure or notice to residents to whom disclosure or notification is
required would exceed $250,000, that the affected class of subject residents
to whom disclosure or notification is required exceeds 500,000 persons, or
that it does not have sufficient contact information to provide written,
telephonic or electronic notice. Substitute notice under this division shall
consist of all of the following:
•

Email notice if the Entity has an email address for the resident to
whom the disclosure must be made;

- 101 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major media outlets, to the extent that the cumulative
total of the readership, viewing audience, or listening audience of all
of the outlets so notified equals or exceeds 75% of the population of
OH.

Substitute Notice Exception. If the Entity demonstrates it has 10
employees or fewer and that the cost of providing the disclosures or notices to
residents to whom disclosure or notification is required will exceed $10,000.
Substitute notice under this division shall consist of all of the following:
•

Notification by a paid advertisement in a local newspaper that is
distributed in the geographic area in which the Entity is located, which
advertisement shall be of sufficient size that it covers at least onequarter of a page in the newspaper and shall be published in the
newspaper at least once a week for three consecutive weeks;

•

Conspicuous posting of the disclosure or notice on the Entity’s Web
site if the Entity maintains one; and

•

Notification to major media outlets in the geographic area in which the
Entity is located.

Exception: Compliance with Other Laws.
•

A financial institution, trust company, or credit union or any affiliate of
a financial institution, trust company, or credit union that is required
by federal law, including, but not limited to, any federal statute,
regulation, regulatory guidance, or other regulatory action, to notify its
customers of an information security breach with respect to
information about those customers and that is subject to examination
by its functional government regulatory agency for compliance with
the applicable federal law, is exempt from the requirements of the
statute.

Exception: Preexisting Contract. Disclosure may be made pursuant to any
provision of a contract entered into by the Entity with another Entity prior to
the date the breach of the security of the system occurred if that contract does
not conflict with any provision of this section and does not waive any provision
of this section.
Other Key Provisions:
•

Delay for Law Enforcement. The Entity may delay the disclosure if
a law enforcement agency determines that the disclosure or
notification will impede a criminal investigation or jeopardize
homeland or national security, in which case, the Entity shall make
the disclosure or notification after the law enforcement agency

- 102 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
determines that disclosure or notification will not compromise the
investigation or jeopardize homeland or national security.
•

AG Enforcement. The AG may conduct an investigation and bring a
civil action upon an alleged failure by an Entity to comply with this
statute.

- 103 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Oklahoma
24 Okla. Stat. § 161 et seq.
H.B. 2245 (signed into law April
28, 2008)
Effective November 1, 2008

Application. Any corporations, business trusts, estates, partnerships, limited
partnerships, limited liability partnerships, limited liability companies,
associations, organizations, joint ventures, governments, governmental
subdivisions, agencies, or instrumentalities, or any other legal entity, whether
for profit or not-for-profit (collectively, Entity) that owns or licenses
computerized data that includes PI of OK residents.
Security Breach Definition. Unauthorized access and acquisition of
unencrypted and unredacted computerized data that compromises the
security or confidentiality of PI maintained by an Entity as part of a database
of PI regarding multiple individuals and that causes, or the Entity reasonably
believes has caused or will cause, identity theft or other fraud to any resident
of OK.
•

Good-faith acquisition of PI by an employee or agent of an Entity for
the purposes of the Entity is not a breach of the security of the
system, provided that the PI is not used for a purpose other than a
lawful purpose of the Entity or subject to further unauthorized
disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security of the system following discovery or
notification of the breach of the security of the system to any resident of OK
whose unencrypted and unredacted PI was or is reasonably believed to have
been accessed and acquired by an unauthorized person and that causes, or
the individual or entity reasonably believes has caused or will cause, identity
theft or other fraud to any resident of OK.
•

An Entity must disclose the breach of the security of the system if
encrypted information is accessed and acquired in an unencrypted
form or if the security breach involves a person with access to the
encryption key and the individual or entity reasonably believes that
such breach has caused or will cause identity theft or other fraud to
any resident of OK.

Third-Party Data Notification. An Entity that maintains computerized data
that includes PI that the Entity does not own or license shall notify the owner
or licensee of the information of any breach of the security of the system as
soon as practicable following discovery, if the PI was or if the Entity
reasonably believes was accessed and acquired by an unauthorized person.
Timing of Notification. The disclosure shall be made without unreasonable
delay consistent with any measures necessary to determine the scope of the
breach and to restore the reasonable integrity of the system.
Personal Information Definition. The first name or first initial and last name
of an individual in combination with and linked to any one or more of the
following data elements that relate to a resident of OK, when the data
elements are neither encrypted nor redacted:

- 104 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Social Security Number;

•

Driver license or state identification card number issued in lieu of a
driver license; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to the financial accounts of a
resident.

PI shall not include information that is lawfully obtained from publicly available
information, or from federal, state, or local government records lawfully made
available to the general public.
Notice Required. Notice means one of the following methods:
•

Written notice to the postal address in the records of the Entity;

•

Telephonic notice; or

•

Electronic notice.

Substitute Notice Available. If an Entity demonstrates that the cost of
providing notice would exceed $50,000, the affected class of residents to be
notified exceeds 100,000, or the Entity does not have sufficient contact
information. Substitute notice consists of any two of the following:
•

Email notice if the Entity has e-mail addresses for the members of the
affected class of residents;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; or

•

Notification to major statewide media.

Exception: Own Notification Policy. An entity that maintains its own
notification procedures as part of an information privacy or security policy for
the treatment of PI and that are consistent with the timing requirements of the
statute shall be deemed to be in compliance with the notification requirements
of the statute if it notifies residents of OK in accordance with its procedures in
the event of a breach of security of the system.
Exception: Compliance with Other Laws.
•

Interagency Guidance. A financial institution that complies with the
notification requirements prescribed by the Federal Interagency
Guidance on Response Programs for Unauthorized Access to
Customer Information and Customer Notice is deemed to be in
compliance with the provisions of the statute.

•

Primary Regulator. An Entity that complies with the notification
requirements or procedures pursuant to the rules, regulation,
procedures, or guidelines established by the primary or functional

- 105 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
federal regulator of the Entity shall be deemed to be in compliance
with the provisions of the statute.
Penalties. The state AG or a district attorney shall have exclusive authority
to bring an action and may obtain either actual damages for a violation of the
statute or a civil penalty not to exceed $150,000 per breach of the security of
the system or series of breaches of a similar nature that are discovered in a
single investigation.
Other Key Provisions:
•

Delay for Law Enforcement. Notice required may be delayed if a
law enforcement agency determines and advises the Entity that the
notice will impede a criminal or civil investigation or homeland or
national security. Notice required must be made without
unreasonable delay after the law enforcement agency determines
that notification will no longer impede the investigation or jeopardize
national or homeland security.

- 106 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Oregon
Or. Rev. Stat. §§ 646A.600,
646A.602, 646A.604,
646A.624, 646A.626
S.B. 583 (signed into law July
12, 2007)
Effective October 1, 2007

Application. Any individual, private or public corporation, partnership,
cooperative, association, estate, limited liability company, organization or
other entity, whether or not organized to operate at a profit, or a public body
as defined in Or. Rev. Stat. § 174.109 (collectively, Entity) that owns,
maintains or otherwise possesses data that includes an individual’s PI that is
used in the course of the Entity’s business, vocation, occupation or volunteer
activities and was subject to the breach of security.
Security Breach Definition. Unauthorized acquisition of computerized data
that materially compromises the security, confidentiality or integrity of PI
maintained by the Entity.
•

Does not include good-faith acquisition of PI by an Entity or that
Entity’s employee or agent for a legitimate purpose of that Entity if the
PI is not used in violation of applicable law or in a manner that harms
or poses an actual threat to the security, confidentiality or integrity of
the PI.

•

[Effective Sept. 12, 2013: Does not include an inadvertent acquisition
of PI by an Entity or that Entity’s employee or agent if the PI is not
used in violation of applicable law or in a manner that harms or poses
an actual threat to the security, confidentiality or integrity of the PI.]

S.B. 574 (signed into law June
13, 2013)
Effective Sept. 12, 2013

Notification Obligation. Any Entity to which the statute applies shall give
notice of the breach of security following discovery of such breach of security,
or receipt of notification, to any Entity whose PI was included in the
information that was breached.
•

Notification is not required if, after an appropriate investigation or after
consultation with relevant federal, state or local agencies responsible
for law enforcement, the Entity reasonably determines that the breach
has not and will not likely result in harm to the individuals whose PI
has been acquired and accessed. Such a determination must be
documented in writing and the documentation must be maintained for
five years.

Notification to Consumer Reporting Agencies. If an Entity discovers a
breach of security affecting more than 1,000 individuals that requires
disclosure under this section, the Entity shall notify, without unreasonable
delay, all consumer reporting agencies that compile and maintain reports on
individuals on a nationwide basis of the timing, distribution and content of the
notification given by the Entity to the individuals. The Entity shall include the
police report number, if available, in its notification to the consumer reporting
agencies.
Third-Party Data Notification. Any person that maintains or otherwise
possesses PI through a licensing agreement with another person shall notify
the owner or licensee of the information of any breach of security immediately
following discovery of such breach of security if an individual’s PI was

- 107 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
included in the information that was breached.
Timing of Notification. The disclosure shall be made in the most expedient
time possible and without unreasonable delay, consistent with any measures
necessary to determine sufficient contact information for the individuals,
determine the scope of the breach and restore the reasonable integrity,
security and confidentiality of the data.
Personal Information Definition. An OR resident’s first name or first initial
and last name in combination with any one or more of the following data
elements, when either the name or the data elements are not rendered
unusable through encryption, redaction or other methods, or when the data
elements are encrypted and the encryption key has also been acquired:
•

Social Security Number;

•

Driver license number or state identification card number issued by
the department of transportation;

•

Identification number issued by a foreign nation;

•

Passport number or other United States-issued identification number;

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an OR resident’s financial
account.

PI also includes any PI data element or any combination of the PI data
elements if the information would be sufficient to permit an individual to
fraudulently assume the identity of the OR resident whose information was
compromised. PI does not include publicly available information, other than a
Social Security Number, that is lawfully made available to the general public
from federal, state or local government records.
Notice Required. Notice shall include at a minimum:
•

A description of the incident in general terms;

•

The approximate date of the breach of security;

•

The type of PI obtained as a result of the breach of security;

•

Contact information of the person subject to this section;

•

Contact information for national consumer reporting agencies; and

•

Advice to the individual to report suspected identity theft to law
enforcement.

Notice may be provided by one of the following methods:
•

Written notice;

•

Telephone notice, provided that contact is made directly with the
- 108 -

This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
affected individual; or
•

Electronic notice if the Entity’s primary method of communication with
the individual is by electronic means or is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, that the affected class of individuals
to be notified exceeds 350,000, or if the Entity does not have sufficient
contact information to provide notice. Substitute notice consists of the
following:
•

Conspicuous posting of the notice or a link to the notice on the home
page of the Entity’s Web site if the Entity maintains one; and

•

Notification to major statewide television and newspaper media.

Exception: Compliance with Other Laws.
•

Primary Regulator. An Entity that complies with the notification
requirements or breach of security procedures that provide greater
protection to PI and at least as thorough disclosure requirements
pursuant to the rules, regulations, procedures, guidance or guidelines
established by the Entity’s primary or functional federal regulator.

•

Gramm-Leach-Bliley Act. A person that complies with regulations
regarding notification requirements or breach of security procedures
that provide greater protection to PI and at least as thorough
disclosure requirements promulgated pursuant to Title V of the
Gramm-Leach-Bliley Act.

•

More Restrictive State or Federal Law. An Entity that complies with
a state or federal law that provides greater protection to PI and at
least as thorough disclosure requirements for breach of security of PI
than that provided by this section.

Other Key Provisions:
•

Delay for Law Enforcement. Notification may be delayed if a law
enforcement agency determines that the notification will impede a
criminal investigation and that agency has made a written request that
the notification be delayed. The required notification shall be made
after that law enforcement agency determines that its disclosure will
not compromise the investigation and notifies the Entity in writing.

- 109 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Pennsylvania
73 Pa. Stat. § 2301 et seq.

Application. Any state agency, political subdivision, or an individual or a
business (collectively, Entity) doing business in PA that maintains, stores or
manages computerized data that includes PI of PA residents.
•

S.B. 712 (signed into law Dec.
22, 2005, Act No. 94)
Effective June 20, 2006

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining PI, whether or not
the Entity conducts business in PA.

Security Breach Definition. Unauthorized access and acquisition of
computerized data that materially compromises the security or confidentiality
of PI maintained by the Entity as part of a database of PI regarding multiple
individuals and that causes or the Entity reasonably believes has caused or
will cause loss or injury to any resident of PA.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
the purposes of the Entity is not a breach of the security of the system
if the PI is not used for a purpose other than the lawful purpose of the
Entity and is not subject to further unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall provide
notice of any breach of the security of the system following discovery of the
breach of the security of the system to any individual whose principal mailing
address, as reflected in the computerized data which is maintained, stored or
managed by the Entity, is in PA whose unencrypted and unredacted PI was or
is reasonably believed to have been accessed and acquired by an
unauthorized person.
•

An Entity must provide notice of the breach if encrypted information is
accessed and acquired in an unencrypted form, if the security breach
is linked to a breach of the security of the encryption or if the security
breach involves a person with access to the encryption.

Notification to Consumer Reporting Agencies. When an Entity provides
notification under this act to more than 1,000 persons at one time, the Entity
shall also notify, without unreasonable delay, all consumer reporting agencies
that compile and maintain files on consumers on a nationwide basis of the
timing, distribution and number of notices.
Third-Party Data Notification. An Entity that maintains, stores or manages
computerized data on behalf of another Entity shall provide notice of any
breach of the security system following discovery to the Entity on whose
behalf it maintains, stores or manages the data.
Timing of Notification. Except in order to take any measures necessary to
determine the scope of the breach and to restore the reasonable integrity of
the data system, the notice shall be made without unreasonable delay.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with and linked to any one or more of the following
data elements when the data elements are not encrypted or redacted:

- 110 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Social Security Number;

•

Driver license number or state identification card number issued in
lieu of a driver license; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code or
password that would permit access to an individual’s financial
account.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by any of the following methods:
•

Written notice to the last known home address for the individual;

•

Telephonic notice, if the customer can be reasonably expected to
receive it and the notice is given in a clear and conspicuous manner,
describes the incident in general terms and verifies PI but does not
require the customer to provide PI, and the customer is provided with
a telephone number to call or Internet Web site to visit for further
information or assistance; or

•

Email notice, if a prior business relationship exists and the Entity has
a valid email address for the individual.

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $100,000, the affected class of subject
persons to be notified exceeds 175,000, or the Entity does not have sufficient
contact information. Substitute notice shall consist of all of the following:
•

Email notice when the Entity has an email address for the subject
persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information privacy or security policy for
the treatment of PI and is consistent with the notice requirements of this act
shall be deemed to be in compliance with the notification requirements of this
act if it notifies subject persons in accordance with its policies in the event of a
breach of security.
Exception: Compliance with Other Laws.
•

Compliance with Primary Regulator. An Entity that complies with
the notification requirements or procedures pursuant to the rules,

- 111 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
regulations, procedures or guidelines established by the Entity’s
primary or functional federal regulator shall be in compliance with this
act.
•

Federal Interagency Guidance. A financial institution that complies
with the notification requirements prescribed by the Federal
Interagency Guidance on Response Programs for Unauthorized
Access to Customer Information and Customer Notice is deemed to
be in compliance with this act.

Other Key Provisions:
•

Delay for Law Enforcement. Notification required may be delayed if
a law enforcement agency determines and advises the Entity in
writing, specifically referencing the statute, that the notification will
impede a criminal or civil investigation. The required notification shall
be made after the law enforcement agency determines that it will not
compromise the investigation or national or homeland security.

•

AG Enforcement. The AG shall have exclusive authority to bring an
action under the Unfair Trade Practices and Consumer Protection
Law for a violation of the statute.

- 112 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Puerto Rico

Application. Any entity that is the owner or custodian of a database that
includes personal information of residents of Puerto Rico.

10 L.P.R.A. St § 4051 et seq.

Violation of Security System Definition. Any situation in which it is detected
that access has been permitted to unauthorized persons or entities to the data
files so that the security, confidentiality or integrity of the information in the
data bank has been compromised; or when normally authorized persons or
entities have had access and it is known or there is reasonable suspicion that
they have violated the professional confidentiality or obtained authorization
under false representation with the intention of making illegal use of the
information.

H.B. 1184 (Signed into law
Sept. 7, 2005, No. 111).
Effective January 5, 2006

•

This includes both access to the data banks through the system and
physical access to the recording media that contain the same and any
removal or undue retrieval of said recordings.

Notification Obligation. Any entity to which the statute applies must notify
citizens of any breach of the security system when the breached database
contains, in whole or in part, personal information files not protected by
encrypted code but only by a password.
Third-Party Data Notification. Any entity that as part of their operations
resells or provides access to digital data banks that at the same time contain
personal information files of citizens must notify the proprietor, custodian or
holder of said information of any violation of the system's security that has
allowed access to those files to unauthorized persons
Timing of Notification. Clients must be notified as expeditiously as possible,
taking into consideration the need of law enforcement agencies to secure
possible crime scenes and evidence as well as the application of measures
needed to restore the system's security.
•

Within a non-extendable term of ten (10) days after the violation of the
system's security has been detected, the parties responsible shall
inform the Department of Consumer Affairs, which shall make a public
announcement of the fact within twenty-four (24) hours after having
received the information.

Personal Information Definition. At least the name or first initial and the
surname of a person, together with any of the following data so that an
association may established between certain information with another and in
which the information is legible enough so that in order to access it there is no
need to use a special cryptographic code.
•

Social Security Number.

•

Driver license number, voter's identification or other official
identification.

•

Bank or financial account numbers of any type with or without
passwords or access code that may have been assigned.

- 113 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Names of users and passwords or access codes to public or private
information systems.

•

Medical information protected by the Health Insurance Portability and
Accountability Act.

•

Tax information.

•

Work-related evaluations.

Neither the mailing nor the residential address is included in the protected
information or information that is a public document and that is available to
the citizens in general.
Notice Required. The notice of the security system breach shall be
submitted in a clear and conspicuous manner and should describe the breach
in general terms and the type of sensitive information compromised. The
notification shall also include a toll free number and an Internet site for people
to use in order to obtain information or assistance.
Notice may be provided by one of the following methods:
•

Written notice; or

•

Authenticated electronic means according to the Digital Signatures
Act.

Substitute Notice Available. When the cost of notifying all those potentially
affected or of identifying them is excessively onerous due to the number of
persons affected, to the difficulty in locating all persons or to the economic
situation of the enterprise or entity; or whenever the cost exceeds one
hundred thousand dollars ($100,000) or the number of persons exceeds one
hundred thousand [(100,000)], the entity shall issue the notice through the
following two (2) steps:
•

Prominent display of an announcement to that respect at the entities
premises, on the web page of the entity, if any, and in any informative
flier published and sent through mailing lists both postal and
electronic; and

•

A communication to that respect to the media informing of the
situation and providing information as to how to contact the entity to
allow for better follow-up. When the information is of relevance to a
specific professional or commercial sector, the announcement may be
made through publications or programming of greater circulation
oriented towards that sector.

Exception: Conflict with preexisting institutional security polices. No provision
of this chapter shall be interpreted as being prejudicial to those institutional
information and security policies that an enterprise or entity may have in force
prior to its effectiveness and whose purpose is to provide protection equal or
better to the information on security herein established.

- 114 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

- 115 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Rhode Island
R.I. Gen. Laws § 11- 49.2-1
et seq.
H.B. 6191 (became law without
Governor’s signature, July 10,
2005, Chapter 225)

Application. A state agency, individual, partnership association, corporation
or joint venture (collectively, Entity) that owns, maintains or licenses
computerized data that includes PI.
Security Breach Definition. Unauthorized acquisition of unencrypted
computerized data that compromises the security, confidentiality, or integrity
of PI maintained by the Entity.
•

Effective March 1, 2006

Good-faith acquisition of PI by an employee or agent of the Entity for
the purposes of the Entity is not a breach of the security of the
system, provided that the PI is not used or subject to further
unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security of the system which poses a significant
risk of identity theft following discovery or notification of the breach in the
security of the data to any resident of RI whose unencrypted PI was, or is
reasonably believed to have been, acquired by an unauthorized person or a
person without authority, to acquire said information.
•

Notification of a breach is not required if, after an appropriate
investigation or after consultation with relevant federal, state, or local
law enforcement agencies, a determination is made that the breach
has not and will not likely result in a significant risk of identity theft to
the individuals whose PI has been acquired.

Third-Party Data Notification. Any Entity that maintains computerized
unencrypted data that includes PI that the Entity does not own shall notify the
owner or licensee of the information of any breach of the security of the data
which poses a significant risk of identity theft immediately following discovery,
if the PI was, or is reasonably believed to have been, acquired by an
unauthorized person.
Timing of Notification. The disclosure shall be made in the most expedient
time possible and without unreasonable delay, consistent with any measures
necessary to determine the scope of the breach and restore the reasonable
integrity of the data system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when either the name or the data elements are not encrypted:
•

Social Security Number;

•

Driver license number or RI identification card number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account.

- 116 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Notice Required. Notice may be provided by any of the following methods:
•

Written notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $25,000, or that the affected class of subject
persons to be notified exceeds 50,000, or the Entity does not have sufficient
contact information. Substitute notice shall consist of all of the following:
•

Email notice when the Entity has an email address for the subject
persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. Any Entity that maintains its own
security breach procedures as part of an information security policy for the
treatment of PI and otherwise complies with the timing requirements of the
statute, shall be deemed to be in compliance with the security breach
notification, provided such Entity notifies subject persons in accordance with
such Entity’s policies in the event of a breach of security.
Exception: Compliance with Other Laws.
•

Compliance with Primary Regulator. Any Entity that maintains a
security breach procedure pursuant to the rules, regulations,
procedures or guidelines established by the primary or functional
regulator shall be deemed to be in compliance with the security
breach notification requirements of this section, provided such Entity
notifies subject persons in accordance with the policies or the rules,
regulations, procedures or guidelines established by the primary or
functional regulator in the event of a breach of security of the system.

•

Federal Interagency Guidance. A financial institution, trust
company, credit union or its affiliates that is subject to and examined
for, and found in compliance with the Federal Interagency Guidelines
on Response Programs for Unauthorized Access to Customer
Information and Customer Notice shall be deemed in compliance with
this chapter.

•

HIPAA-Covered Entities. A provider of health care, health care
service plan, health insurer, or a covered entity governed by the
medical privacy and security rules issued by the federal Department
of Health and Human Services pursuant to the Health Insurance
Portability and Accountability Act of 1996 (HIPAA) shall be deemed in

- 117 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
compliance with this chapter.
Penalties. Each violation is a civil violation for which a penalty of not more
than $100 per occurrence and not more than $25,000 may be adjudged
against a defendant.
Other Key Provisions:
•

Delay for Law Enforcement. The notification required by this
section may be delayed if a law enforcement agency determines that
the notification will impede a criminal investigation. The required
notification shall be made after the law enforcement agency
determines that it will not compromise the investigation.

•

Waiver Not Permitted.

- 118 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

South Carolina
S.C. Code § 39-1-90
S.B. 453 (signed into law April
2, 2008)
Effective July 1, 2009
H.B. 3248 (signed into law April
23, 2013)
Effective April 23, 2013

Application. A natural person, an individual, or a corporation, government or
governmental subdivision or agency, trust, estate, partnership, cooperative or
association (collectively, Entity) conducting business in SC, and owning or
licensing computerized data or other data that includes PI.
Security Breach Definition. Unauthorized access to and acquisition of
computerized data that was not rendered unusable through encryption,
redaction, or other methods that compromises the security, confidentiality, or
integrity of PI maintained by the Entity, when illegal use of the information has
occurred or is reasonably likely to occur or use of the information creates a
material risk of harm to a resident.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
the purposes of its business is not a breach of the security of the
system if the PI is not used or subject to further unauthorized
disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose a breach of the security of the system following discovery or
notification of the breach in the security of the data to a resident of SC whose
unencrypted and unredacted PI was, or is reasonably believed to have been,
acquired by an unauthorized person when the illegal use of the information
has occurred or is reasonably likely to occur or use of the information creates
a material risk of harm to the resident.
Notification to Consumer Reporting Agencies. If an Entity provides notice
to more than 1,000 persons at one time pursuant to the statute, the Entity
shall notify, without unreasonable delay, all consumer reporting agencies that
compile and maintain files on a nationwide basis of the timing, distribution,
and content of the notice.
Attorney General/Agency Notification. If an Entity provides notice to more
than 1,000 SC residents, the Entity shall notify, without unreasonable delay,
the Consumer Protection Division of the Department of Consumer Affairs of
the timing, distribution, and content of the notice.
Third-Party Data Notification. An Entity conducting business in SC and
maintaining computerized data or other data that includes PI that the Entity
does not own shall notify the owner or licensee of the information of a breach
of the security of the data immediately following discovery, if the PI was, or is
reasonably believed to have been, acquired by an unauthorized person.
Timing of Notification. The disclosure must be made in the most expedient
time possible and without unreasonable delay, consistent with measures
necessary to determine the scope of the breach and restore the reasonable
integrity of the data system.
Personal Information Definition. The first name or first initial and last name
in combination with and linked to any one or more of the following data
elements that relate to a resident of SC, when the data elements are neither

- 119 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
encrypted nor redacted:
•

Social Security Number;

•

Driver license number or state identification card number issued
instead of a driver license;

•

Financial account number or credit card number or debit card number
in combination with any required security code, access code, or
password that would permit access to a resident’s financial account;
or

•

Other numbers or information that may be used to access a person’s
financial accounts or numbers or information issued by a
governmental or regulatory entity that uniquely will identify an
individual.

PI does not include information that is lawfully obtained from publicly available
information, or from federal, state, or local government records lawfully made
available to the general public.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice;

•

Telephonic notice; or

•

Electronic notice, if the person’s primary method of communication
with the individual is by electronic means or is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice exceeds $250,000, or that the affected class of subject
persons to be notified exceeds 500,000, or the person has insufficient contact
information. Substitute notice consists of:
•

Email notice when the Entity has an email address for the subject
persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and is otherwise consistent with the timing requirements of the
statute shall be deemed to be in compliance with the notification requirements
of the statute if it notifies subject persons in accordance with its policies in the
event of a breach of security of the system.
Exception: Compliance with Other Laws.

- 120 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Gramm-Leach-Bliley Act. This section does not apply to a bank or
financial institution that is subject to and in compliance with the
privacy and security provisions of the Gramm-Leach-Bliley Act.

•

Interagency Guidance. A financial institution that is subject to and in
compliance with the federal Interagency Guidance Response
Programs for Unauthorized Access to Consumer Information and
Customer Notice, issued March 7, 2005, by the Board of Governors of
the Federal Reserve System, the Federal Deposit Insurance
Corporation, the Office of the Comptroller of the Currency, and the
Office of Thrift Supervision, as amended, is considered to be in
compliance with this section.

Penalties. A person who knowingly and willfully violates this section is
subject to an administrative fine of $1,000 for each resident whose
information was accessible by reason of the breach, the amount to be
decided by the Department of Consumer Affairs.
Other Key Provisions:
•

Delay for Law Enforcement. The notification required by the statute
may be delayed if a law enforcement agency determines that the
notification impedes a criminal investigation. The notification required
by the statute must be made after the law enforcement agency
determines that it no longer compromises the investigation.

•

Private Right of Action. A resident of SC who is injured by a
violation of this section, in addition to and cumulative of all other rights
and remedies available at law, may: institute a civil action to recover
damages in case of a willful and knowing violation; institute a civil
action to recover only actual damages resulting from a violation in
case of a negligent violation; seek an injunction to enforce
compliance; and recover attorney’s fees and court costs, if
successful.

- 121 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Tennessee
Tenn. Code § 47-18-2107

Application. Any person or business that conducts business in TN, or any
agency of TN or any of its political subdivisions (collectively, Entity), that owns
or licenses computerized data that includes PI.
•

H.B. 2170 (signed into law
June 8, 2005, Chapter 473)
Effective July 1, 2005

The provisions governing maintenance of PI that the Entity does not
own appear applicable to any Entity maintaining PI, whether or not
the Entity conducts business in TN.

Security Breach Definition. Unauthorized acquisition of unencrypted
computerized data that materially compromises the security, confidentiality, or
integrity of PI maintained by the Entity.
•

Good-faith acquisition of PI by an employee or agent of the Entity for
the purposes of the Entity is not a breach of the security of the
system, provided that the PI is not used or subject to further
unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security of the system, following discovery or
notification of the breach in the security of the data, to any resident of TN
whose unencrypted PI was, or is reasonably believed to have been, acquired
by an unauthorized person.
Notification to Consumer Reporting Agencies. If an Entity is required to
notify more than 1,000 persons at one time, the person shall also notify,
without unreasonable delay, all consumer reporting agencies and credit
bureaus that compile and maintain files on consumers on a nationwide basis
of the timing, distribution and content of the notices.
Third-Party Data Notification. Any Entity that maintains computerized data
that includes PI that the Entity does not own shall notify the owner or licensee
of the information of any breach of the security of the data immediately
following discovery, if the PI was, or is reasonably believed to have been,
acquired by an unauthorized person.
Timing of Notification. The disclosure shall be made in the most expedient
time possible and without unreasonable delay, consistent with the legitimate
needs of law enforcement or any measures necessary to determine the scope
of the breach and restore the reasonable integrity of the data system.
Personal Information Definition. An individual’s first name or first initial and
last name, in combination with any one or more of the following data
elements, when either the name or the data elements are not encrypted:
•

Social Security Number;

•

Driver license number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial

- 122 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
account.
PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, or that the affected class of subject
persons to be notified exceeds 500,000, or the Entity does not have sufficient
contact information. Substitute notice shall consist of all of the following:
•

Email notice when the Entity has an email address for the subject
persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and is otherwise consistent with the timing requirements of the
statute shall be deemed to be in compliance with the notification requirements
of the statute if it notifies subject persons in accordance with its policies in the
event of a breach of security of the system.
Exception: Compliance with Other Laws.
•

The provisions of this statute shall not apply to any Entity that is
subject to the provisions of Title V of the Gramm-Leach-Bliley Act.

Other Key Provisions:
•

Delay for Law Enforcement. The notification required may be
delayed if a law enforcement agency determines that the notification
will impede a criminal investigation. The required notification shall be
made after the law enforcement agency determines that it will not
compromise the investigation.

•

Private Right of Action.

- 123 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Texas
Tex. Bus. & Com. Code §§
521.002, 521.053
Acts 2007, 80th Leg., ch. 885,
§ 2.01. Amended by Acts 2009,
81st Leg., ch. 419, § 3.
Effective April 1, 2009

Application. A person (Entity) that conducts business in TX and owns or
licenses computerized data that includes sensitive PI.
•

Security Breach Definition. Unauthorized acquisition of computerized data
that compromises the security, confidentiality, or integrity of sensitive PI
maintained by an Entity, including data that is encrypted if the person
accessing the data has the key required to decrypt the data.
•

Acts 2011, 82nd Leg., ch.
1126, § 14 (H.B. No. 300).
Effective Sept. 1, 2012
S.B. 1610 (signed into law
June 14, 2013)
Effective June 14, 2013

The provisions governing maintenance of sensitive PI that the Entity
does not own appear applicable to any Entity maintaining PI, whether
or not the Entity conducts business in TX.

Good-faith acquisition of sensitive PI by an employee or agent of the
Entity for the purposes of the Entity is not a breach of system security
unless the sensitive PI is used or disclosed by the person in an
unauthorized manner.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of system security, after discovering or receiving
notification of the breach, to any person, including nonresidents, whose
sensitive PI was, or is reasonably believed to have been, acquired by an
unauthorized person.
Notification to Consumer Reporting Agencies. If an Entity is required by
this section to notify at one time more than 10,000 persons of a breach of
system security, the Entity shall also notify, without unreasonable delay, all
consumer reporting agencies that maintain files on consumers on a
nationwide basis of the timing, distribution, and content of the notices.
Third-Party Data Notification. Any Entity that maintains computerized data
that includes sensitive PI that the Entity does not own shall notify the owner or
license holder of the information of any breach of system security immediately
after discovering the breach, if the sensitive PI was, or is reasonably believed
to have been, acquired by an unauthorized person.
Timing of Notification. The disclosure shall be made as quickly as possible,
consistent with the legitimate needs of law enforcement or as necessary to
determine the scope of the breach and restore the reasonable integrity of the
data system.
Sensitive Personal Information Definition. An individual’s first name or first
initial and last name in combination with any one or more of the following
items, if the name and the items are not encrypted:
•

Social Security Number;

•

Driver license number or government-issued ID number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial

- 124 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
account.
Sensitive PI also includes information that identifies an individual and relates
to:
•

The physical or mental health or condition of the individual;

•

The provision of health care to the individual; or

•

Payment for the provision of health care to the individual.

Sensitive PI does not include publicly available information that is lawfully
made available to the general public from the federal government or a state or
local government.
Notice Required. Notice may be provided by one of the following methods:
•

Written notice at the last known address of the individual; or

•

Electronic notice, if the notice is consistent with the provisions
regarding electronic records and signatures set forth in 15 U.S.C.
§ 7001 (E-SIGN Act).

However, if the affected person is a resident of a state that has its own breach
notification requirement, the Entity may provide notice under that state’s law
or under Texas’s law.
Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, the number of affected persons
exceeds 500,000, or the Entity does not have sufficient contact information,
the notice may be given by any of the following:
•

Email notice when the Entity has an email address for the affected
persons;

•

Conspicuous posting of the notice on the Entity’s Web site; or

•

Notice published in or broadcast on major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of sensitive PI that complies with the timing requirements for notice
under this section complies with this section if the Entity notifies affected
persons in accordance with that policy.
Other Key Provisions:
•

Delay for Law Enforcement. An Entity may delay providing notice
as required at the request of a law enforcement agency that
determines that the notification will impede a criminal investigation.
The required notification shall be made as soon as the law
enforcement agency determines that the required notice will not
compromise the investigation.

- 125 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

AG Enforcement. Remedies include injunctive relief and civil
penalties of at least $2,000 but not more than $50,000 for each
violation.

• Civil penalties for failure to comply with notification requirements
are raised to up to $100 per person to whom notification is due,
per day, not to exceed $250,000 per breach.

- 126 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Utah

Application. Any Entity who owns or licenses computerized data that
includes PI concerning a UT resident.

Utah Code §§ 13-44-101, 1344-202, 13-44-301

Security Breach Definition. Unauthorized acquisition of computerized data
maintained by an Entity that compromises the security, confidentiality, or
integrity of PI.

S.B. 69 (signed into law March
20, 2006, Session Law Chapter
343)
Effective January 1, 2007
S.B. 208 (signed into law
March 30, 2009)

•

Does not include the acquisition of PI by an employee or agent of the
Entity possessing unencrypted computerized data unless the PI is
used for an unlawful purpose or disclosed in an unauthorized manner.

Notification Obligation. If investigation reveals that the misuse of PI for
identity theft or fraud has occurred, or is reasonably likely to occur, the person
shall provide notification to each affected UT resident.
•

Effective May 12, 2009

Notification is not required if after a good-faith, reasonable and
prompt investigation the Entity determines that it is unlikely that PI
has been or will be misused for identity theft or fraud.

Third-Party Data Notification. An Entity that maintains computerized data
that includes PI that the Entity does not own or license shall notify and
cooperate with the owner or licensee of the information of any breach of
system security immediately following the Entity’s discovery of the breach if
misuse of the PI occurs or is reasonably likely to occur.
Timing of Notification. Notification shall be provided in the most expedient
time possible without unreasonable delay, after determining the scope of the
breach of system security and after restoring the reasonable integrity of the
system.
Personal Information Definition. A person’s first name or first initial and last
name, combined with any one or more of the following data elements relating
to that person when either the name or data element is unencrypted or not
protected by another method that renders the data unreadable or unusable:
•

Social Security Number;

•

Driver license number or state identification card number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to the person’s account.

PI does not include information regardless of its source, contained in federal,
state, or local government records or in widely distributed media that are
lawfully made available to the general public.
Notice Required. Notice may be provided by one of the following methods:
•

In writing by first-class mail to the most recent address the Entity has
for the resident;

•

By telephone, including through the use of automatic dialing

- 127 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
technology not prohibited by other law;
•

Electronically, if the Entity’s primary method of communication with
the resident is by electronic means, or if provided consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act); or

•

By publishing notice of the breach of system security in a newspaper
of general circulation. Such notice must comply with Utah Code § 451-101.

Substitute Notice. Substitute notice is not available in UT.
Exception: Own Notification Policy. If an Entity maintains its own
notification procedures as part of an information security policy for the
treatment of PI the Entity is considered to be in compliance with this chapter’s
notification requirements if the procedures are otherwise consistent with this
chapter’s timing requirements and the Entity notifies each affected UT
resident in accordance with the Entity’s information security policy in the event
of a breach.
Exception: Compliance with Other Laws. An Entity who is regulated by
state or federal law and maintains procedures for a breach of system security
under applicable law established by the primary state or federal regulator is
considered to be in compliance with this part if the Entity notifies each
affected UT resident in accordance with the other applicable law in the event
of a breach.
Penalties. Violators are subject to a civil fine of no more than $2,500 for a
violation or series of violations concerning a specific consumer and no more
than $100,000 in the aggregate for related violations concerning more than
one consumer.
Other Key Provisions:
•

Delay for Law Enforcement. An Entity may delay providing
notification at the request of a law enforcement agency that
determines that notification may impede a criminal investigation.
Notification shall be provided in good faith, without unreasonable
delay, and in the most expedient time possible after the law
enforcement agency informs the person that notification will no longer
impede the criminal investigation.

•

AG Enforcement.

•

Waiver Not Permitted.

- 128 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Vermont
9 V.S.A. §§ 2430, 2435
S. 284 (signed into law May 18,
2006, Act 162). Amended by
H. 254 (signed into law May 8,
2012, Act 109).
Effective May 8, 2012.
H. 513 (signed into law May
13, 2013)

Application. Any data collector, including, but not limited to, the state, state
agencies, political subdivisions of the state, public and private universities,
privately and publicly held corporations, limited liability companies, financial
institutions, retail operators, and any other entity that, for any purpose,
whether by automated collection or otherwise, handles, collects,
disseminates, or otherwise deals with nonpublic PI (Entity), that owns or
licenses computerized PI that includes PI concerning an individual residing in
VT.
Security Breach Definition. Unauthorized acquisition of electronic data or a
reasonable belief of such unauthorized acquisition that compromises the
security, confidentiality, or integrity of PI maintained by an Entity.
•

Effective May 13, 2013

Does not include good-faith but unauthorized acquisition or access of
PI by an employee or agent of the Entity for a legitimate purpose of
the Entity, provided that the PI is not used for a purpose unrelated to
the Entity’s business or subject to further unauthorized disclosure.

To determine whether this definition applies, any Entity may consider the
following factors (among others):
•

Indications that the information is in the physical possession and
control of a person without valid authorization, such as a lost or stolen
computer or other device containing information;
• Indications that the information has been downloaded or copied;
• Indications that the information was used by an unauthorized person,
such as fraudulent accounts opened or instances of identity theft
reported; or
• That the information has been made public.
Notification Obligation. An Entity shall notify affected individuals residing in
VT that there has been a security breach following discovery or notification to
the Entity of the breach.
•

Notice of a security breach is not required if the Entity establishes that
misuse of PI is not reasonably possible and the Entity provides notice
of the determination that the misuse of the PI is not reasonably
possible and a detailed explanation for said determination to the VT
AG or to the Department of Banking, Insurance, Securities, and
Health Care Administration in the event that the Entity is a person or
entity licensed or registered with the Department.

Notification to Consumer Reporting Agencies. In the event an Entity is
required to provide notice to more than 1,000 residents of VT at one time, the
Entity shall notify, without unreasonable delay, all consumer reporting
agencies that compile and maintain files on consumers on a nationwide basis
of the timing, distribution, and content of the notice. This subsection shall not
apply to a person who is licensed or registered under Title 8 by the
department of banking, insurance, securities, and health care administration.
Attorney General/Agency Notification. An Entity shall notify the AG or
- 129 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
Department of Financial Regulation of any breach within 14 days of the date
the Entity discovers the breach or the date the Entity provides notice to
consumers, whichever is sooner.
Any Entity that has, prior to the breach, sworn in writing on a form and in a
manner prescribed by the AG that the Entity maintains written policies and
procedures to maintain the security of PI and respond to breaches in a
manner consistent with state law shall notify the AG before providing notice to
consumers. Notice to the AG shall contain the date the breach occurred, the
date the breach was discovered, and a description of the breach. If the date
of the breach is unknown, then the Entity shall send notice to the AG or the
Department as soon as the date becomes known.
If an Entity provides notice of the breach to consumers, the Entity shall notify
the AG or the Department of the number of Vermont affected, if known, and
shall provide a copy of the notice that was provided to consumers. An Entity
may also send the AG or Department a second copy of the notice to
consumers that redacts the type of PI breached for any public disclosure of
the breach.
Third-Party Data Notification. Any Entity that maintains or possesses
computerized data containing PI of an individual residing in VT that the Entity
does not own or license or any Entity that conducts business in VT that
maintains or possesses records or data containing PI that the Entity does not
own or license shall notify the owner or licensee of the information of any
security breach immediately following discovery of the breach, consistent with
the legitimate needs of law enforcement.
Timing of Notification. Notice of the breach shall be made in the most
expedient time possible and without unreasonable delay, but not later than 45
days after the discovery of the breach, consistent with any measures
necessary to determine the scope of the breach and restore the reasonable
integrity, security, and confidentiality of the data system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when either the name or the data elements are not encrypted or redacted or
protected by another method that renders them unreadable or unusable by
unauthorized persons:
•

Social Security Number;

•

Motor vehicle operator’s license number or nondriver identification
card number;

•

Account number or credit card number or debit card number if
circumstances exist in which the number could be used without
additional identifying information, access codes, or passwords; or

•

Account passwords or personal identification numbers or other
access codes for a financial account.

- 130 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

PI does not mean publicly available information that is lawfully made available
to the general public from federal, state, or local government records.
Notice Required. The notice to a consumer shall be clear and conspicuous
and include a description of each of the following, if known to the Entity:
•

The incident in general terms;

•

The type of PI that was subject to the security breach;

•

The general acts of the Entity to protect the PI from further security
breach;

•

A telephone number (toll-free, if available) that the consumer may call
for further information and assistance;

•

Advice that directs the consumer to remain vigilant by reviewing
account statements and monitoring free credit reports; and

•

The approximate date of the security breach.

Notice may be provided by one of the following methods:
•

Written notice mailed to the individual’s residence;

•

Telephonic notice, provided that telephonic contact is made directly
with each affected resident of VT, and the telephonic contact is not
through a prerecorded message; or

•

Electronic notice, for those individuals for whom the Entity has a valid
e-mail address if: (i) the Entity does not have the individual’s address
or telephone contact information, the Entity’s primary method of
communication with the individual is by electronic means, the
electronic notice does not request or contain a hypertext link to a
request that the individual provide PI, and the electronic notice
conspicuously warns individuals not to provide PI in response to
electronic communications regarding security breaches; or (ii) the
notice provided is consistent with the provisions regarding electronic
records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing written or telephonic notice to affected residents would exceed
$5,000, or that the affected class of affected residents to be provided written
or telephonic notice exceeds 5,000, or the Entity does not have sufficient
contact information. Substitute notice shall consist of all of the following:
•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide and regional media.

Exception: Compliance with Other Laws.

- 131 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

A financial institution that is subject to the following guidance, and any
revisions, additions, or substitutions relating to said interagency
guidance shall be exempt from this section: (i) The Federal
Interagency Guidance Response Programs for Unauthorized Access
to Consumer Information and Customer Notice, issued on March 7,
2005, by the Board of Governors of the Federal Reserve System, the
Federal Deposit Insurance Corporation, the Office of the Comptroller
of the Currency, and the Office of Thrift Supervision; or (ii) Final
Guidance on Response Programs for Unauthorized Access to
Member Information and Member Notice, issued on April 14, 2005, by
the National Credit Union Administration.

Other Key Provisions:
•

Delay for Law Enforcement. The required notice to a consumer
shall be delayed upon request of a law enforcement agency. A law
enforcement agency may request the delay if it believes that
notification may impede a law enforcement investigation, or a national
or homeland security investigation, or jeopardize public safety or
national or homeland security interests. In the event law enforcement
makes the request in a manner other than in writing, the Entity shall
document such request contemporaneously in writing, including the
name of the law enforcement officer making the request and the
officer’s law enforcement agency engaged in the investigation. The
Entity shall provide the required notice without unreasonable delay
upon receipt of a written communication, which includes facsimile or
electronic communication, from the law enforcement agency
withdrawing its request for delay.

•

AG Enforcement.

•

Waiver Not Permitted.

- 132 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Virginia
Va. Code § 18.2-186.6
(effective July 1, 2008), § 32.1127.1:05 (effective January 1,
2011)

Application. An individual, corporation, business trust, estate, partnership,
limited partnership, limited liability partnership, limited liability company,
association, organization, joint venture, government, governmental
subdivision, agency, or instrumentality or any other legal entity, whether for
profit or not for profit (collectively, Entity) that owns or licenses computerized
data that includes PI.
•

A separate provision covering health information applies only to
government entities, defined as any authority, board, bureau,
commission, district or agency of the Commonwealth or of any
political subdivision of the Commonwealth, including cities, towns and
counties, municipal councils, governing bodies of counties, school
boards and planning commissions; boards of visitors of public
institutions of higher education; and other organizations, corporations,
or agencies in VA supported wholly or principally by public funds.

Security Breach Definition. Unauthorized access and acquisition of
unencrypted and unredacted computerized data that compromises the
security or confidentiality of PI maintained by an Entity as part of a database
of PI regarding multiple individuals and that causes, or the Entity reasonably
believes has caused, or will cause, identity theft or other fraud to any resident
of VA.
•

Good-faith acquisition of PI by an employee or agent of an Entity for
the purposes of the Entity is not a breach of the security of the
system, provided that the PI is not used for a purpose other than a
lawful purpose of the individual or entity or subject to further
unauthorized disclosure.

Notification Obligation. If unencrypted or unredacted PI was or is
reasonably believed to have been accessed and acquired by an unauthorized
person and causes, or the Entity reasonably believes has caused or will
cause, identity theft or another fraud to any resident of VA, an Entity to which
the statute applies shall disclose any breach of the security of the system
following discovery or notification of the breach of the security of the system
to any affected resident of VA.
•

An Entity shall disclose the breach of the security of the system if
encrypted information is accessed and acquired in an unencrypted
form, or if the security breach involves a person with access to the
encryption key and the Entity reasonably believes that such a breach
has caused or will cause identity theft or other fraud to any resident of
VA.

•

For health information, the Entity must notify both the subject of the
medical information and any affected resident of the VA, if those are
not the same person.

Notification to Consumer Reporting Agencies. In the event an Entity
provides notice to more than 1,000 persons at one time pursuant to the
- 133 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
general security breach section, the Entity shall notify, without unreasonable
delay, all consumer reporting agencies that compile and maintain files on
consumers on a nationwide basis, as defined in 15 U.S.C. Section 1682(a)(p),
of the timing, distribution, and content of the notice.
Attorney General/Agency Notification. The state AG must be notified
whenever any VA residents are notified under the criteria above. In the event
an Entity provides notice to more than 1,000 persons at one time pursuant to
this section, the individual or entity shall notify, without unreasonable delay,
the state AG of the timing, distribution, and content of the notice. For health
information, the Entity must also notify the Commissioner of Health.
Third-Party Data Notification. An Entity that maintains computerized data
that includes PI that the Entity does not own or license shall notify the owner
or licensee of the information of any breach of the security of the system
without unreasonable delay following discovery of the breach of the security
of the system, if the PI was accessed and acquired by an unauthorized
person or the Entity reasonably believes the PI was accessed and acquired
by an unauthorized person.
Timing of Notification. Notice required by the statute shall be made without
unreasonable delay. Notice may be reasonably delayed to allow individual or
entity to determine scope of the breach of security and restore the reasonable
integrity of the system.
Personal Information Definition. The first name or first initial and last name
in combination with and linked to any one or more of the following data
elements that relate to a resident of VA, when the data elements are neither
encrypted nor redacted:
•

Social Security Number;

•

Driver license number or state identification card number issued in
lieu of a driver license number; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to a resident’s financial accounts.

The health information breach law applies to the first name or first initial and
last name with any of the following elements:
•

Any information regarding an individual’s medical or mental health
history, mental or physical condition, or medical treatment or
diagnosis by a health care professional; or

•

An individual’s health insurance policy number or subscriber
identification number, any unique identifier used by a health insurer to
identify the individual, or any information in an individual’s application
and claims history, including any appeals records.

PI does not include information that is lawfully obtained from publicly available

- 134 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
information, or from federal, state, or local government records lawfully made
available to the general public.
Notice Required. Notice shall include a description of the following:
•

The incident in general terms;

•

The type of PI or medical information that was subject to the
unauthorized access and acquisition;

•

The general acts of the individual or entity to protect the PI from
further unauthorized access;

•

A telephone number that the person may call for further information
and assistance, if one exists; and

•

Advice that directs the person to remain vigilant by reviewing account
statements and monitoring free credit reports.

Notice means:
•

Written notice to the last known postal address in the records of the
individual or entity;

•

Telephone notice; or

•

Electronic notice.

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice will exceed $50,000, the affected class of VA residents to be
notified exceeds 100,000 residents, or the individual or the entity does not
have sufficient contact information or consent to provide written, electronic or
telephonic notice. Substitute notice consists of all of the following:
•

E-mail notice if the individual or the entity has e-mail addresses for
the members of the affected class of residents;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notice to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information privacy or security policy for
the treatment of PI that are consistent with the timing requirements of this
section shall be deemed to be in compliance with the notification
requirements of this section if it notifies residents of VA in accordance with its
procedures in the event of a breach of the security of the system.
Exception: Compliance with Other Laws.
•

Gramm-Leach-Bliley Act. An entity that is subject to Title V of the
Gramm-Leach-Bliley Act and maintains procedures for notification of
a breach of the security of the system in accordance with the

- 135 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
provision of that Act and any rules, regulations, or guidelines
promulgated thereto shall be deemed to be in compliance with this
section.
•

Primary Regulator. An entity that complies with the notification
requirements or procedures pursuant to the rules, regulations,
procedures, or guidelines established by the entity’s primary or
functional state or federal regulator shall be in compliance with this
section.

•

HIPAA-Covered Entities. The notification requirements for incidents
involving medical information do not apply to (i) a “covered entity” or
“business associate” subject to requirements for notification in the
case of a breach of protected health information (42 U.S.C. § 17932
et seq.) or (ii) a person or entity who is a non-HIPAA-covered entity
subject to the Health Breach Notification Rule promulgated by the
Federal Trade Commission pursuant to 42 U.S.C. § 17937 et seq.

Penalties. The state AG may impose a civil penalty not to exceed $150,000
per breach of the security of the system or a series of breaches of a similar
nature that are discovered in a single investigation. (This provision does not
apply to health information breaches.)
Other Key Provisions:
•

Delay for Law Enforcement. Notice required by this section may be
delayed if, after the Entity notifies a law enforcement agency, the law
enforcement agency determines and advises the Entity that the notice
will impede a criminal or civil investigation, or homeland or national
security. Notice shall be made without unreasonable delay after the
law enforcement agency determines that the notification will no longer
impede the investigation or jeopardize national or homeland security.

•

AG Enforcement.

- 136 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Washington
Wash. Rev. Code § 19.255.010
et seq.
S.B. 6043 (signed into law May
10, 2005, Chapter 368)

Application. Any state or local agency or any person or business which
conducts business in WA (collectively, Entity) that owns or licenses
computerized data that includes PI.
Security Breach Definition. Unauthorized acquisition of computerized data
that compromises the security, confidentiality, or integrity of PI maintained by
the Entity.
•

Effective July 24, 2005
H.B. 1149 (signed into law
March 22, 2010) requiring
reimbursement from payment
processors, businesses, and
vendors to financial institutions
for the cost of replacing credit
and debit cards after a breach
Effective July 1, 2010

Good-faith acquisition of PI by an employee or agent of the Entity for
the purposes of the Entity is not a breach of the security of the system
when the PI is not used or subject to further unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall
disclose any breach of the security of the system following discovery or
notification of the breach in the security of the data to any resident of WA
whose unencrypted PI was, or is reasonably believed to have been, acquired
by an unauthorized person.
•

An Entity shall not be required to disclose a technical breach of the
security system that does not seem reasonably likely to subject
customers to a risk of criminal activity.

Third-Party Data Notification. Any Entity that maintains computerized data
that includes PI that the Entity does not own shall notify the owner or licensee
of the information of any breach immediately following discovery, if the PI
was, or is reasonably believed to have been, acquired by an unauthorized
person.
Timing of Notification. The disclosure shall be made in the most expedient
time possible and without unreasonable delay, consistent with the legitimate
needs of law enforcement or any measures necessary to determine the scope
of the breach and restore the reasonable integrity of the data system.
Personal Information Definition. An individual’s first name or first initial and
last name in combination with any one or more of the following data elements,
when either the name or the data elements are not encrypted:
•

Social Security Number;

•

Driver license number or Washington identification card number;

•

Account number or credit card number or debit card number in
combination with any required security code, access code, or
password that would permit access to an individual’s financial
account.

PI does not include publicly available information that is lawfully made
available to the general public from federal, state, or local government
records.
Notice Required. Notice may be provided by the following methods:

- 137 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Written notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $250,000, or that the affected class of subject
persons to be notified exceeds 500,000, or the Entity does not have sufficient
contact information. Substitute notice shall consist of all of the following:
•

Email notice when the Entity has an email address for the subject
persons;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; and

•

Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information security policy for the
treatment of PI and is otherwise consistent with the timing requirements of
this section is in compliance with the notification requirements of this section if
the Entity notifies subject persons in accordance with its policies in the event
of a breach of security.
Other Key Provisions:
•

Delay for Law Enforcement. Notification may be delayed if a law
enforcement agency determines that the notification will impede a
criminal investigation. The required notification shall be made after
the law enforcement agency determines that it will not compromise
the investigation.

•

Private Right of Action. Any customer injured by a violation of this
section may institute a civil action to recover damages.

•

Waiver Not Permitted.

Reimbursement from Businesses to Financial Institutions. In the event of
a breach where an entity held unencrypted account information or was not
PCI DSS compliant, payment processors, businesses, and vendors can be
liable to a financial institution for the cost of reissuing credit and debit cards in
the event of a breach that results in the disclosure of the full, unencrypted
account information contained on an identification device, or the full,
unencrypted account number on a credit or debit card or identification device
plus the cardholder’s name, expiration date, or service code.

- 138 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

West Virginia
W. VA. Code § 46A-2A-101
et seq.
S.B. 340 (signed into law
March 27, 2008)
Effective June 6, 2008

Application. An individual, corporation, business trust, estate, partnership,
limited partnership, limited liability partnership, limited liability company,
association, organization, joint venture, government, governmental
subdivision, agency or instrumentality, or any other legal entity, whether for
profit or not for profit, (collectively, Entity) that owns or licenses computerized
data that includes PI.
Security Breach Definition. Unauthorized access and acquisition of
unencrypted and unredacted computerized data that compromises the
security or confidentiality of PI maintained by an Entity as part of a database
of PI regarding multiple individuals and that causes the Entity to reasonably
believe that the breach of security has caused or will cause identity theft or
other fraud to any resident of WV.
•

Good-faith acquisition of PI by an employee or agent of an Entity for
the purposes of the Entity is not a breach of the security of the
system, provided that the PI is not used for a purpose other than a
lawful purpose of the Entity or subject to further unauthorized
disclosure.

Notification Obligation. Any Entity to which the statute applies shall give
notice of any breach of the security of the system following discovery or
notification of the breach of the security of the system to any resident of WV
whose unencrypted and unredacted PI was or is reasonably believed to have
been accessed and acquired by an unauthorized person and that causes, or
the individual or entity reasonably believes has caused or will cause, identity
theft or other fraud to any resident of WV.
•

An Entity must give notice of the breach of the security of the system
if encrypted information is accessed and acquired in an unencrypted
form or if the security breach involves a person with access to the
encryption key and the Entity reasonably believes that such breach
has caused or will cause identity theft or other fraud to any resident of
this state.

Notification to Consumer Reporting Agencies. If an Entity is required to
notify more than 1,000 persons of a breach of security pursuant to this article,
the Entity shall also notify, without unreasonable delay, all consumer reporting
agencies that compile and maintain files on a nationwide basis of the timing,
distribution and content of the notices. Nothing in this subsection shall be
construed to require the entity to provide to the consumer reporting agency
the names or other PI of breach notice recipients.
Third-Party Data Notification. An Entity that maintains computerized data
that includes PI that the Entity does not own or license shall give notice to the
owner or licensee of the information of any breach of the security of the
system as soon as practicable following discovery, if the PI was or the Entity
reasonably believes was accessed and acquired by an unauthorized person.
Timing of Notification. Except in order to take any measures necessary to

- 139 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
determine the scope of the breach and to restore the reasonable integrity of
the system, the notice shall be made without unreasonable delay.
Personal Information Definition. The first name or first initial and last name
linked to any one or more of the following data elements that relate to a
resident of WV, when the data elements are neither encrypted nor redacted:
•

Social Security Number;

•

Driver license number or state identification card number issued in
lieu of a driver license; or

•

Account number or credit card number or debit card number in
combination with any required security code, access code or
password that would permit access to a resident’s financial accounts.

PI does not include information that is lawfully obtained from publicly available
information, or from federal, state or local government records lawfully made
available to the general public.
Notice Required. The notice shall include:
•

To the extent possible, a description of the categories of information
that were reasonably believed to have been accessed or acquired by
an unauthorized person, including Social Security Numbers, driver
licenses or state identification numbers and financial data;

•

A telephone number or Web site address that the individual may use
to contact the entity or the agent of the entity and from whom the
individual may learn: what types of information the entity maintained
about that individual or about individuals in general; and whether or
not the entity maintained information about that individual; and

•

The toll-free contact telephone numbers and addresses for the major
credit reporting agencies and information on how to place a fraud
alert or security freeze.

Notice may be provided by one of the following methods:
•

Written notice to the postal address in the records of the Entity;

•

Telephonic notice; or

•

Electronic notice, if the notice provided is consistent with the
provisions regarding electronic records and signatures set forth in 15
U.S.C. § 7001 (E-SIGN Act).

Substitute Notice Available. If an Entity demonstrates that the cost of
providing notice will exceed $50,000, or that the affected class of residents to
be notified exceeds 100,000 persons, or that the Entity does not have
sufficient contact information to provide notice. Substitute notice consists of
any two of the following:

- 140 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

E-mail notice if the Entity has e-mail addresses for the members of
the affected class of residents;

•

Conspicuous posting of the notice on the Entity’s Web site if the
Entity maintains one; or

•

Notice to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own
notification procedures as part of an information privacy or security policy for
the treatment of PI and that are consistent with the timing requirements of this
article shall be deemed to be in compliance with the notification requirements
of this article if it notifies residents of WV in accordance with its procedures in
the event of a breach of security of the system.
Exception: Compliance with Other Laws.
•

Federal Interagency Guidance. A financial institution that responds
in accordance with the notification guidelines prescribed by the
Federal Interagency Guidance on Response Programs for
Unauthorized Access to Customer Information and Customer Notice
is deemed to be in compliance with this article.

•

Primary Regulator. An Entity that complies with the notification
requirements or procedures pursuant to the rules, regulation,
procedures or guidelines established by the Entity’s primary or
functional regulator shall be in compliance with this article.

Other Key Provisions:
•

Delay for Law Enforcement. Notice required by this section may be
delayed if a law-enforcement agency determines and advises the
Entity that the notice will impede a criminal or civil investigation or
homeland or national security. Notice required by this section must be
made without unreasonable delay after the law-enforcement agency
determines that notification will no longer impede the investigation or
jeopardize national or homeland security.

•

AG Enforcement.

•

This subsection shall not apply to an entity subject to Title V of the
Gramm-Leach-Bliley Act.

- 141 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Wisconsin
Wis. Stat. § 134.98
S.B. 164 (signed into law
March 16, 2006, Act 138)
Effective March 31, 2006

Application. Any Entity that maintains or licenses PI in WI or that knows that
PI pertaining to a resident of WI has been acquired by a person whom the
Entity has not authorized to acquire the PI. Entity includes: the state of WI and
any office, department, independent agency, authority, institution, association,
society, or other body in state government created or authorized to be created
by the constitution or any law, including the legislature and the courts; a city,
village, town, or county; a person, other than an individual, that does any of
the following:
•

Conducts business in WI and maintains PI in the ordinary course of
business;

•

Licenses PI in WI;

•

Maintains for a resident of WI a depository account;

•

Lends money to a resident of WI.

Security Breach Definition. When an Entity whose principal place of
business is located in WI or an Entity that maintains or licenses PI in WI
knows that PI in the Entity’s possession has been acquired by a person whom
the Entity has not authorized to acquire the PI, or, in the case of an Entity
whose principal place of business is not located in WI, when it knows that PI
pertaining to a resident of WI has been acquired by a person whom the Entity
has not authorized to acquire the PI.
Notification Obligation. Any Entity to which the statute applies shall make
reasonable efforts to notify each subject of the PI.
•

An Entity is not required to provide notice of the acquisition of PI if the
acquisition of PI does not create a material risk of identity theft or
fraud to the subject of the PI or if the PI was acquired in good faith by
an employee or agent of the Entity, if the PI is used for a lawful
purpose of the Entity.

Notification to Consumer Reporting Agencies. If, as the result of a single
incident, an Entity is required to notify 1,000 or more individuals that PI
pertaining to the individuals has been acquired, the Entity shall without
unreasonable delay notify all consumer reporting agencies that compile and
maintain files on consumers on a nationwide basis, of the timing, distribution,
and content of the notices sent to the individuals.
Third-Party Data Notification. If a person, other than an individual, that
stores PI pertaining to a resident of WI, but does not own or license the PI,
knows that the PI has been acquired by a person whom the person storing
the PI has not authorized to acquire the PI, and the person storing the PI has
not entered into a contract with the person that owns or licenses the PI, the
person storing the PI shall notify the person that owns or licenses the PI of the
acquisition as soon as practicable.
Timing of Notification. An Entity shall provide the notice within a reasonable

- 142 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
time, not to exceed 45 days after the Entity learns of the acquisition of PI. A
determination as to reasonableness shall include consideration of the number
of notices that an Entity must provide and the methods of communication
available to the Entity.
Personal Information Definition. An individual’s last name and the
individual’s first name or first initial, in combination with and linked to any of
the following elements, if the element is not publicly available information and
is not encrypted, redacted, or altered in a manner that renders the element
unreadable:
•

Social Security Number;

•

Driver license number or state identification number;

•

Account number or credit card number or debit card number or any
security code, access code, or password that would permit access to
the individual’s financial account;

•

DNA profile; or

•

Unique biometric data, including fingerprint, voice print, retina or iris
image, or any other unique physical representation.

An element is publicly available if the Entity reasonably believes that it was
lawfully made widely available through any media or lawfully made available
to the general public from federal, state, or local government records or
disclosures to the general public that are required to be made by federal,
state, or local law.
Notice Required. The notice shall indicate that the Entity knows of the
unauthorized acquisition of PI pertaining to the resident of WI who is the
subject of the PI. Notice may be provided by one of the following methods:
•

Mail; or

•

A method the Entity has previously employed to communicate with
the subject of the PI.

Substitute Notice Available. If an Entity cannot with reasonable diligence
determine the mailing address of the subject of the PI, and if the Entity has
not previously communicated with the subject of the PI, the Entity shall
provide notice by a method reasonably calculated to provide actual notice to
the subject of the PI.
Exception: Compliance with Other Laws.
•

Gramm-Leach-Bliley Act. An Entity that is subject to, and in
compliance with, the privacy and security requirements of Title V of
the Gramm-Leach-Bliley Act, or a person that has a contractual
obligation to such an Entity, if the Entity or person has in effect a
policy concerning breaches of information security.

- 143 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

HIPAA-Covered Entities. A health plan, health care clearinghouse,
or health care provider who transmits any health information in
electronic form, if the Entity complies with the requirements of 45
C.F.R. pt. 164.

Other Key Provisions:
•

Delay for Law Enforcement. A law enforcement agency may, in
order to protect an investigation or homeland security, ask an Entity
not to provide a required notice for any period of time. If an Entity
receives such a request, the Entity may not provide notice of or
publicize an unauthorized acquisition of PI, except as authorized by
the law enforcement agency that made the request.

- 144 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013

Wyoming
Wyo. Stat. § 40-12-501 et seq.
Effective July 1, 2007

Application. An individual or commercial entity (collectively, Entity) that
conducts business in WY and that owns or licenses computerized data that
includes PI about a resident of WY.
Security Breach Definition. Unauthorized acquisition of computerized data
that materially compromises the security, confidentiality or integrity of PI
maintained by an Entity and causes or is reasonably believed to cause loss or
injury to a resident of WY.
•

Good-faith acquisition of PI by an employee or agent of an Entity for
the purposes of the Entity is not a breach of the security of the data
system, provided that the PI is not used or subject to further
unauthorized disclosure.

Notification Obligation. Any Entity to which the statute applies shall, when it
becomes aware of a breach of the security of the system, conduct in good
faith a reasonable and prompt investigation to determine the likelihood that PI
has been or will be misused. If the investigation determines that the misuse of
PI about a WY resident has occurred or is reasonably likely to occur, the
Entity shall give notice as soon as possible to the affected WY resident.
Third-Party Data Notification. An Entity that maintains computerized data
that includes PI on behalf of another Entity shall disclose to the Entity for
which the information is maintained any breach of the security of the system
as soon as practicable following the determination that PI was, or is
reasonably believed to have been, acquired by an unauthorized person.
The Entity that maintains the data on behalf of another Entity and Entity on
whose behalf the data is maintained may agree which Entity will provide any
required notice, provided only a single notice for each breach of the security
of the system shall be required. If agreement regarding notification cannot be
reached, the Entity who has the direct business relationship with the resident
of WY shall provide the required notice.
Timing of Notification. Notice shall be made in the most expedient time
possible and without unreasonable delay, consistent with any measures
necessary to determine the scope of the breach and to restore the reasonable
integrity of the computerized data system.
Personal Information Definition. The first name or first initial and last name
of a person in combination with one or more of the following data elements
when either the name or the data elements are not redacted:
•

Social Security Number;

•

Driver license number or WY identification card number;

•

Account number or credit card number or debit card number in
combination with any security code, access code or password that
would allow access to a financial account of the person;

- 145 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
•

Tribal identification card; or

•

Federal or state government-issued identification card.

PI does not include information, regardless of its source, contained in any
federal, state or local government records or in widely distributed media that
are lawfully made available to the general public.
Notice Required. Notice shall include a toll-free number that the individual
may use to contact the person collecting the data, or his agent; and from
which the individual may learn the toll-free contact telephone numbers and
addresses for the major credit reporting agencies.
Notice may be provided by one of the following methods:
•

Written notice; or

•

Electronic mail notice.

Substitute Notice Available. If the Entity demonstrates that the cost of
providing notice would exceed $10,000 for WY-based Entities, and $250,000
for all other Entities operating but not based in Wyoming; that the affected
class of subject persons to be notified exceeds 10,000 for WY-based Entities
and 500,000 for all other businesses operating but not based in WY; or the
person does not have sufficient contact information. Substitute notice shall
consist of all of the following:
•

Conspicuous posting of the notice on the Internet, the World Wide
Web or a similar proprietary or common carrier electronic system site
of the person collecting the data, if the person maintains a public
Internet, World Wide Web or a similar proprietary or common carrier
electronic system site; and

•

Notification to major statewide media. The notice to media shall
include a toll-free phone number where an individual can learn
whether or not that individual’s personal data is included in the
security breach.

Exception: Compliance with Other Laws.
•

Certain Financial Institutions. Any financial institution as defined in
15 U.S.C. § 6809 or federal credit union as defined by 12 U.S.C.
§ 1752 that maintains notification procedures subject to the
requirements of 15 U.S.C. § 6801(b)(3) and 12 C.F.R. pt. 364 App. B
or pt. 748 App. B, is deemed to be in compliance with the statute if
the financial institution notifies affected WY customers in compliance
with the requirements of 15 U.S.C. § 6801 through 6809 and 12
C.F.R. pt. 364 App. B or pt. 748 App. B.

Other Key Provisions:
•

Delay for Law Enforcement. The notification required by the statute
- 146 -

This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24
Revised October 2013
may be delayed if a law enforcement agency determines in writing
that the notification may seriously impede a criminal investigation.
•

AG Enforcement. The state AG may bring an action in law or equity
to address any violation of this section and for other relief that may be
appropriate to ensure proper compliance with this section, to recover
damages, or both.

- 147 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts.
The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at
http://www.perkinscoie.com/privacy_security.

LEGAL13997061.24

More Related Content

PPT
CSI 2008, Legal Developments In Security and Privacy Law
PPT
IIAC Young Agents - Protecting Your Insureds\' Private Information
PPTX
HIPAA Privacy, Security, Breach Overview
PDF
Key Insights from the 2019 Legal Trends Report
PDF
How can you improve cybersecurity at your law firm?
PPTX
HITECH-Changes-to-HIPAA
PDF
Privacy and Information Security: What Every New Business Needs to Know
PPTX
Privacy update 04.29.2010
CSI 2008, Legal Developments In Security and Privacy Law
IIAC Young Agents - Protecting Your Insureds\' Private Information
HIPAA Privacy, Security, Breach Overview
Key Insights from the 2019 Legal Trends Report
How can you improve cybersecurity at your law firm?
HITECH-Changes-to-HIPAA
Privacy and Information Security: What Every New Business Needs to Know
Privacy update 04.29.2010

What's hot (20)

PDF
India's Data Protection Law 2018- Future Road Ahead
PPTX
CSMFO 2012 Data Privacy in Local Government
PDF
News berthaume-sentencing-jan2017
PPTX
Data Privacy Act in the Philippines
PPTX
Privacy and Data Protection CLE Presentation for Touro Law Center
PPTX
Texas Privacy Laws - Tough New Changes
PPTX
Hitech changes-to-hipaa
PDF
LS IDT 2014
PDF
What You Need To Know About Privacy - Now!
PDF
What You Need to Know About Privacy
PPT
What You Need To Know About Privacy Now!
PDF
Ethics for Lawyers, Accountants, and CTFAs - May 2018
PPT
Crash Course on Data Privacy (December 2012)
DOCX
Right to information act
PPT
Privacy and Data Security: Risk Management and Avoidance
PPT
Data protection in_india
PPTX
Whistleblowers on Wall Street: A Guide to SEC Whistleblower Rewards and Prote...
PDF
Data privacy act of 2012 presentation
PDF
Philippine Data Privacy Act of 2012 (RA 10173)
PDF
Data Privacy - Security of Personal Information
India's Data Protection Law 2018- Future Road Ahead
CSMFO 2012 Data Privacy in Local Government
News berthaume-sentencing-jan2017
Data Privacy Act in the Philippines
Privacy and Data Protection CLE Presentation for Touro Law Center
Texas Privacy Laws - Tough New Changes
Hitech changes-to-hipaa
LS IDT 2014
What You Need To Know About Privacy - Now!
What You Need to Know About Privacy
What You Need To Know About Privacy Now!
Ethics for Lawyers, Accountants, and CTFAs - May 2018
Crash Course on Data Privacy (December 2012)
Right to information act
Privacy and Data Security: Risk Management and Avoidance
Data protection in_india
Whistleblowers on Wall Street: A Guide to SEC Whistleblower Rewards and Prote...
Data privacy act of 2012 presentation
Philippine Data Privacy Act of 2012 (RA 10173)
Data Privacy - Security of Personal Information
Ad

Viewers also liked (6)

PDF
First Response to Victims of Crime: A Guidebook for Law Enforcement
PDF
Securing & Optimizing Linux the Hacking Solution (v.3.0)
PDF
Children Affected by Crime
PDF
Point of Sale Merchant Procedures
PDF
Top 5 Steps to Disaster Preparedness for Businesses
PPTX
10 Steps of Project Management in Digital Agencies
First Response to Victims of Crime: A Guidebook for Law Enforcement
Securing & Optimizing Linux the Hacking Solution (v.3.0)
Children Affected by Crime
Point of Sale Merchant Procedures
Top 5 Steps to Disaster Preparedness for Businesses
10 Steps of Project Management in Digital Agencies
Ad

Similar to SECURITY BREACH NOTIFICATION CHART 2013 (20)

PDF
Responding to a Company-Wide PII Data Breach
PPTX
Steps for breach notification
PPT
Cyber Risks
PDF
Data Breach Response Checklist
PPT
Data Risks In A Digital Age
PPT
Privacy and Data Security: Risk Management and Avoidance
PDF
Data Breach Response Checklist
PDF
Data Breaches
 
PDF
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
PPT
Data breach protection from a DB2 perspective
PPTX
DATA BREach notification of laws in health care.pptx
PDF
Axxera End Point Security Protection
PPTX
Cybersecurity Seminar March 2015
PPTX
Cyber security and fl data breach
PPT
Protecting Donor Privacy
PDF
Privacy law-update-whitmeyer-tuffin
PPT
Cyber-Security: A Shared Responsibility -- November 2013
PDF
Mandatory data breach notification for Australia
PDF
Acc 675 control audit final project
PDF
How to Build and Implement your Company's Information Security Program
Responding to a Company-Wide PII Data Breach
Steps for breach notification
Cyber Risks
Data Breach Response Checklist
Data Risks In A Digital Age
Privacy and Data Security: Risk Management and Avoidance
Data Breach Response Checklist
Data Breaches
 
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
Data breach protection from a DB2 perspective
DATA BREach notification of laws in health care.pptx
Axxera End Point Security Protection
Cybersecurity Seminar March 2015
Cyber security and fl data breach
Protecting Donor Privacy
Privacy law-update-whitmeyer-tuffin
Cyber-Security: A Shared Responsibility -- November 2013
Mandatory data breach notification for Australia
Acc 675 control audit final project
How to Build and Implement your Company's Information Security Program

More from - Mark - Fullbright (20)

PDF
ISTR Internet Security Threat Report 2019
PDF
IC3 2019 Internet Crime Report
PDF
Police, Protesters, Press, 2020
PDF
2020 Data Breach Investigations Report (DBIR)
PDF
FCPA Guidance 2020
PDF
Consumer Sentinel Network Data Book 2019
PDF
CFPB Consumer Reporting Companies 2019
PDF
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
PDF
2018 IC3 Report
PDF
2019 Data Breach Investigations Report (DBIR)
PDF
2018 Privacy & Data Security Report
PDF
Consumer Sentinel Network Data Book 2018
PDF
Credit Score Explainer
PDF
The Geography of Medical Identity Theft
PDF
Consumer Sentinel Data Book 2017
PDF
Protecting Personal Information: A Guide for Business
PDF
Data Breach Response: A Guide for Business
PDF
2017 Data Breach Investigations Report
PDF
Consumer Sentinel Network Data Book for January 2016 - December 2016
PDF
Consumer Sentinel Data Book 2015
ISTR Internet Security Threat Report 2019
IC3 2019 Internet Crime Report
Police, Protesters, Press, 2020
2020 Data Breach Investigations Report (DBIR)
FCPA Guidance 2020
Consumer Sentinel Network Data Book 2019
CFPB Consumer Reporting Companies 2019
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
2018 IC3 Report
2019 Data Breach Investigations Report (DBIR)
2018 Privacy & Data Security Report
Consumer Sentinel Network Data Book 2018
Credit Score Explainer
The Geography of Medical Identity Theft
Consumer Sentinel Data Book 2017
Protecting Personal Information: A Guide for Business
Data Breach Response: A Guide for Business
2017 Data Breach Investigations Report
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Data Book 2015

Recently uploaded (20)

PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Trump Administration's workforce development strategy
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Complications of Minimal Access-Surgery.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Share_Module_2_Power_conflict_and_negotiation.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Cambridge-Practice-Tests-for-IELTS-12.docx
Unit 4 Computer Architecture Multicore Processor.pptx
Weekly quiz Compilation Jan -July 25.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Trump Administration's workforce development strategy
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
TNA_Presentation-1-Final(SAVE)) (1).pptx
Virtual and Augmented Reality in Current Scenario
Complications of Minimal Access-Surgery.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
Introduction to pro and eukaryotes and differences.pptx
Uderstanding digital marketing and marketing stratergie for engaging the digi...

SECURITY BREACH NOTIFICATION CHART 2013

  • 1. Revised October 2013 Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes only and is intended as an aid in understanding each state’s sometimes unique security breach notification requirements. Lawyers, compliance professionals, and business owners have told us that the chart has been helpful when preparing for and responding to data breaches. We hope that you find it useful as well. Alabama* Alaska Arizona Arkansas California Colorado Connecticut Delaware District of Columbia Florida Georgia Hawaii Idaho Illinois Indiana Iowa Kansas Kentucky* Louisiana Maine Maryland Massachusetts Michigan Minnesota Mississippi Missouri Montana Nebraska Nevada New Hampshire New Jersey New Mexico* New York North Carolina North Dakota Ohio Oklahoma Oregon Pennsylvania Puerto Rico Rhode Island South Carolina South Dakota* Tennessee Texas Utah Vermont Virginia Washington West Virginia Wisconsin Wyoming * No legislation specifically pertaining to security breach notification. For entities doing business in Texas, see Texas law. This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 2. Revised October 2013 Alaska Alaska Stat. § 45.48.010 et seq. H.B. 65 (signed into law June 13, 2008, Chapter 92 SLA 08) Effective July 1, 2009 Application. Any person, state, or local governmental agency (excepting the judicial branch), or person with more than 10 employees (collectively, Entity) that owns or licenses PI in any form in AK that includes PI of an AK resident. • The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on state residents, whether or not the Entity conducts business in AK. Security Breach Definition. An unauthorized acquisition or reasonable belief of unauthorized acquisition of PI that compromises the security, confidentiality, or integrity of the PI maintained by the Entity. Acquisition includes acquisition by photocopying, facsimile, or other paper-based method; a device, including a computer, that can read, write, or store information that is represented in numerical form; or a method not identified in this paragraph. • Good-faith acquisition of PI by an employee or agent of the Entity for a legitimate purpose of the Entity is not a breach of the security of the information system if the employee or agent does not use the PI for a purpose unrelated to a legitimate purpose of the Entity and does not make further unauthorized disclosure of the PI. Notification Obligation. Any Entity to which the statute applies shall disclose the breach to each AK resident whose PI was subject to the breach after discovering or being notified of the breach. • Notification is not required if, after an appropriate investigation and after written notification to the state AG, the Entity determines that there is not a reasonable likelihood that harm to the consumers whose PI has been acquired has resulted or will result from the breach. The determination shall be documented in writing and the documentation shall be maintained for five years. Notification of Consumer Reporting Agencies. If an Entity is required to notify more than 1,000 AK residents of a breach, the Entity shall also notify without unreasonable delay all consumer credit reporting agencies that compile and maintain files on consumers on a nationwide basis and provide the agencies with the timing, distribution, and content of the notices to AK residents. Entities subject to the Gramm-Leach-Bliley Act are exempt from this requirement and are not required to notify consumer reporting agencies. Third-Party Data Notification. If a breach of the security of the information system containing PI on an AK resident that is maintained by an Entity that does not own or have the right to license the PI occurs, the Entity shall notify the Entity that owns or licensed the use of the PI about the breach and cooperate as necessary to allow the Entity that owns or licensed the use of the PI to comply with the statute. Timing of Notification. The disclosure shall be made in the most expeditious time possible and without unreasonable delay consistent with any measures necessary to determine the scope of the breach and to restore the -1This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 3. Revised October 2013 reasonable integrity of the information system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when the data element is not encrypted, redacted or is encrypted and the encryption key has been accessed or acquired: • Social Security Number; • Number on a driver license or number on a state identification; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to the individual’s financial account. PI does not include publicly available information that is lawfully made available to the general public from the federal, state, or local government. Notice Required. Notice may be provided by one of the following methods: • Written notice; • Telephonic notice; or • Electronic notice if the Entity’s primary method of communication with the AK resident is by electronic means or is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity can demonstrate that the cost of providing notice will exceed $150,000 or that the affected class of persons to be notified exceeds 300,000. Substitute notice shall consist of all of the following: • Email notice if the Entity has email addresses for the state resident subject to the notice; • Conspicuous posting of the notice on the Web site of the Entity if the Entity maintains one; and • Notification to major statewide media. Penalties. • An Entity that is a governmental agency is liable to the state for a civil penalty of up to $500 for each state resident who was not notified (the total penalty may not exceed $50,000) and may be enjoined from further violations. • An Entity that is not a governmental agency is liable to the state for a civil penalty of up to $500 for each state resident who was not notified (the total civil penalty may not exceed $50,000). -2This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 4. Revised October 2013 Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation. Notice required by the statute must be made after the law enforcement agency determines that notification will no longer impede the investigation. • Private Right of Action. A person injured by a breach may bring an action against a non-governmental Entity. • Waiver Not Permitted. -3This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 5. Revised October 2013 Arizona Ariz. Rev. Stat. § 44-7501 Application. Any person or entity (collectively, Entity) that conducts business in AZ and that owns or licenses unencrypted computerized data that includes PI. • S.B. 1338 (signed into law April 26, 2006, Chapter 232) Effective December 31, 2006 The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on state residents, whether or not the Entity conducts business in the state. Security Breach Definition. An unauthorized acquisition of and access to unencrypted or unredacted computerized data that materially compromises the security or confidentiality of PI maintained by an Entity as part of a database of PI regarding multiple individuals and that causes or is reasonably likely to cause substantial economic loss to an individual. • Good-faith acquisition of PI by an employee or agent of the Entity for the purposes of the Entity is not a breach of the security system if the PI is not used for a purpose unrelated to the Entity or subject to further willful unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall notify the individuals affected when it becomes aware of an incident of unauthorized acquisition and access to unencrypted or unredacted computerized data that includes an individual’s PI. • An Entity is not required to disclose a breach of the system if the Entity or a law enforcement agency, after a reasonable investigation, determines that a breach of the security of the system has not occurred or is not reasonably likely to occur. Third-Party Data Notification. If an Entity maintains unencrypted data that includes PI that the Entity does not own, the Entity shall notify and cooperate with the owner or the licensee of the information of any breach of the security of the system following discovery of the breach without unreasonable delay. Cooperation shall include sharing information relevant to the breach of the security of the system with the owner or licensee. The person or entity that owns or licenses the computerized data shall provide notice to the individual. The Entity that maintained the data under an agreement with the owner or licensee is not required to provide notice to the individual unless the agreement stipulates otherwise. Timing of Notification. The disclosure shall be made in the most expedient manner possible and without unreasonable delay consistent with any measures necessary to determine the nature and scope of the breach, to identify the individual affected or to restore the reasonable integrity of the data system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when the data element is not encrypted, redacted or secured by any other method rendering the element unreadable or unusable: -4This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 6. Revised October 2013 • Social Security Number; • Number on a driver license issued pursuant to § 28-3166 or number on a nonoperating identification license issued pursuant to § 28-3165; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to the individual’s financial account. PI does not include publicly available information that is lawfully made available to the general public from the federal, state, or local government. Notice Required. Notice may be provided by one of the following methods: • Written notice; • Telephonic notice; or • Electronic notice if the Entity’s primary method of communication with the individual is by electronic means or is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity can demonstrate that the cost of providing notice will exceed $50,000 or that the affected class of persons to be notified exceeds 100,000. Substitute notice shall consist of all of the following: • Email notice if the Entity has email addresses for the individuals subject to the notice; • Conspicuous posting of the notice on the Web site of the Entity if the Entity maintains one; and • Notification to major statewide media. Exception: Compliance with Other Laws. • Primary Regulator. Notification pursuant to laws, rules, regulations, guidance, or guidelines established by an Entity’s primary or functional state regulator is sufficient for compliance. • Gramm-Leach-Bliley Act. The provisions of this statute shall not apply to any Entity who is subject to the provisions of Title V of the Gramm-Leach-Bliley Act. • HIPAA-Covered Entities. A provider of health care, health care service plan, health insurer, or a covered entity governed by the medical privacy and security rules issued by the federal Department of Health and Human Services pursuant to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) shall be deemed in -5- This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 7. Revised October 2013 compliance with this chapter. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation. Notice required by the statute must be made after the law enforcement agency determines that notification will no longer impede the investigation. • AG Enforcement. The state AG may seek actual damages for willful and knowing violations, as well as a civil penalty not to exceed $10,000 per breach or series of similar breaches. -6This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 8. Revised October 2013 Arkansas Ark. Code § 4-110-101 et seq. S.B. 1167 (signed into law March 31, 2005, Act 1526) Effective August 12, 2005 Application. Any person, business or state agency (collectively, Entity) that acquires, owns, or licenses computerized data that includes PI. • The provisions governing maintenance of PI are applicable to any Entity maintaining information on AR residents, whether or not organized or licensed under the laws of AR. Security Breach Definition. An unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of PI maintained by an Entity. • Good-faith acquisition of PI by an employee or agent of the Entity for the legitimate purposes of the Entity is not a breach of the security of the system if the PI is not otherwise used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security of the system following discovery or notification of the breach of the security of the system to any resident of AR whose unencrypted PI was, or is reasonably believed to have been, acquired by an unauthorized person. • Notification is not required if after a reasonable investigation the Entity determines there is no reasonable likelihood of harm to consumers. Third-Party Data Notification. If an Entity maintains computerized data that includes PI that the Entity does not own that Entity shall notify the owner or licensee of the information of any breach of the security of the system immediately following discovery if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The disclosure shall be made in the most expedient time and manner possible and without unreasonable delay, subject to any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the data system. Personal Information Definition. An individual’s first name, or first initial and his or her last name, in combination with any one or more of the following data elements when either the name or the data element is not encrypted or redacted: • Social Security Number; • Driver license number or AR identification card number; • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account; or • Medical information (any individually identifiable information, in -7This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 9. Revised October 2013 electronic or physical form, regarding the individual’s medical history or medical treatment or diagnosis by a health care professional). PI does not include any publicly available directories containing information an individual has voluntarily consented to have publicly disseminated or listed, such as name, address, or telephone number. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic mail notice if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, or that the affected class of persons to be notified exceeds 500,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the Entity has email addresses for the subject persons; • Conspicuous posting of the notice on the Web site of the Entity if the Entity maintains one; and • Notification to statewide media. Exception: Own Notification Policy. Any Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and is otherwise consistent with the timing requirements of the statute shall be deemed to be in compliance with the notification requirements of the statute if the Entity notifies affected persons in accordance with its policies in the event of a security breach. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation. Notice required by the statute must be made after the law enforcement agency determines that notification will no longer impede the investigation. • AG Enforcement. -8This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 10. Revised October 2013 California Cal. Civ. Code § 1798.29; 1798.80 et seq. S.B. 1386 (signed into law September 25, 2002) Effective July 1, 2003 S.B. 24 (signed into law August 31, 2011) Application. Any person, business, or state agency (collectively, Entity) that does business in CA and owns or licenses computerized data that contains PI. • Security Breach Definition. An unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of PI maintained by the Entity. • Effective January 1, 2012 S.B. 46 (signed into law September 27, 2013) Effective January 1, 2014 The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on CA residents, whether or not the Entity conducts business in CA. Good-faith acquisition of PI by an employee or agent of the Entity for the purposes of the Entity is not a breach of the security of the system, provided that the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any CA resident whose unencrypted PI was, or is reasonably believed to have been, acquired by an unauthorized person. Attorney General Notification. If an Entity is required to notify more than 500 CA residents, the Entity shall electronically submit a single sample copy of the notification, excluding any personally identifiable information, to the Attorney General. Third-Party Data Notification. If an Entity maintains computerized data that includes PI that the Entity does not own, the Entity must notify the owner or licensee of the information of any breach of the security of the data immediately following discovery if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement and any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Personal Information Definition. (1) An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted: • Social Security Number; • Driver license number or CA identification card number; • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial -9This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 11. Revised October 2013 account; • Medical information (any information regarding an individual’s medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional); or • Health insurance information (an individual’s health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individual’s application and claims history, including any appeals records). (2) Effective January 1, 2014: User name or email address, in combination with a password or security question and answer that would permit access to an online account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Effective January 1, 2014: For breaches of login credentials for an email account furnished by the Entity, notice may not be provided to the breached email address, but may be provided by one of the following methods: • Written notice; • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act); or • Clear and conspicuous notice delivered to the CA resident online when the CA resident is connected to the online account from an IP address or online location from which the Entity knows the CA resident customarily accesses the account. The notice shall be written in plain language and shall include a description of the following: • The date of the notice; • Name and contact information of the reporting person or Entity; • Type of PI subject to the unauthorized access and acquisition; • The date, estimated date, or date range during which the breach occurred, if it can be determined; - 10 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 12. Revised October 2013 • Whether notification was delayed as a result of law enforcement investigation, if that can be determined; • A general description of the breach incident, if that information is possible to determine at the time the notice is provided; • The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a driver's license or California identification card number. At the Entity’s discretion, the notice may also include: • Information about what the Entity has done to protect individuals whose information has been breached; • Advice on steps that the person whose information was breached may take to protect him or herself Effective January 1, 2014: For breaches of only user name or email address, in combination with a password or security question and answer that would permit access to an online account, notice may be provided in electronic or other form and should direct CA residents to: • Promptly change their password, security question or answer, or • Take other appropriate steps to protect the online account with the Entity and all other online accounts with the same user name or email address and password or security question or answer. Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, or that the affected class of subject persons to be notified exceeds 500,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the Entity has an email address for the subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media and the California Office of Privacy Protection. State agencies using substitute notice must notify the California Office of Information Security within the Office of Technology. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and is otherwise consistent with the timing requirements of the statute shall be deemed in compliance with the notification requirements of the statute if it notifies subject persons in accordance with its policies in the event of a security breach. - 11 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 13. Revised October 2013 Exception: HIPAA-Covered Entities. A covered entity under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) will be deemed to have complied with the notice requirements in this state law if it has complied with the notice requirements in Section 13402(f) of the Health Information Technology for Economic and Clinical Health Act (HITECH). Other Key Provisions: • Delay for Law Enforcement. Notification may be delayed if the law enforcement agency determines that the notification will impede a criminal investigation. The notification required by the statute shall be made after the law enforcement agency determines that it will not compromise the investigation. • Private Right of Action. Any customer injured by a violation of this title may institute a civil action to recover damages. In addition, any business that violates, proposes to violate, or has violated this title may be enjoined. • Waiver Not Permitted. - 12 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 14. Revised October 2013 Colorado Colo. Rev. Stat. § 6-1-716 Application. Any individual or commercial entity (collectively, Entity) that conducts business in CO and that owns or licenses computerized data that includes PI. • H.B. 1119 (signed into law April 24, 2006) Effective September 1, 2006 The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on CO residents, whether or not the Entity conducts business in CO. Security Breach Definition. An unauthorized acquisition of unencrypted computerized data that compromises the security, confidentiality, or integrity of PI maintained by an Entity. • Good-faith acquisition of PI by an employee or agent of an Entity for the purposes of the Entity is not a breach of the security of the system if the PI is not used for or is not subject to further unauthorized disclosure. Notification Obligation. An Entity that conducts business in CO and that owns or licenses computerized data that includes PI about a resident of CO shall, when it becomes aware of a breach of the security of the system, give notice as soon as possible to the affected CO resident. • Notification is not required if after a good-faith, prompt and reasonable investigation, the Entity determines that misuse of PI about a CO resident has not occurred and is not likely to occur. Notification to Consumer Reporting Agencies. If an Entity is required to notify more than 1,000 CO residents, the Entity shall also notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the anticipated date of the notification to the residents and the approximate number of residents who are to be notified. This paragraph shall not apply to a person who is subject to Title V of the Gramm-Leach-Bliley Act. Third-Party Data Notification. If an Entity maintains computerized data that includes PI that the Entity does not own or license the Entity shall give notice to and cooperate with the owner or licensee of the information of any breach of the security of the system immediately following discovery of a breach, if misuse of PI about a CO resident occurred or is likely to occur. Cooperation includes sharing with the owner or licensee information relevant to the breach, except that such cooperation shall not be deemed to require the disclosure of confidential business information or trade secrets. Timing of Notification. Notice shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the computerized data system. Personal Information Definition. A CO resident’s first name or first initial and last name in combination with any one or more of the following data elements that relate to the resident, when the data elements are not - 13 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 15. Revised October 2013 encrypted, redacted, or secured by any other method rendering the name or the element unreadable or unusable: • Social Security Number; • Driver license number or other identification card number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to a financial account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records or widely distributed media. Notice Required. Notice may be provided by one of the following methods: • Written notice to the postal address listed in the Entity’s records; • Telephonic notice; or • Electronic notice, if a primary means of communication by the Entity with a CO resident is by electronic means or the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice will exceed $250,000, or that the affected class of persons to be notified exceeds 250,000 CO residents, or the Entity does not have sufficient contact information to provide notice. Substitute notice shall consist of all of the following: • Email notice if the Entity has email addresses for the members of the affected class of CO residents; • Conspicuous posting of the notice on the Web site of the Entity if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. Any Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and whose procedures are otherwise consistent with the timing requirements of the statute shall be deemed to be in compliance with the notice requirements of the statute if the Entity notifies affected CO customers in accordance with its policies in the event of a breach of the security of the system. Exception: Compliance with Other Laws. • Primary Regulator. Notification pursuant to laws, rules, regulations, guidance, or guidelines established by an Entity’s primary or functional state regulator is sufficient for compliance. - 14 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 16. Revised October 2013 • Gramm-Leach-Bliley Act. The provisions of this statute shall not apply to any Entity who is subject to Title V of the Gramm-LeachBliley Act. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation and the law enforcement agency has notified the Entity that conducts business in CO not to send notice required by the statute. • AG Enforcement. The AG may seek direct damages and injunctive relief. - 15 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 17. Revised October 2013 Connecticut Conn. Gen. Stat. § 36a-701b Application. Any person, business or agency (collectively, Entity) that conducts business in CT, and who, in the ordinary course of such Entity’s business, owns, licenses, or maintains computerized data that includes PI. • S.B. 650 (signed into law June 8, 2005, Public Act 05-148) Effective January 1, 2006 H.B. 6001 (signed into law June 15, 2012, Public Act 12-1) Effective October 1, 2012 The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on CT residents, whether or not the Entity conducts business in CT. Security Breach Definition. Unauthorized access to or acquisition of electronic files, media, databases, or computerized data containing PI when access to the PI has not been secured by encryption or by any other method or technology that renders the PI unreadable or unusable. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of security following the discovery of the breach to any CT resident whose PI was, or is reasonably believed to have been, accessed by an unauthorized person through such breach. • Notification is not required if, after an appropriate investigation and consultation with relevant federal, state, and local agencies responsible for law enforcement, the Entity reasonably determines that the breach will not likely result in harm to the individuals whose PI has been acquired and accessed. Notification Obligation to Attorney General. Any Entity that is required under the statute to notify CT residents of any breach of security shall not later than the time when notice is provided to the resident also provide notice of the breach of security to the Attorney General. Third-Party Data Notification. If an Entity maintains computerized data that includes PI that the Entity does not own the Entity shall notify the owner or licensee of the information of any breach of the security of the data immediately following its discovery if the PI was, or is reasonably believed to have been, accessed by an unauthorized person. Timing of Notification. The disclosure shall be made without unreasonable delay, consistent with any measures necessary to determine the nature and scope of the breach, to identify individuals affected, or to restore the reasonable integrity of the data system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements: • Social Security Number; • Driver license number or CT identification card number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account. - 16 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 18. Revised October 2013 PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records or widely distributed media. Notice Required. Notice may be provided by one of the following methods: • Written notice; • Telephonic notice; or • Electronic notice, provided it is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, or that the affected class of subject persons to be notified exceeds 500,000 persons, or the Entity does not have sufficient contact information. Substitute notice shall consist of all the following: • Email notice when the Entity has an email address for the affected persons; • Conspicuous posting of the notice on the Web site of the Entity if the Entity maintains one; and • Notification to major statewide media, including newspapers, radio and television. Exception: Own Notification Policy. Any Entity that maintains its own security breach procedures as part of an information security policy for the treatment of PI and otherwise complies with the timing requirements of the statute shall be deemed to be in compliance with the security breach notification requirements of the statute, provided such Entity notifies subject persons in accordance with its policies in the event of a breach of security. Exception: Compliance with Other Laws. • Primary Regulator. Notification pursuant to laws, rules, regulations, guidance, or guidelines established by an Entity’s primary or functional state regulator is sufficient for compliance. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed for a reasonable period of time if a law enforcement agency determines that the notice will impede a criminal investigation and such law enforcement agency has made a request that notification be delayed. Notice required by the statute must be made after the law enforcement agency determines that notification will no longer impede the investigation and so notifies the Entity of such - 17 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 19. Revised October 2013 determination. • AG Enforcement. The AG may seek direct damages and injunctive relief. • Notice to the Insurance Department. Pursuant to Bulletin IC-25 (Aug. 18, 2010), all licensees and registrants of the Connecticut Insurance Department are required to notify the Department of any information security incident which affects any CT residents as soon as the incident is identified, but no later than five calendar days after the incident is identified. - 18 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 20. Revised October 2013 Delaware Del. Code Ann. tit. 6 § 12B-101 et seq. H.B. 116 (signed into law June 28, 2005) Effective June 28, 2005 H.B. 247 (signed into law June 10, 2010) Application. Any individual or commercial entity (collectively, Entity) that conducts business in DE and that owns or licenses computerized data that includes PI about a resident of DE. • The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on DE residents, whether or not the Entity conducts business in DE. Security Breach Definition. An unauthorized acquisition of unencrypted computerized data that compromises the security, confidentiality, or integrity of PI maintained by an Entity. • Effective June 10, 2010 Good-faith acquisition of PI by an employee or agent of an Entity for the purposes of the Entity is not a breach of the security of the system, provided that the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall, when it becomes aware of a breach of the security of the system, notify the affected DE resident. • Notification is not required if after a good-faith, reasonable, and prompt investigation the Entity determines there is no reasonable likelihood of harm to consumers. Third-Party Data Notification. An Entity that maintains computerized data that includes PI that the Entity does not own or license shall give notice to and cooperate with the owner or licensee of the information of any breach of the security of the system immediately following discovery of the breach, if misuse of PI about a DE resident occurred or is reasonably likely to occur. Cooperation includes sharing with the owner or licensee information relevant to the breach. Timing of Notification. Notice shall be made in good faith, in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the computerized data system. Personal Information Definition. A DE resident’s first name or first initial and last name, in combination with any one or more of the following data elements that relate to the resident, when either the name or the data elements are not encrypted: • Social Security Number; • Driver license number or DE identification card number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to a resident’s financial account. PI does not include publicly available information that is lawfully made - 19 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 21. Revised October 2013 available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by one of the following methods: • Written notice; • Telephonic notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice will exceed $75,000, or that the affected class of DE residents to be notified exceeds 100,000 residents, or the Entity does not have sufficient contact information to provide notice. Substitute notice shall consist of all of the following: • Email notice if the Entity has email addresses for the members of the affected class of DE residents; • Conspicuous posting of the notice on the Web site of the Entity if the Entity maintains one; and • Notice to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI, and whose procedures are otherwise consistent with the timing requirements of the statute, is deemed to be in compliance with the notice requirements of the statute if the Entity notifies affected DE residents in accordance with its policies in the event of a breach of the security of the system. Exception: Compliance with Other Laws. • Primary Regulator. Notification pursuant to laws, rules, regulations, guidance, or guidelines established by an Entity’s primary or functional state regulator is sufficient for compliance. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation. Notice required by the statute must be made without unreasonable delay and as soon as possible after the law enforcement agency determines that notification will no longer impede the investigation. • AG Enforcement. The Attorney General may bring an action to address violations of this chapter and for other relief that may be - 20 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 22. Revised October 2013 necessary to ensure compliance and recover direct economic damages. - 21 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 23. Revised October 2013 District of Columbia D.C. Code § 28-3851 et seq. Application. Any person or entity (collectively, Entity) who conducts business in DC and who, in the course of such business, owns or licenses computerized or other electronic data that includes PI. • Council Bill 16-810 (signed into law March 8, 2007) Effective July 1, 2007 The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on DC residents, whether or not the Entity conducts business in DC. Security Breach Definition. An unauthorized acquisition of computerized or other electronic data, or any equipment or device storing such data that compromises the security, confidentiality, or integrity of PI maintained by the Entity. • Acquisition of data that has been rendered secure, so as to be unusable by an unauthorized third party, shall not be deemed to be a breach of the security of the system. • Good-faith acquisition of PI by an employee or agent of the Entity for the purposes of the Entity is not a breach of the security of the system if the PI is not used improperly or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies, and who discovers a breach of the security system, shall promptly notify any DC resident whose PI was included in the breach. Notification to Consumer Reporting Agencies. If any Entity is required to notify more than 1,000 persons of a breach of security, the Entity shall also notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis, as defined by section § 603(p) of the federal Fair Credit Reporting Act, of the timing, distribution and content of the notices. This subsection shall not apply to an Entity who is required to notify consumer reporting agencies of a breach pursuant to Title V of the Gramm-Leach-Bliley Act. Third-Party Data Notification. Any Entity that maintains, handles, or otherwise possesses computerized or other electronic data that includes PI that the Entity does not own shall notify the owner or licensee of the information of any breach of the security of the system in the most expedient time possible following discovery. Timing of Notification. The notification shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Personal Information Definition. Any number or code or combination of numbers or codes, such as account number, security code, access code, or password, that allows access to or use of an individual’s financial or credit account, or an individual’s first name or first initial and last name, or phone - 22 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 24. Revised October 2013 number, or address, and any one or more of the following data elements: • Social Security Number; • Driver license number or DC identification card number; or • Credit card number or debit card number. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if the customer has consented to receipt of electronic notice consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice to persons would exceed $50,000, that the number of persons to receive notice under the statute exceeds 100,000, or that the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the Entity has an email address for the subject persons; • Conspicuous posting of the notice on the Web site of the Entity if the Entity maintains one; and • Notice to major local and, if applicable, national media. Exception: Own Notification Policy. Any Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and whose procedures are otherwise consistent with the timing requirements of the statute shall be deemed in compliance with the notification requirements of the statute if the Entity provides notice, in accordance with its policies, reasonably calculated to give actual notice to persons to whom notice is otherwise required to be given under the statute. • Notice under this section may be given by email if the Entity’s primary method of communication with the DC resident is by email. Exception: Compliance with Other Laws. • Gramm-Leach-Bliley Act. The provisions of this statute shall not apply to any Entity who is subject to the provisions of Title V of the Gramm-Leach-Bliley Act. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation. Notice required by the statute must be made without unreasonable delay and as soon as possible after the law - 23 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 25. Revised October 2013 enforcement agency determines that notification will no longer impede the investigation. • AG Enforcement. The AG may seek direct damages and injunctive relief. • Private Right of Action. Any District of Columbia resident injured by a violation may institute a civil action to recover actual damages, the costs of the action, and reasonable attorney’s fees. Actual damages shall not include dignitary damages, including pain and suffering. • Waiver Not Permitted. - 24 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 26. Revised October 2013 Florida Fla. Stat. § 817.5681 H.B. 481 (signed into law June 14, 2005) Effective July 1, 2005 Application. Any person, firm, association, joint adventure, partnership, syndicate, corporation, and all other groups or combinations (collectively, Entity) who conduct business in FL and maintain computerized data in a system that includes PI. • The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on FL residents, whether or not the Entity conducts business in FL. Security Breach Definition. An unlawful and unauthorized acquisition of computerized data that materially compromises the security, confidentiality, or integrity of PI maintained by the Entity. • Good-faith acquisition of PI by an employee or agent of the Entity is not a breach of the security of the system, provided the information is not used for a purpose unrelated to the business or subject to further unauthorized use. Notification Obligation. An Entity that conducts business in FL and maintains computerized data in a system that includes PI shall provide notice of any breach of the security of the system, following a determination of the breach, to any resident of FL whose unencrypted PI was, or is reasonably believed to have been, acquired by an unauthorized person. • Notification is not required if, after an appropriate investigation or after consultation with relevant federal, state, and local agencies responsible for law enforcement, the Entity reasonably determines that the breach has not and will not likely result in harm to the individuals whose PI has been acquired and accessed. Such a determination must be documented in writing and the documentation must be maintained for five years. Notification to Consumer Reporting Agencies. If an Entity discovers circumstances requiring notification pursuant to this section of more than 1,000 persons at a single time, the Entity shall also notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the timing, distribution, and content of the notices. Third-Party Data Notification. Any Entity that maintains computerized data that includes PI on behalf of another business entity shall disclose to the business entity for which the information is maintained any breach of the security of the system as soon as practicable, but no later than 10 days following the determination, if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. The Entity that maintains the data on behalf of another business entity and the business entity on whose behalf the data is maintained may agree who will provide the notice, if any is required, provided only a single notice for each breach of the security system shall be required. If agreement regarding notification cannot be reached, the Entity with the direct business relationship with the FL resident shall be - 25 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 27. Revised October 2013 subject to these provisions. Timing of Notification. Notification shall be made without unreasonable delay, subject to any measures necessary to determine the presence, nature, and scope of the breach and restore the reasonable integrity of the system. • Notification must be made no later than 45 days following the determination of the breach. Personal Information Definition. An individual’s first name, first initial and last name, or any middle name and last name, in combination with any one or more of the following data elements when the data elements are not encrypted: • Social Security Number; • Driver license or FL identification card number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records or widely distributed media. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if the Entity has a valid email address for the subject person and the subject person has agreed to accept communications electronically, or if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, the affected class of subject persons to be notified exceeds 500,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the Entity has an email address for the subject persons; • Conspicuous posting of the notice on the Web site of the Entity, if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. Any Entity who maintains its own notification procedures as part of an information security or privacy policy for the treatment of PI, which procedures are otherwise consistent with the timing - 26 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 28. Revised October 2013 requirements of this statute, shall be deemed in compliance with the notification requirements of the statute if the Entity notifies subject persons in accordance with the Entity’s policies in the event of a breach of security of the system. Penalties. An Entity that violates the statute in the following manner is subject to the following administrative fines: • An Entity that fails to notify subject persons or another Entity following the determination of a breach is liable for a fine per breach, not to exceed $500,000, (i) in the amount of $1,000 for each day the breach goes undisclosed for up to 30 days and, thereafter, $50,0000 for each 30-day period or portion therefore for up to 180 days; or (ii) if notification is not made within 180 days, any Entity required to make notification who fails to do so is subject to a fine of up to $500,000. • An Entity required to document a failure to notify affected persons who fails to document the failure, or who, if documentation was created, fails to maintain the documentation for the full five years is liable for a fine of up to $50,000 for such failure. Exception: Compliance with Other Laws. • Primary Regulator. Notification pursuant to laws, rules, regulations, guidance, or guidelines established by an Entity’s primary or functional state regulator is sufficient for compliance. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation. Notice required by the statute must be made without unreasonable delay and as soon as possible after the law enforcement agency determines that notification will no longer impede the investigation. • Department of Legal Affairs Enforcement. Allows the DLA to assess and collect the fines provided under the statute. - 27 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 29. Revised October 2013 Georgia Ga. Code § 10-1-910 et seq. S.B. 230 (signed into law May 5, 2005) Effective May 5, 2005 S.B. No. 236 (signed into law May 24, 2007) Application. Any person or entity who, for monetary fees or dues, engages in whole or in part in the business of collecting, assembling, evaluating, compiling, reporting, transmitting, transferring, or communicating information concerning individuals for the primary purpose of furnishing PI to nonaffiliated third parties, or any state or local agency or subdivision thereof including any department, bureau, authority, public university or college, academy, commission, or other government entity (collectively, Entity) that maintains computerized data that includes PI of individuals. The statute shall not apply to any governmental agency whose records are maintained primarily for traffic safety, law enforcement, or licensing purposes or for purposes of providing public access to court records or to real or personal property information. • Effective May 24, 2007 The provisions governing maintenance of PI are applicable to any Entity maintaining information on GA residents, whether or not organized or licensed under the laws of GA. Security Breach Definition. An unauthorized acquisition of an individual’s electronic data that compromises the security, confidentiality, or integrity of PI of such individual maintained by an Entity. • Good-faith acquisition or use of PI by an employee or agent of an Entity for the purposes of such Entity is not a breach of the security of the system, provided that the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity that maintains computerized data that includes PI of individuals shall give notice of any breach of the security of the system following discovery or notification of the breach to any resident of GA whose unencrypted PI was, or is reasonably believed to have been, acquired by an unauthorized person. Notification to Consumer Reporting Agencies. In the event an Entity discovers circumstances requiring notification of more than 10,000 residents of GA at one time, the Entity shall also notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the timing, distribution, and content of the notices. Third-Party Data Notification. If an Entity maintains computerized data on behalf of another Entity that includes PI of individuals that the Entity does not own, it shall notify the other Entity of any breach of the security of the system within 24 hours following discovery, if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The notice shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and restore the reasonable integrity, security, and confidentiality of the data system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, - 28 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 30. Revised October 2013 when either the name or the data elements are not encrypted or redacted: • Social Security Number; • Driver license or GA identification card number; • Account number or credit card number or debit card number if circumstances exist wherein such a number could be used without additional identifying information, access codes, or passwords; • Account passwords or personal identification numbers or other access codes; or • Any of the above items when not in connection with the individual’s first name or first initial and last name, if the information compromised would be sufficient to perform or attempt to perform identity theft against the person whose information was compromised. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If an Entity demonstrates that the cost of providing notice would exceed $50,000, that the affected class of individuals to be notified exceeds 100,000, or that the Entity does not have sufficient contact information to provide written or electronic notice to such individuals. Substitute notice shall consist of all of the following: • Email notice, if the Entity has an email address for the individuals to be notified; • Conspicuous posting of the notice on the Entity’s Web site, if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. Any Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and whose procedures are otherwise consistent with the timing requirements of the statute shall be deemed to be in compliance with the notification requirements of the statute if it notifies the individuals who are the subjects of the notice in accordance with its policies in the event of a breach of the security of the system. Other Key Provisions: - 29 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 31. Revised October 2013 • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation. Notice required by the statute must be made without unreasonable delay and as soon as possible after the law enforcement agency determines that notification will no longer impede the investigation. - 30 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 32. Revised October 2013 Hawaii H.R.S. § 487N-1 et seq. S.B. 2290 (signed into law May 25, 2006, Act 135) Effective January 1, 2007 S.B. 2402 (signed into law April 17, 2008, Act 19) Effective April 17, 2008 Application. Any sole proprietorship, partnership, corporation, association, or other group, however organized, and whether or not organized to operate at a profit, including financial institutions organized, chartered, or holding a license or authorization certificate under the laws of HI, any other state, the United States, or any other country, or the parent or the subsidiary of any such financial institution, and any entity whose business is records destruction, or any government agency that collects PI for specific government purposes (collectively, Entity) that owns or licenses PI of residents of HI in any form (whether computerized, paper, or otherwise). • The provisions governing maintenance of PI are applicable to any Entity maintaining information on HI residents, whether or not the Entity conducts business in HI. Security Breach Definition. Any unauthorized access to and acquisition of unencrypted or unredacted records or data containing PI where illegal use of the PI has occurred, or is reasonably likely to occur, where such unauthorized access and acquisition creates a risk of harm to a person. Any incident of unauthorized access to and acquisition of encrypted records or data containing PI along with the confidential process or key constitutes a security breach. • Good-faith acquisition of PI by an employee or agent of the Entity for a legitimate purpose is not a security breach, provided that the PI is not used for a purpose other than a lawful purpose of the business and is not subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall provide notice to the affected person of a security breach following discovery or notification of the breach. Attorney General/Agency Notification. If more than 1,000 persons are notified at one time under this section, the business shall notify the State of Hawaii’s Office of Consumer Protection of the timing, content, and distribution of the notice. Notification to Consumer Reporting Agencies. If more than 1,000 persons are notified at one time pursuant to this section, the Entity shall notify in writing, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the timing, distribution, and content of the notice. Notification Obligation for Government Agencies. A government agency shall submit a written report to the legislature within 20 days after discovery of a security breach at the government agency that details information relating to the nature of the breach, the number of individuals affected by the breach, a copy of the notice of security breach that was issued, the number of individuals to whom the notice was sent, whether the notice was delayed due to law enforcement considerations, and any procedures that have been implemented to prevent the breach from reoccurring. In the event that a law - 31 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 33. Revised October 2013 enforcement agency informs the government agency that notification may impede a criminal investigation or jeopardize national security, the report to the legislature may be delayed until 20 days after the law enforcement agency has determined that notice will no longer impede the investigation or jeopardize national security. Third-Party Data Notification. Any business located in HI or any business that conducts business in HI that maintains or possesses records or data containing PI of residents of HI that the business does not own or license, shall notify the owner or licensee of the PI of any security breach immediately following discovery of the breach. Timing of Notification. The disclosure notification shall be made without unreasonable delay, consistent with any measures necessary to determine sufficient contact information, determine the scope of the breach, and restore the reasonable integrity, security, and confidentiality of the data system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted: • Social Security Number; • Driver license number or HI identification card number; or • Account number, credit card number, debit card number, access code, or password that would permit access to an individual’s financial account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by one of the following methods: • Written notice to the last available address the Entity has on record; • Telephonic notice, provided that contact is made directly with the affected persons; or • Email notice, for those persons for whom an Entity has a valid email address and who have agreed to receive communications electronically if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). The notice shall be clear and conspicuous and shall include a description of the following: • The incident in general terms; • Type of PI subject to the unauthorized access and acquisition; - 32 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 34. Revised October 2013 • The general acts of the Entity to protect the PI from further unauthorized access; • A telephone number that the person may call for further information and assistance, if one exists; and • Advice that directs the person to remain vigilant by reviewing account statements and monitoring free credit reports. Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $100,000, or that the affected class of persons to be notified exceeds 200,000, or if the Entity does not have sufficient contact information or consent to satisfy the required notice, for only those affected persons without sufficient contact information or consent, or if the Entity is unable to identify particular affected persons, for only those unidentifiable affected persons. Substitute notice shall consist of all the following: • Email notice when the Entity has an email address for the subject persons; • Conspicuous posting of the notice on the Entity’s Web site, if the Entity maintains one; and • Notification to major statewide media. Exception: Compliance with Other Laws. • Federal Interagency Guidance. A financial institution that is subject to and in compliance with the Federal Interagency Guidance Response Programs for Unauthorized Access to Customer Information and Customer Notice, issued on March 7, 2005, by the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the Office of the Comptroller of the Currency, and the Office of Thrift Supervision, and any revisions, additions, or substitutions relating to said interagency guidance, shall be deemed to be in compliance. • HIPAA-Covered Entities. A provider of health care, health care service plan, health insurer, or a covered entity governed by the medical privacy and security rules issued by the federal Department of Health and Human Services pursuant to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) shall be deemed in compliance with this chapter. Penalties. Any Entity that violates any provisions of the statute is subject to penalties of not more than $2,500 for each violation. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law - 33 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 35. Revised October 2013 enforcement agency determines that the notice will impede a criminal investigation or jeopardize national security and requests a delay; provided that such request is made in writing, or the Entity documents the request contemporaneously in writing, including the name of the law enforcement officer making the request and the officer’s law enforcement agency engaged in the investigation. The notice shall be provided without unreasonable delay after the law enforcement agency communicates to the Entity its determination that notice will no longer impede the investigation or jeopardize national security. • AG Enforcement. • Waiver Not Permitted. - 34 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 36. Revised October 2013 Idaho Idaho Code § 28-51-104 et seq. S.B. 1374 (signed into law March 30, 2006, Chapter 258) Effective July 1, 2006 H.B. 566 (signed into law March 31, 2010) Application. Any agency, individual or commercial entity (collectively, Entity) that conducts business in ID and that owns or licenses computerized data that includes PI about a resident of ID. • The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on ID residents, whether or not the Entity conducts business in ID. Security Breach Definition. An illegal acquisition of unencrypted computerized data that materially compromises the security, confidentiality, or integrity of PI for one or more persons maintained by Entity. • Effective July 1, 2010 Good-faith acquisition of PI by an employee or agent of an Entity for the purposes of the Entity is not a breach of the security of the system, provided that the PI is not used or subject to further unauthorized disclosure. Notification Obligation. An Entity to which the statute applies shall give notice as soon as possible to the affected ID resident. • Notification is not required if after a good-faith, reasonable and prompt investigation the Entity determines that the PI has not been and will not be misused. Notification Obligation for State Agencies. When an agency becomes aware of a security breach, it shall, within 24 hours, notify the office of the ID Attorney General. • A state agency must also report a security breach to the office of the chief information officer within the department of administration, pursuant to the information technology resource management council policies. Third-Party Data Notification. An Entity that maintains computerized data that includes PI that the Entity does not own or license shall give notice to and cooperate with the owner or licensee of the information of any breach of the security of the system immediately following discovery of the breach, if misuse of PI about an ID resident occurred or is reasonably likely to occur. Cooperation includes sharing with the owner or licensee information relevant to the breach. Timing of Notification. Notice must be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach, to identify the individuals affected, and to restore the reasonable integrity of the computerized data system. Personal Information Definition. An ID resident’s first name or first initial and last name in combination with any one or more of the following data elements that relate to the resident, when either the name or the data element are not encrypted: - 35 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 37. Revised October 2013 • Social Security Number; • Driver license number or identification card number; or • Account number or credit card number in combination with any required security code, access code, or password that would permit access to a resident’s financial account. Notice Required. Notice may be provided by one of the following methods: • Written notice to the most recent address the Entity has in its records; • Telephonic notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity required to provide notice demonstrates that the cost of providing notice would exceed $25,000, or that the number of ID residents to be notified exceeds 50,000, or that the Entity does not have sufficient contact information to provide notice. Substitute notice consists of all of the following: • Email notice if the Entity has email addresses for the affected ID residents; • Conspicuous posting of the notice on the Web site of the Entity if the Entity maintains one; and • Notice to major statewide media. Exception: Own Notification Policy. Any Entity that maintains its own notice procedures as part of an information security policy for the treatment of PI, and whose procedures are otherwise consistent with the timing requirements of the statute is deemed to be in compliance with the notice requirements if the Entity notifies affected ID residents in accordance with its policies in the event of a breach of the security of the system. Exception: Compliance with Other Laws. • Primary Regulator. Notification pursuant to laws, rules, regulations, guidance, or guidelines established by an Entity’s primary or functional state regulator is sufficient for compliance. Penalties. Any Entity that intentionally fails to give notice in accordance with the statute shall be subject to a fine of not more than $25,000 per breach of the security of the system. Penalties for Government Disclosure. Any governmental employee that intentionally discloses personal information not subject to disclosure otherwise allowed by law shall be subject to a fine of not more than $2,000, by imprisonment in the county jail for a period of not more than 1 year, or - 36 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 38. Revised October 2013 both. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation. Notice required by the statute must be made as soon as possible after the law enforcement agency determines that notification will no longer impede the investigation. • Primary State Regulator Enforcement. Authorizes primary state regulator to bring a civil action against an Entity that it believes to have violated the statute by failing to give notice to enforce compliance with the statute and enjoin the Entity from further violation. - 37 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 39. Revised October 2013 Illinois 815 Ill. Comp. Stat. 530/5, 530/10, 530/12, 530/15, 530/20, 530/25 H.B. 1633 (signed into law June 16, 2005, Public Act 9436) Effective June 27, 2006 H.B. 3025 (signed Aug. 22, 2011, Public Act 97-483) Effective Jan. 1, 2012 Application. Any data collector, which includes, but is not limited to, government agencies, public and private universities, privately and publicly held corporations, financial institutions, retail operators, and any other entity that, for any purpose, handles, collects, disseminates, or otherwise deals with nonpublic PI (collectively, Entity) that owns or licenses PI concerning an IL resident. • The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on IL residents, whether or not the Entity conducts business in IL. Security Breach Definition. An unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of PI maintained by the Entity. • Good-faith acquisition of PI by an employee or agent of the Entity for a legitimate purpose of the Entity does not constitute a security breach, provided that the PI is not used for a purpose unrelated to the Entity’s business or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall notify the resident at no charge that there has been a breach following discovery or notification of the breach. Note: Illinois may take the position that any unauthorized acquisition or use by a third party triggers the notification obligation, regardless of materiality or ownership of the data. Notification Obligation for State Agencies. Any state agency that collects PI and has had a breach of security of the system data or written material shall submit a report within five business days of the discovery or notification of the breach to the General Assembly listing the breaches and outlining any corrective measures that have been taken to prevent future breaches of the security of the system data or written material. Any agency that has submitted a report under the statute shall submit an annual report listing all breaches of security of the system data or written materials and the corrective measures that have been taken to prevent future breaches. Third-Party Data Notification. Any Entity that maintains or stores computerized data that includes PI that the Entity does not own or license shall notify the owner or licensee of the information of any breach of the security of the data immediately following discovery, if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. In addition, such Entities shall cooperate with the data owner or licensee in matters relating to the breach, including (1) giving notice of the (approximate) date and nature of the breach and (2) informing the owner or licensee of steps taken or planned relating to the breach. Timing of Notification. The disclosure notification shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and restore the reasonable integrity, security, and confidentiality of the data system. - 38 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 40. Revised October 2013 Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or redacted: • Social Security Number; • Driver license number or IL identification card number; or • Account number or credit card number or debit card number or an account number or credit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Contents of Notice. The notice shall include: • The toll-free numbers and addresses for consumer reporting agencies; • The toll-free number, address, and website address for the Federal Trade Commission; and • A statement that the individual can obtain information from these sources about fraud alerts and security freezes. Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, or that the affected class of subject persons to be notified exceeds 500,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice if the Entity has an email address for subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and is otherwise consistent with the timing requirements of the statute, shall be deemed in compliance with the notification requirements of the statute if the Entity notifies subject persons in accordance with its policies in the event of a breach of the security of the system data. - 39 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 41. Revised October 2013 Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation and provides the Entity with a written request of delay. Notice required by the statute must be made without unreasonable delay and as soon as possible after the law enforcement agency determines that notification will no longer impede the investigation. • Waiver Not Permitted. • Violation of the statute constitutes an unlawful practice under the IL Consumer Fraud and Deceptive Business Practices Act. - 40 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 42. Revised October 2013 Indiana Ind. Code § 4-1-11 et seq.; § 24-4.9-1 et seq. Application. Any individual, corporation, business trust, estate, trust, partnership, association, nonprofit corporation or organization, cooperative, state agency or any other legal entity (collectively, Entity) that owns or licenses computerized data that includes PI. • S.B. 503 (signed into law April 26, 2005, Act 503) Effective July 1, 2006 H.E.A. No. 1197 (signed into law March 24, 2008) H.E.A. No. 1121 (signed into law May 12, 2009) The provisions governing maintenance of PI are applicable to any Entity maintaining information on IN residents, whether or not organized or licensed under the laws of IN. Security Breach Definition. An unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of PI maintained by an Entity. The term includes the unauthorized acquisition of computerized data that has been transferred to another medium, including paper, microfilm, or a similar medium, even if the transferred data are no longer in a computerized format. • Unauthorized acquisition of a portable electronic device on which PI is stored does not constitute a security breach if all PI on the device is protected by encryption and the encryption key: (i) has not been compromised or disclosed, and (ii) is not in the possession of or known to the person who, without authorization, acquired or has access to the portable electronic device. • Good-faith acquisition of PI by an employee or agent of the Entity for lawful purposes of the Entity does not constitute a security breach if the PI is not used or subject to further unauthorized disclosure. Effective July 1, 2009 Notification Obligation. Any Entity, after discovering or being notified of a breach of the security of data, shall disclose the breach to an IN resident whose unencrypted PI was or may have been acquired by an unauthorized person or whose encrypted PI was or may have been acquired by an unauthorized person with access to the encryption key if the Entity knows, or should know, or should have known that the unauthorized acquisition constituting the breach has resulted in or could result in identity deception (as defined in IND. CODE § 35-43-5-3.5), identity theft, or fraud affecting the IN resident. Attorney General Notification. If the Entity makes such a disclosure, the data base owner shall also disclose the breach to the attorney general. Notification to Consumer Reporting Agencies. An Entity required to make a disclosure to more than 1,000 consumers shall also disclose to all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis information necessary to assist the consumer reporting agency in preventing fraud, including PI of an IN resident affected by the breach of the security of a system. Third-Party Data Notification. An Entity that maintains computerized data that includes PI but that does not own or license the PI shall notify the owner of the PI if the Entity discovers that PI was or may have been acquired by an - 41 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 43. Revised October 2013 unauthorized person. Timing of Notification. The disclosure notification shall be made without unreasonable delay and consistent with any measures necessary to determine the scope of the breach and restore the integrity of the system. Personal Information Definition. A Social Security Number that is not encrypted or redacted, or an individual’s first and last names, or first initial and last name, and one or more of the following data elements that are not encrypted or redacted: • A driver license number or IN identification card number; • A credit card number; or • A financial account number or debit card number in combination with a security code, password, or access code that would permit access to the person’s account. PI does not include information that is lawfully obtained from publicly available information or from federal, state, or local government records lawfully made available to the general public. Notice Required. Notice may be provided by one of the following methods: • Mail; • Telephone; • Fax; or • Email, if the Entity has the email address of the affected IN resident. State agencies are subject to slightly different notice requirements. Substitute Notice Available. If an Entity demonstrates that the cost of the disclosure exceeds $250,000, or that the affected class of subject persons to be notified exceeds 500,000. Substitute notice shall consist of all of the following: • Conspicuous posting of the notice on the Web site of the Entity, if the Entity maintains one; and • Notice to major news reporting media in the geographic area where IN residents affected by the breach of the security of a system reside. Exception: Own Notification Policy. Any Entity that maintains its own disclosure procedures as part of an information privacy policy or a security policy is not required to make a separate disclosure under the statute if the Entity’s information privacy policy or security policy is at least as stringent as the disclosure requirements under the statute. Exception: Compliance with Other Laws. This section does not apply to an Entity that maintains its own data security procedures as part of an - 42 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 44. Revised October 2013 information privacy, security policy, or compliance plan under: • The Gramm-Leach-Bliley Act; • The Health Insurance Portability and Accountability Act of 1996 (HIPAA); • The USA Patriot Act (P.L. 107-56); • Executive Order 13224; • The Driver Privacy Protection Act (18 U.S.C. § 2781 et seq.); or • The Fair Credit Reporting Act (15 U.S.C. § 1681 et seq.) if the Entity’s information privacy, security policy, or compliance plan requires the Entity to maintain reasonable procedures to protect and safeguard from unlawful use or disclosure PI of IN residents that is collected or maintained by the Entity and the Entity complies with the Entity’s information privacy, security policy, or compliance plan. Other Key Provisions: • AG Enforcement. A person that knowingly or intentionally fails to comply with the database maintenance obligations commits a deceptive act that is actionable only by the state AG. Penalties include injunctive relief, a civil penalty of not more than $150,000 per violation, and reasonable costs. - 43 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 45. Revised October 2013 Iowa Iowa Code § 715C.1-2 2007 S.F. 2308 (signed into law May 9, 2008) Effective July 1, 2008 Application. Any individual, corporation, business trust, estate, trust, partnership, limited liability company, association, joint venture, government, governmental subdivision, agency, or instrumentality, public corporation, or any other legal or commercial entity (collectively, Entity) that owns or licenses computerized data that includes an IA resident’s PI that is used in the course of the Entity’s business, vocation, occupation, or volunteer activities and that was subject to a breach of security. Security Breach Definition. Unauthorized acquisition of PI maintained in computerized form by an Entity that compromises the security, confidentiality, or integrity of the PI. • Good-faith acquisition of PI by an Entity or that Entity’s employee or agent for a legitimate purpose of that Entity is not a breach of security, provided that the PI is not used in violation of applicable law or in a manner that harms or poses an actual threat to the security, confidentiality, or integrity of the PI. Notification Obligation. Any Entity to which the statute applies shall give notice of the breach of security following discovery of such breach of security, or receipt of notification of such breach, to any IA resident whose PI was included in the information that was breached. • Notification is not required if, after an appropriate investigation or after consultation with the relevant federal, state, or local agencies responsible for law enforcement, the Entity determines that no reasonable likelihood of financial harm to the IA residents whose PI has been acquired has resulted or will result from the breach. Such a determination must be documented in writing and the documentation must be maintained for five years. Third-Party Data Notification. Any Entity who maintains or otherwise possesses PI on behalf of another Entity shall notify the owner or licensor of the information of any breach of security immediately following discovery of such breach if an IA resident’s PI was included in the information that was breached. Timing of Notification. The notification shall be made in the most expeditious manner possible and without unreasonable delay, consistent with any measures necessary to sufficiently determine contact information for the affected IA residents, determine the scope of the breach, and restore the reasonable integrity, security, and confidentiality of the data. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements that relate to the individual if any of the data elements are not encrypted, redacted, or otherwise altered by any method or technology in such a manner that the name or data elements are unreadable: • Social Security Number; - 44 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 46. Revised October 2013 • Driver license number or other unique identification number created or collected by a government body; • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account; • Unique electronic identifier or routing code, in combination with any required security code, access code, or password that would permit access to an individual’s financial account; or • Unique biometric data, such as a fingerprint, retina or iris image, or other unique physical representation or digital representation of biometric data. PI does not include information that is lawfully obtained from publicly available sources, or from federal, state, or local government records lawfully made available to the general public. Notice Required. Notice shall include, at a minimum, all of the following: • A description of the breach of security; • The approximate date of the breach of security; • The type of PI obtained as a result of the breach of security; • Contact information for consumer reporting agencies; and • Advice to the consumer to report suspected incidents of identity theft to local law enforcement or the attorney general. Notification may be provided by one of the following methods: • Written notice to the last available address the Entity has in the Entity’s records; or • Electronic notice if the Entity’s customary method of communication with the resident is by electronic means or is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, that the affected class of IA residents to be notified exceeds 350,000 persons, or if the Entity does not have sufficient contact information to provide notice. Substitute notice shall consist of the following: • Electronic mail notice when the Entity has an electronic mail address for the affected IA residents; • Conspicuous posting of the notice or a link to the notice on the - 45 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 47. Revised October 2013 Entity’s Web site, if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. Any Entity that maintains its own disclosure procedures as part of an information privacy policy or a security policy is not required to make a separate disclosure under the statute if the Entity’s information privacy policy or security policy is at least as stringent as the disclosure requirements under the statute. Exception: Compliance with Other Laws. • Federal Regulator. This statute does not apply to an Entity that complies with notification requirements or breach of security procedures that provide greater protection to PI and at least as thorough disclosure requirements than that provided by this section pursuant to the rules, regulations, procedures, guidance, or guidelines established by the Entity’s primary or functional federal regulator. • More Protective Law. This statute does not apply to an Entity that complies with a state or federal law that provides greater protection to PI and at least as thorough disclosure requirements for breach of security or PI than that provided by the statute. • Gramm-Leach-Bliley Act. This statute does not apply to an Entity that is subject to and complies with regulations promulgated pursuant to Title V of the Gramm-Leach-Bliley Act. Other Key Provisions: • Delay for Law Enforcement. The consumer notification requirements of this section may be delayed if a law enforcem ent agency determines that the notification will impede a criminal investigation and the agency has made a written request that the notification be delayed. The notification required by this section shall be made after the law enforcement agency determines that the notification will not compromise the investigation and notifies the Entity required to give notice in writing. • AG Enforcement. - 46 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 48. Revised October 2013 Kansas Kan. Stat. § 50-7a01 et seq. S.B. 196 (signed into law April 19, 2006) Effective January 1, 2007 Application. Any individual, partnership, corporation, trust, estate, cooperative, association, government, or governmental subdivision or agency or other entity (collectively, Entity) that conducts business in KS and that owns or licenses computerized data that includes PI. • The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on KS residents, whether or not the Entity conducts business in KS. Security Breach Definition. Any unauthorized access to and acquisition of unencrypted or unredacted computerized data that compromises the security, confidentiality, or integrity of PI maintained by an Entity and that causes, or such Entity reasonably believes has caused or will cause, identity theft to any consumer. • Good-faith acquisition of PI by an employee or agent of an Entity for the purposes of the Entity is not a breach of the security of the system, provided that the PI is not used for or is not subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall, when it becomes aware of any breach of the security of the system, give notice as soon as possible to the affected KS resident. • Notification is not required if after a good-faith, reasonable and prompt investigation the Entity determines that the PI has not been and will not be misused. Notification to Consumer Reporting Agencies. In the event that an Entity must notify more than 1,000 consumers at one time, the Entity shall also notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the timing, distribution and content of the notices. Third-Party Data Notification. An Entity that maintains computerized data that includes PI that the Entity does not own or license shall give notice to the owner or licensee of the information of any breach of the security of the data following discovery of a breach, if the PI was, or is reasonably believed to have been, accessed and acquired by an unauthorized person. Timing of Notification. Notice must be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the computerized data system. Personal Information Definition. A consumer’s first name or first initial and last name linked to any one or more of the following data elements that relate to the consumer, when the data elements are neither encrypted nor redacted: • Social Security Number; - 47 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 49. Revised October 2013 • Driver license number or KS identification card number; or • Account number or credit card number or debit card number, alone or in combination with any required security code, access code or password that would permit access to a consumer’s financial account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity required to provide notice demonstrates that the cost of providing notice will exceed $100,000, or that the affected class of consumers to be notified exceeds 5,000, or that the Entity does not have sufficient contact information to provide notice. Substitute notice shall consist of all of the following: • Email notice, if the Entity has email addresses for the affected class of consumers; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI, and whose procedures are otherwise consistent with the timing requirements of the statute, is deemed to be in compliance with the notice requirements of the statute if the Entity notifies affected consumers in accordance with its policies in the event of a breach of security of the system. Exception: Compliance with Other Laws. • Primary Regulator. Notification pursuant to laws, rules, regulations, guidance, or guidelines established by an Entity’s primary or functional state or federal regulator is sufficient. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation. Notice shall be made in good faith, without unreasonable delay and as soon as possible after the law enforcement agency determines that notification will no longer - 48 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 50. Revised October 2013 impede the investigation. • AG Enforcement. Allows the state AG (or insurance commissioner in the case of an insurance company) to bring actions at law or equity to enforce compliance and enjoin future violations. - 49 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 51. Revised October 2013 Louisiana La. Rev. Stat. § 51:3071 et seq. La. Admin. Code tit. 16, pt. III, § 701 S.B. 205 (signed into law July 12, 2005, Act 499) Effective January 1, 2006 Application. Any individual, corporation, partnership, sole proprietorship, joint stock company, joint venture, or any other legal entity that conducts business in LA or that owns or licenses computerized data that includes PI, or any agency that owns or licenses computerized data that includes PI (collectively, Entity). • The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on LA residents, whether or not the Entity conducts business in LA. Security Breach Definition. The compromise of the security, confidentiality, or integrity of computerized data that results in, or there is a reasonable basis to conclude has resulted in, the unauthorized acquisition of and access to PI maintained by an Entity. • Good-faith acquisition of PI by an employee of the Entity for the purposes of the Entity is not a breach of the security of the system, provided that the PI is not used for, or is not subject to, unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall, following discovery of a breach of the security of the system containing such data, notify any resident of the state whose PI was, or is reasonably believed to have been, acquired by an unauthorized person. • Notification is not required if after a reasonable investigation the Entity determines that there is not a reasonable likelihood of harm to customers. Attorney General Notification. When notice to LA citizens is required by the statute, the Entity shall provide written notice detailing the breach of the security of the system to the Consumer Protection Section of the Attorney General’s Office. Notice shall include the names of all LA citizens affected by the breach. Notice to the state AG shall be timely if received within 10 days of distribution of notice to LA citizens. Each day notice is not received by the state AG shall be deemed a separate violation. Third-Party Data Notification. Any individual, corporation, partnership, sole proprietorship, joint stock company, joint venture, or any other legal entity that maintains computerized data that includes PI that the agency or person does not own shall notify the owner or licensee of the information if the PI was, or is reasonably believed to have been, acquired by an unauthorized person through a breach of security of the system containing such data, following discovery by the agency or person of a breach of the security system. Timing of Notification. The notification required pursuant to the statute shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach, prevent further disclosures, and restore the reasonable integrity of the data system. - 50 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 52. Revised October 2013 Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when the name or the data element is not encrypted or redacted: • Social Security Number; • Driver license number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account. Notice Required. Notice may be provided by one of the following methods: • Written notification; or • Electronic notification, if the notification provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If an Entity demonstrates that the cost of providing notification would exceed $250,000, or that the affected class of persons to be notified exceeds 500,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notification when the Entity has an email address for the subject persons; • Conspicuous posting of the notification on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. Any Entity that maintains notification procedures as part of its information security policy for the treatment of PI which is otherwise consistent with the timing requirements of the statute shall be deemed to be in compliance with the notification requirements of the statute if the Entity notifies subject persons in accordance with the policy and procedures in the event of a breach of a security of the system. Exception: Compliance with Other Laws. • Federal Interagency Guidance. A financial institution that is subject to and in compliance with the Federal Interagency Guidance Response Programs for Unauthorized Access to Consumer Information and Customer Notice, issued on March 7, 2005, by the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the Office of the Comptroller of the Currency, and the Office of Thrift Supervision, and any revisions, additions, or substitutions relating to said interagency guidance, shall be deemed to be in compliance. - 51 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 53. Revised October 2013 Penalties. • A civil action may be instituted to recover actual damages resulting from the failure to disclose in a timely manner to a person that there has been a breach of the security system resulting in the disclosure of a person’s PI. • Failure to provide timely notice may be punishable by a fine not to exceed $5,000 per violation. Notice to the state AG shall be timely if received within 10 days of distribution of notice to LA citizens. Each day notice is not received by the state AG shall be deemed a separate violation. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation. Notice required by the statute must be made without unreasonable delay and as soon as possible after the law enforcement agency determines that notification will no longer impede the investigation. • Private Right of Action. A civil action may be instituted to recover actual damages resulting from the failure to disclose in a timely manner to a person that there has been a breach of the security system resulting in the disclosure of a person’s PI. - 52 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 54. Revised October 2013 Maine 10 Me. Rev. Stat. § 1346 et seq. L.D. 1671 (signed into law June 10, 2005, Chapter 379) Effective January 31, 2006 H.P. 672 (signed into law May 19, 2009, Chapter 161) Effective May 19, 2009 Application. Any individual, partnership, corporation, limited liability company, trust, estate, cooperative, association or other entity, including agencies of state government, the University of Maine System, the Maine Community College System, Maine Maritime Academy and private colleges and universities, or any information broker, which means a person who, for monetary fees or dues, engages in whole or in part in the business of collecting, assembling, evaluating, compiling, reporting, transmitting, transferring or communicating information concerning individuals for the primary purpose of furnishing PI to nonaffiliated third parties (collectively, Entity) that maintains computerized data that includes PI. The provisions governing maintenance of PI are applicable to any Entity maintaining information on ME residents, whether or not organized or licensed under the laws of ME. Security Breach Definition. An unauthorized acquisition, release or use of an individual’s computerized data that includes PI that compromises the security, confidentiality or integrity of PI of the individual maintained by an Entity. • Good-faith acquisition, release or use of PI by an employee or agent of an Entity on behalf of the Entity is not a breach of the security of the system if the PI is not used for or subject to further unauthorized disclosure to another person. Notification Obligation. If an Entity that maintains computerized data that includes PI becomes aware of a breach of the security of the system, the Entity shall give notice of the breach following discovery or notification of the security breach to a resident of ME whose PI has been, or is reasonably believed to have been, acquired by an unauthorized person. • Notification is not required if after conducting a good-faith, reasonable and prompt investigation, the Entity determines that there is not a reasonable likelihood that the PI has been or will be misused. Attorney General/State Agency Notification. When notice of a breach of the security of the system is required, the Entity shall notify the appropriate state regulators within the Department of Professional and Financial Regulation, or if the Entity is not regulated by the department, the state AG. Notification to Consumer Reporting Agencies. If an Entity must notify more than 1,000 persons at a single time, the Entity shall also notify, without unreasonable delay, consumer reporting agencies that compile and maintain files on consumers on a nationwide basis. Notification must include the date of the breach, an estimate of the number of persons affected by the breach, if known, and the actual or anticipated date that persons were or will be notified of the breach. Third-Party Data Notification. A third party that maintains, on behalf of another Entity, computerized data that includes PI that the third party does not own shall notify the owner of the PI of a breach of the security of the system - 53 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 55. Revised October 2013 immediately following discovery if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The notices must be made as expediently as possible and without unreasonable delay, consistent with measures necessary to determine the scope of the security breach and restore the reasonable integrity, security, and confidentiality of the data in the system. Personal Information Definition. An individual’s first name, or first initial, and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or redacted: • Social Security Number; • Driver license number or ME identification card number; • Account number or credit card number or debit card number if circumstances exist wherein such a number could be used without additional identifying information, access codes or passwords; • Account passwords or PI numbers or other access codes; or • Any of the above data elements when not in connection with the individual’s first name, or first initial, and last name, if the information compromised would be sufficient to permit a person to fraudulently assume or attempt to assume the identity of the person whose information was compromised. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity maintaining PI demonstrates that the cost of providing notice would exceed $5,000, that the affected class of individuals to be notified exceeds 1,000, or that the person maintaining PI does not have sufficient contact information to provide written or electronic notice to those individuals. Substitute notice shall consist of all of the following: • Email notice, if the Entity has email addresses for the individuals to be notified; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Penalties. Provides for civil penalties in the amount of $500 per violation, up - 54 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 56. Revised October 2013 to a maximum of $2,500 per day; equitable relief; or enjoinment from future violations. Other Key Provisions: • Delay for Law Enforcement. If, after the completion of the required investigation, notification is required under this section, the notification required by this section may be delayed for no longer than seven business days after a law enforcement agency determines that the notification will not compromise a criminal investigation. • AG Enforcement. Enforced by state AG and/or where applicable, the Department of Professional and Financial Regulation Office of Consumer Credit Regulation. - 55 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 57. Revised October 2013 Maryland Md. Code Com. Law § 14-3501 et seq. H.B. 208 (signed into law April 3, 2007) Application. A sole proprietorship, partnership, corporation, association, or any other business entity, whether or not organized to operate at a profit, including a financial institution organized, chartered, licensed, or otherwise authorized under the laws of MD, any other state, the United States, or any other country (collectively, Entity) that owns or licenses computerized data that includes PI of an individual residing in MD. • Effective January 1, 2008 The provisions governing maintenance of PI are applicable to any Entity maintaining information on MD residents, whether or not organized or licensed under the laws of MD. Security Breach Definition. The unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the PI maintained by an Entity. • A good-faith acquisition of PI by an employee or agent of an Entity for the purposes of the business, provided that the PI is not used or subject to further unauthorized disclosure, does not constitute a security breach. Notification Obligations. An Entity to which the statute applies, when it discovers or is notified of a breach of the security of the system, shall notify the individual of the breach. • Notification is not required if after a good-faith, reasonable and prompt investigation the Entity determines that the PI of the individual was not and will not be misused as a result of the breach. If after the investigation is concluded, the Entity determines that notification is not required, the Entity shall maintain records that reflect its determination for three years after the determination is made. Attorney General Notification. Prior to giving the notification required under the statute, an Entity shall provide notice of a breach of the security of a system to the state Office of the Attorney General. Notification to Consumer Reporting Agencies. If an Entity must notify 1,000 or more individuals, the Entity also shall notify, without unreasonable delay, each consumer reporting agency that compiles and maintains files on consumers on a nationwide basis of the timing, distribution, and content of the notices. Third-Party Data Notification. An Entity that maintains computerized data that includes PI that the Entity does not own or license shall notify the owner or licensee of the PI of a breach of the security of the system if it is likely that the breach has resulted or will result in the misuse of PI of an individual residing in MD. • Notification required by a third-party Entity shall be given as soon as reasonably practicable after the Entity discovers or is notified of the breach of the security of a system. - 56 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 58. Revised October 2013 • A third-party Entity shall share with the owner or licensee information relative to the breach. Timing of Notification. The notification required shall be given as soon as reasonably practicable, consistent with measures necessary to determine the scope of the breach of the security of a system, identify the individuals affected, or restore the integrity of the system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when the name or the data elements are not encrypted, redacted, or otherwise protected by another method that renders the information unreadable or unusable: • Social Security Number; • Driver license number; • Account number or credit card number or debit card number, that in combination with any required security code, access code, or password, would permit access to an individual’s financial account; or • An Individual Taxpayer Identification Number. PI does not include (i) publicly available information that is lawfully made available to the general public from federal, state, or local government records; (ii) information that an individual has consented to have publicly disseminated or listed; or (iii) information that is disseminated or listed in accordance with the federal Health Insurance Portability and Accountability Act (HIPAA). Notice Required. Notice may be provided by one of the following methods: • Written notice sent to the most recent address of the individual in the records of the business; • Telephonic notice, to the most recent telephone number of the individual in the records of the business; or • Electronic mail to the most recent email address of the individual in the records of the business if the individual has expressly consented to receive email notice. Notification shall include: • To the extent possible, a description of the categories of information that were, or are reasonably believed to have been, acquired by an unauthorized person, including which of the elements of PI were, or are reasonably believed to have been acquired; • Contact information for the business making the notification, including the business’s address, telephone number, and toll-free telephone - 57 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 59. Revised October 2013 number if one is maintained; • The toll-free telephone numbers and addresses for the major consumer reporting agencies; and • The toll-free telephone numbers, addresses, and Web site addresses for (i) the Federal Trade Commission; and (ii) the state AG, along with a statement that the individual can obtain information from these sources about steps the individual can take to avoid identity theft. Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $100,000, or that the affected class of individuals to be notified exceeds 175,000, or the Entity does not have sufficient contact information to give notice. Substitute notice shall consist of all of the following: • Email notice to an individual entitled to notification, if the business has an email address for the individual to be notified; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains a Web site; and • Notification to statewide media. Exception: Compliance with Other Laws. • Primary Regulator. An Entity that complies with the requirements for notification procedures under the rules, regulations, procedures, or guidelines established by the primary or functional federal or state regulator of the Entity shall be deemed to be in compliance with the statute. • Gramm-Leach-Bliley Act. An Entity or the affiliate of an Entity that is subject to and in compliance with the Gramm-Leach-Bliley Act, the federal Interagency Guidelines Establishing Information Security Standards, and the federal Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice, and any revisions, additions, or substitutions, shall be deemed to be in compliance with this subtitle. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation or jeopardize homeland or national security. Notification shall be given as soon as reasonably practicable after the law enforcement agency determines that it will not impede a criminal investigation and will not jeopardize homeland or national security. • AG Enforcement. • Private Right of Action. Consumers may bring actions under Title - 58 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 60. Revised October 2013 13 of the Maryland Code, the Unfair and Deceptive Trade Practices Act. • Waiver Not Permitted. - 59 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 61. Revised October 2013 Massachusetts Mass. Gen. Laws 93H § 1 et seq. 201 C.M.R. 17.00 H.B. 4144 (signed into law August 3, 2007) Effective October 31, 2007 Application. A natural person, corporation, association, partnership or other legal entity, or any agency, executive office, department, board, commission, bureau, division or authority of MA, or any of its branches, or any political subdivision thereof (collectively, Entity) that owns, licenses, maintains or stores data that includes PI about a resident of MA. • The provisions governing maintenance of PI are applicable to any Entity maintaining information on MA residents, whether or not organized or licensed under the laws of MA. Security Breach Definition. An unauthorized acquisition or unauthorized use of unencrypted data or encrypted electronic data and the confidential process or key that is capable of compromising the security, confidentiality, or integrity of PI, maintained by an Entity that creates a substantial risk of identity theft or fraud against a MA resident. • A good-faith but unauthorized acquisition of PI by an Entity, or employee or agent thereof, for the lawful purpose of such Entity, is not a breach of security unless the PI is used in an unauthorized manner or subject to further unauthorized disclosure. Notification Obligation. An Entity to which the statute applies shall provide notice to the affected residents, as soon as practicable and without unreasonable delay, when the Entity knows or has reason to know of a breach of security, or when the Entity knows or has reason to know that the PI of such resident was acquired or used by an unauthorized person or used for an unauthorized purpose. Note: MA may take the position that any unauthorized acquisition or use by a third party triggers the notification obligation, regardless of materiality or ownership of the data. Attorney General/State Agency Notification. Notice must be provided to the state Attorney General and the director of consumer affairs and business regulation. • Upon receipt of notice, the director of consumer affairs and business regulation shall identify any relevant consumer reporting agency or state agency and forward the names of the identified consumer reporting agencies and state agencies to the notifying Entity. The Entity shall, as soon as practicable and without unreasonable delay, also provide notice to consumer reporting agencies and state agencies identified by the director of consumer affairs and business regulation. Notification Obligation of an Agency Within the Executive Department. If an agency is within the executive department, it shall provide written notification of the nature and circumstances of the breach or unauthorized acquisition or use of the information to the technology division and the division of public records as soon as practicable and without unreasonable delay following discovery of the breach of security or unauthorized acquisition or use, and shall comply with all policies and procedures adopted by that - 60 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 62. Revised October 2013 division pertaining to the reporting and investigation of such an incident. Third-Party Data Notification. An Entity that maintains or stores, but does not own or license data that includes PI about a resident of MA, shall provide notice, as soon as practicable and without unreasonable delay, when such Entity (i) knows or has reason to know of a breach of security or (ii) when the Entity knows or has reason to know that the PI of such resident was acquired or used by an unauthorized person or used for an unauthorized purpose, to the owner or licensor. Such Entity shall cooperate with the owner or licensor of such PI. Cooperation shall include, but not be limited to: (i) informing the owner or licensor of the breach of security or unauthorized acquisition or use, (ii) the date or approximate date of such incident and the nature thereof, and (iii) any steps the Entity has taken or plans to take relating to the incident, except that such cooperation shall not be deemed to require the disclosure of confidential business information or trade secrets, or to provide notice to a resident that may not have been affected by the breach of security or unauthorized acquisition or use. Timing of Notification. The notification shall be given as soon as practicable and without unreasonable delay following discovery of the breach. Personal Information Definition. A resident’s first name and last name or first initial and last name in combination with any one or more of the following data elements that relates to such resident: • Social Security Number; • Driver license or MA identification card number; or • Financial account number, or credit card number, with or without any required security code, access code, personal ID number or password, that would permit access to a resident’s financial account. PI does not include information that is lawfully obtained from publicly available information, or from federal, state, or local government records lawfully made available to the general public. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). The notice to be provided to the AG, director of consumer affairs, and consumer reporting agencies or state agencies, if any, shall include, but not be limited to: (i) the nature of the breach of security or unauthorized acquisition or use, (ii) the number of residents of MA affected by such incident at the time of notification, and (iii) any steps the Entity has taken or plans to - 61 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 63. Revised October 2013 take relating to the incident. Notice to be provided to the resident shall include, but not be limited to: (i) the consumer’s rights to obtain a police report, (ii) how to request a security freeze and the necessary information to be provided when requesting the security freeze, and (iii) any fees required to be paid to any of the consumer reporting agencies. The notification shall not include the nature of the breach or unauthorized acquisition or use of the number of residents of MA affected by said breach or unauthorized access or use. Substitute Notice Available. If the Entity required to provide notice demonstrates that the cost of providing written notice will exceed $250,000, or that the affected class of MA residents to be notified exceeds 500,000 residents, or the Entity does not have sufficient contact information to provide notice. Substitute notice shall consist of all of the following: • Email notice, if the Entity has email addresses for the members of the affected class of MA residents; • Clear and conspicuous posting of the notice on the home page of the Entity’s Web site if the Entity maintains one; and • Publication in or broadcast through media or medium that provides notice throughout MA. Exception: Compliance with Other Laws. • Primary Regulator. Notification pursuant to laws, rules, regulations, guidance, or guidelines established by an Entity’s primary or functional state or federal regulator is sufficient for compliance. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation and has notified the AG, in writing, thereof and informs the Entity of such determination. Notice required by the statute must be made without unreasonable delay and as soon as possible after the law enforcement agency determines that notification will no longer impede the investigation. The Entity shall cooperate with law enforcement in its investigation of any breach of security or unauthorized acquisition or use, which shall include the sharing of information relevant to the incident; provided, however, that such disclosure shall not require the disclosure of confidential business information or trade secrets. • AG Enforcement. Penalties include civil penalties, damages, and injunctive relief. - 62 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 64. Revised October 2013 Michigan Mich. Comp. Laws § 445.63, 72 et seq. Application. Any individual, partnership, corporation, limited liability company, association, or other legal entity, or any department, board, commission, office, agency, authority, or other unit of state government of MI (collectively, Entity) that owns or licenses data including PI of a MI resident. • S.B. 309 (signed into law December 30, 2006, Pub. Act. 566) Effective July 2, 2007 S.B. No. 223 (signed into law December 21, 2010) The provisions governing maintenance of PI are applicable to any Entity maintaining information on MI residents, whether or not organized or licensed under the laws of MI. Security Breach Definition. The unauthorized access and acquisition of data that compromises the security or confidentiality of PI maintained by an Entity as part of a database of PI regarding multiple individuals. • Effective April 1, 2011. A good-faith but unauthorized acquisition of PI by an employee or other individual, where the access was related to the activities of the Entity, is not a breach of security unless the PI is misused or disclosed to an unauthorized person. In making this determination an Entity shall act with the care an ordinarily prudent Entity in a like position would exercise under similar circumstances. Notification Obligation. An Entity to which the statute applies shall provide notice of the breach to each resident of MI if (i) the resident’s unencrypted and unredacted PI was accessed and acquired by an unauthorized person or (ii) the resident’s PI was accessed and acquired in encrypted form by a person with unauthorized access to the encryption key. • Notification is not required if the Entity determines that the security breach has not or is not likely to cause substantial loss or injury to, or result in identity theft with respect to, one or more residents of MI. Notification to Consumer Reporting Agencies. If an Entity notifies 1,000 or more Michigan residents, the Entity shall, after notifying those residents, notify each consumer reporting agency that compiles and maintains files on consumers on a nationwide basis of the security breach without unreasonable delay. A notification under this subsection shall include the number and timing of notices that the person or agency provided to residents of this state. This subsection does not apply if the person or agency is subject to Title V of the Gramm-Leach-Bliley Act. Third-Party Data Notification. An Entity that maintains a database that includes data that the Entity does not own or license that discovers a breach of the security of the database shall provide a notice to the owner or licensor of the information of the security breach, unless the Entity determines that the security breach has not or is not likely to cause substantial loss or injury to, or result in identity theft with respect to one or more residents of MI. Timing of Notification. The notification shall be given without unreasonable delay following discovery of the breach, consistent with measures necessary to determine the scope of the breach of the security of a system or restore the integrity of the system. - 63 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 65. Revised October 2013 Personal Information Definition. The first name or first initial and last name linked to one or more of the following data elements of a resident of MI: • Social Security Number; • Driver license number or MI identification card number; or • Demand deposit or other financial account number, or credit card or debit card number, in combination with any required security code, access code, or password that would permit access to any of the resident’s financial accounts. Notice Required. Notice may be provided by one of the following methods: • Written notice sent to the recipient at the recipient’s postal address in the records of the Entity; • Telephonic notice given by an individual who represents the Entity if (i) the notice is not given in whole or in part by use of a recorded message, (ii) the recipient has expressly consented to receive notice by telephone, or if the recipient has not expressly consented to receive notice by telephone, the Entity also provides notice pursuant to the above methods if the notice by telephone does not result in a live conversation between the individual representing the Entity and the recipient within three business days after the initial attempt to provide telephonic notice; or • Written notice sent electronically to the recipient if (i) the recipient has expressly consented to receive electronic notice, (ii) the Entity has an existing business relationship with the recipient that includes periodic email communications and based on those communications the Entity reasonably believes that it has the recipient’s current email address, or (iii) the Entity conducts its business primarily through Internet account transactions or on the Internet. A notice under the statute shall: • Be written in a clear and conspicuous manner, and shall clearly communicate the content required; • Describe the security breach in general terms; • Describe the type of PI that is the subject of the unauthorized access or use; • If applicable, generally describe what the agency or person providing the notice has done to protect data from further security breaches; • Include a telephone number where a notice recipient may obtain assistance or additional information; and • Remind notice recipients of the need to remain vigilant for incidents of - 64 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 66. Revised October 2013 fraud and identity theft. Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000 or that the Entity has to provide notice to more than 500,000 residents of MI. Substitute notice shall consist of all of the following: • Email notice if the Entity has email addresses for any of the residents of MI who are entitled to receive notice; • Conspicuous posting on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media, which notice shall include a telephone number or Web site address that a person may use to obtain additional assistance and information. A public utility that sends monthly billing or account statements to its customers may provide notice of a security breach to its customers as provided under the statute or by providing all of the following: • As applicable, email notice in accordance with the statute; • Notice to the media reasonably calculated to inform the utility’s customers of the breach; • Conspicuous posting of notice of the security breach on the Web site of the utility; and • Written notice sent in conjunction with the billing or account statement sent to the customer at his or her postal address in the utility’s records. Exception: Compliance with Other Laws. • Federal Interagency Guidance. A financial institution that is subject to and in compliance with the Federal Interagency Guidance Response Programs for Unauthorized Access to Consumer Information and Customer Notice, issued on March 7, 2005, by the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the Office of the Comptroller of the Currency, and the Office of Thrift Supervision, and any revisions, additions, or substitutions relating to said interagency guidance, shall be deemed to be in compliance. • HIPAA-Covered Entities. A provider of health care, health care service plan, health insurer, or a covered entity governed by the medical privacy and security rules issued by the federal Department of Health and Human Services pursuant to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) shall be deemed in compliance with this chapter. - 65 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 67. Revised October 2013 Penalties. Provides for criminal penalties for notice of a security breach that has not occurred, where such notice is given with the intent to defraud. The offense is a misdemeanor, punishable by imprisonment for not more than 30 days or a fine of not more than $250 per violation (or both). (The penalty is the same for second and third violations, except that the fine increases to $500 per violation and $750 per violation, respectively.) Similarly, Entities who distribute an advertisement or make any other solicitation that misrepresents to the recipient that a security breach has occurred that may affect the recipient are punishable by imprisonment for not more than 93 days or a fine of not more than $1,000 per violation (or both). (The penalty is the same for second and third violations, except that the fine increases to $2,000 per violation and $3,000 per violation, respectively.) Entities who fail to provide notice may be ordered to pay a civil fine of not more than $250 for each failure to provide notice, capped at $750,000 per security breach. These penalties do not affect the availability of civil remedies under state or federal law. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation or jeopardize homeland or national security. Notification shall be given as soon as reasonably practicable after the law enforcement agency determines that it will not impede a criminal investigation and will not jeopardize homeland or national security. • AG Enforcement. • Provides that Entities may deliver notice pursuant to an agreement with another Entity, if the agreement does not conflict with the Michigan law. - 66 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 68. Revised October 2013 Minnesota Minn. Stat. § 325E.61 H.F. 2121 (signed into law June 2, 2005, Chapter 167) Effective January 1, 2006 Application. Any person or business that conducts business in MN, and that owns or licenses data that includes PI. • The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on MN residents, whether or not the Entity conducts business in MN. Security Breach Definition. An unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of PI maintained by the Entity. • Good-faith acquisition of PI by an employee or agent of the Entity for the purposes of the Entity is not a breach of the security of the system, provided that the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of MN whose unencrypted PI was, or is reasonably believed to have been, acquired by an unauthorized person. Notification to Consumer Reporting Agencies. If an Entity notifies more than 500 persons at one time, the Entity shall also notify, within 48 hours, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the timing, distribution, and content of the notices. Third-Party Data Notification. Any Entity that maintains data that includes PI that the Entity does not own shall notify the owner or licensee of the information of any breach of the security of the data immediately following discovery, if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The disclosure must be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach, identify the individuals affected, and restore the reasonable integrity of the data system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when the data element is not secured by encryption or another method of technology that makes electronic data unreadable or unusable, or was secured and the encryption key, password, or other means necessary for reading or using the data was also acquired: • Social Security Number; • Driver license number or MN identification card number; or • Account number or credit card number or debit card number, in combination with any required security code, access code, or password that would permit access to an individual’s financial - 67 - This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 69. Revised October 2013 account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by one of the following methods: • Written notice to the most recent available address the Entity has in its records; or • Electronic notice, if the Entity’s primary method of communication with the individual is by electronic means, or if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000 or that the Entity has to provide notice to more than 500,000 residents, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice if Entity has Email address for subject persons; • Conspicuous posting of the notice on the Entity’s Website if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and whose procedures are otherwise consistent with the timing requirements of the statute, shall be deemed to be in compliance with the notification requirements of the statute, if the Entity notifies subject persons in accordance with its policies in the event of a breach of security of the system. Exception: Compliance with Other Laws. • HIPAA-Covered Entities. A provider of health care, health care service plan, health insurer, or a covered entity governed by the medical privacy and security rules issued by the federal Department of Health and Human Services pursuant to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) shall be deemed in compliance with this chapter. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed to a date certain if a law enforcement agency determines that the notice will impede a criminal investigation. • AG Enforcement. - 68 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 70. Revised October 2013 • Private Right of Action. • Waiver Not Permitted. • Does not apply to any “financial institution,” as defined by 15 U.S.C. § 6809(3). - 69 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 71. Revised October 2013 Mississippi Miss. Code § 75-24-29 H.B. 582 (signed into law April 7, 2010) Effective July 1, 2011 Application. Any person who conducts business in MS and who, in the ordinary course of the person’s business functions, owns, licenses, or maintains the PI of any MS resident. Security Breach Definition. An unauthorized acquisition of electronic files, media, databases or computerized data containing personal information of any MS resident when access to the PI has not been secured by encryption or by any other method of technology that renders the PI unreadable or unusable. Notification Obligation. A person who conducts business in MS shall disclose any breach of security to all affected individuals. Notification is not required if, after an appropriate investigation, the person reasonably determines that the breach will not likely result in harm to the affected individuals. Third-Party Data Notification. A person who maintains computerized data which includes PI that the person does not own or license shall notify the owner or licensee of the information of any breach of security as soon as practical following its discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person for fraudulent purposes. Timing of Notification. Notice shall be provided without unreasonable delay subject to the completion of an investigation by the person to determine the nature and scope of the incident, to identify the affected individuals, or to restore the reasonable integrity of the system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when the data element is not secured by encryption or another method of technology that makes electronic data unreadable or unusable: • Social Security Number; • Driver license number or MS identification card number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by one of the following methods: • Written notice, • Telephonic notice, or - 70 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 72. Revised October 2013 • Electronic notice, if the Entity’s primary method of communication with the individual is by electronic means, or if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $5,000 or that the Entity has to provide notice to more than 5,000 residents. Substitute notice shall consist of all of the following: • Email notice if the Entity has Email addresses for subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and whose procedures are otherwise consistent with the timing requirements of the statute, shall be deemed to be in compliance with the notification requirements of the statute, if the Entity notifies subject persons in accordance with its policies in the event of a breach of security of the system. Exception: Compliance with Federal Regulations. • Any person that maintains a security breach procedure pursuant to the rules, regulations, or guidelines established by the primary federal functional regulator shall be deemed to be in compliance with this section, provided the person notifies affected individuals in accordance with the policies or the rules, regulations, procedures, or guidelines. Other Key Provisions: • Delay for Law Enforcement. Any notification shall be delayed for a reasonable period of time if a law enforcement agency determines that the notification will impede a criminal investigation or national security and the law enforcement agency has made a request that the notification be delayed. Any such delayed notification shall be made after the law enforcement agency determines that notification will not compromise the criminal investigation or national security and so notifies the person of that determination. • AG Enforcement. Failure to comply with the requirements of the act shall constitute an unfair trade practice and shall be enforced by the Attorney General. - 71 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 73. Revised October 2013 Missouri Mo. Rev. Stat. § 407.1500 H.B. 62 Effective August 28, 2009 Application. Any individual, corporation, business trust, estate, trust, partnership, limited liability company, association, joint venture, government, governmental subdivision, governmental agency, governmental instrumentality, public corporation, or any other legal or commercial entity (collectively, Entity) that owns or licenses PI of residents of MO or any person that conducts business in MO that owns or licenses PI of a resident of MO. Security Breach Definition. Unauthorized access to and unauthorized acquisition of PI maintained in computerized form by an Entity that compromises the security, confidentiality, or integrity of the PI. • Good-faith acquisition of PI by an Entity or that Entity’s employee or agent for a legitimate purpose of that Entity is not a breach of security, provided that the PI is not used in violation of applicable law or in a manner that harms or poses an actual threat to the security, confidentiality, or integrity of the PI. Notification Obligation. Any Entity to which the statute applies shall provide notice to the affected consumer that there has been a breach of security following discovery or notification of the breach. • Notification is not required if, after an appropriate investigation by the Entity or after consultation with the relevant federal, state, or local agencies responsible for law enforcement, the Entity determines that a risk of identity theft or other fraud to any consumer is not reasonably likely to occur as a result of the breach. Such a determination shall be documented in writing and the documentation shall be maintained for five years. Notification of Consumer Reporting Agencies. In the event an Entity notifies more than 1,000 consumers at one time pursuant to this section, the Entity shall notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the timing, distribution, and content of the notice. Attorney General Notification. In the event an Entity provides notice to more than 1,000 consumers at one time pursuant to this section, the Entity shall notify, without unreasonable delay, the state AG’s office of the timing, distribution, and content of the notice. Third-Party Data Notification. Any Entity that maintains or possesses records or data containing PI of residents of MO that the Entity does not own or license, or any Entity that conducts business in MO that maintains or possesses records or data containing PI of a resident of MO that the person does not own or license, shall notify the owner or licensee of the information of any breach of security immediately following discovery of the breach, consistent with the legitimate needs of law enforcement as provided in this section. Timing of Notification. The disclosure notification shall be made without - 72 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 74. Revised October 2013 unreasonable delay and consistent with any measures necessary to determine sufficient contact information and to determine the scope of the breach and restore the reasonable integrity, security, and confidentiality of the data system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements that relate to the individual if any of the data elements are not encrypted, redacted, or otherwise altered by any method or technology in such a manner that the name or data elements are unreadable or unusable: • Social Security Number; • Driver license number or other unique identification number created or collected by a government body; • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account; • Unique electronic identifier or routing code, in combination with any required security code, access code, or password that would permit access to an individual’s financial account; • Medical information (information regarding an individual’s medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional); or • Health insurance information (an individual’s health insurance policy number, subscriber identification number, or any unique identifier used by a health insurer to identify the individual). PI does not include information that is lawfully obtained from publicly available sources, or from federal, state, or local government records lawfully made available to the general public. Notice Required. Notice may be provided by one of the following methods: • Written notice; • Telephonic notice, if such contact is made directly with the affected consumers; or • Electronic notice for those consumers for whom the person has a valid e-mail address and who have agreed to receive communications electronically, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). The notice shall at minimum include a description of the following: • The incident in general terms; - 73 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 75. Revised October 2013 • The type of PI that was obtained as a result of the breach of security; • A telephone number that the affected consumer may call for further information and assistance, if one exists; • Contact information for consumer reporting agencies; and • Advice that directs the affected consumer to remain vigilant by reviewing account statements and monitoring free credit reports. Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $100,000, or that the class of affected consumers to be notified exceeds 150,000, or that the Entity does not have sufficient contact information, for only those affected consumers without sufficient contact information or consent, or that the Entity is unable to identify particular affected consumers, for only those unidentifiable consumers. Substitute notice shall consist of all the following: • E-mail notice when the Entity has an electronic mail address for the affected consumer; • Conspicuous posting of the notice or a link to the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notice procedures as part of an information security policy for the treatment of PI, and whose procedures are otherwise consistent with the timing requirements of this section, is deemed to be in compliance with the notice requirements of this section if the Entity notifies affected consumers in accordance with its policies in the event of a breach of security of the system. Exception: Compliance with Other Laws. • An Entity that is regulated by state or federal law and that maintains procedures for a breach of the security of the system pursuant to the laws, rules, regulations, guidance, or guidelines established by its primary or functional state or federal regulator is deemed to be in compliance with this section if the Entity notifies affected consumers in accordance with the maintained procedures when a breach occurs. • A financial institution that is: (i) subject to and in compliance with the Federal Interagency Guidance Response Programs for Unauthorized Access to Customer Information and Customer Notice, issued on March 29, 2005, by the board of governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the Office of the Comptroller of the Currency, and the Office of Thrift Supervision, and any revisions, additions, or substitutions relating to said interagency guidance; or (ii) subject to and in compliance with the National Credit Union Administration regulations in 12 C.F.R. Part 748; or (iii) subject - 74 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 76. Revised October 2013 to and in compliance with the provisions of Title V of the GrammLeach-Bliley Act shall be deemed to be in compliance with this section. Penalties/Enforcement. The state AG shall have exclusive authority to bring an action to obtain actual damages for a willful and knowing violation of this section and may seek a civil penalty not to exceed $150,000 per breach of the security of the system or series of breaches of a similar nature that are discovered in a single investigation. Other Key Provisions: • Delay for Law Enforcement. The notice required by this section may be delayed if a law enforcement agency informs the Entity that notification may impede a criminal investigation or jeopardize national or homeland security, provided that such request by law enforcement is made in writing or the Entity documents such request contemporaneously in writing, including the name of the law enforcement officer making the request and the officer’s law enforcement agency engaged in the investigation. The notice required by this section shall be provided without unreasonable delay after the law enforcement agency communicates to the Entity its determination that notice will no longer impede the investigation or jeopardize national or homeland security. - 75 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 77. Revised October 2013 Montana Mont. Code § 30-14-1701 et seq. H.B. 732 (signed into law April 28, 2005, Chapter 518) Effective March 1, 2006 Application. Any person or business (collectively, Entity) that conducts business in MT and that owns or licenses computerized data that includes PI. • The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on MT residents, whether or not the Entity conducts business in MT. Security Breach Definition. Any unauthorized acquisition of computerized data that materially compromises the security, confidentiality, or integrity of PI maintained by the Entity and causes or is reasonably believed to cause loss or injury to a MT resident. • Good-faith acquisition of PI by an employee or agent of the Entity for the purpose of the Entity is not a breach of the security of the data system, provided that the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security of the data system following discovery or notification of the breach to any resident of MT whose unencrypted PI was or is reasonably believed to have been acquired by an unauthorized person. Notification of Consumer Reporting Agencies. If a business notifies an individual of a breach and suggests, indicates or implies that the individual may obtain a credit report, the business must coordinate with the credit reporting agency as to the timing, content and distribution of notice to the individual (but this may not unreasonably delay disclosure of the breach). Third-Party Data Notification. Any Entity that maintains computerized data that includes PI that the Entity does not own shall notify the owner or licensee of the information of any breach of the security of the data system immediately following discovery if the PI was or is reasonably believed to have been acquired by an unauthorized person. Timing of Notification. Disclosure is to be made without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Personal Information Definition. An individual’s name, signature, address, or telephone number, in combination with one or more additional pieces of information about the individual, consisting of the individual’s passport number, driver license number, state identification number, or tribal identification card number, insurance policy number, bank account number, credit card number, debit card number, passwords or personal identification numbers required to obtain access to the individual’s finances, or any other financial information as provided by rule. A Social Security Number, in and of itself, constitutes personal information. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government - 76 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 78. Revised October 2013 records. Notice Required. Notice may be provided by one of the following methods: • Written notice; • Telephonic notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, or that the affected class of subject persons to be notified exceeds 500,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of email notice when the Entity has an email address for the subject persons and one of the following: • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to applicable local or statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and that does not unreasonably delay notice is considered to be in compliance with the notification requirements of the statute if the Entity notifies subject persons in accordance with its policies in the event of a breach of security of the data system. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that it will impede a criminal investigation and requests a delay in notification. The notification must be made after law enforcement agency determines that it will not compromise the investigation. - 77 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 79. Revised October 2013 Nebraska Neb. Rev. Stat. § 87-801 et seq. L.B. 876 (signed into law April 10, 2006) Application. An individual, government agency, corporation, business trust, estate, trust, partnership, limited partnership, limited liability partnership, limited liability company, association, organization, joint venture, government, governmental subdivision, agency, or instrumentality, or any other legal entity, whether for profit or not for profit (collectively, Entity), that conducts business in NE and that owns or licenses computerized data that includes PI about a resident of NE. • Effective July 14, 2006 The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining information on NE residents, whether or not the Entity conducts business in NE. Security Breach Definition. An unauthorized acquisition of unencrypted computerized data that compromises the security, confidentiality, or integrity of PI maintained by an Entity. • Good-faith acquisition of PI by an employee or agent of an Entity for the purposes of the Entity is not a breach of the security of the system if the PI is not used or subject to further unauthorized disclosure. • Acquisition of PI pursuant to a search warrant, subpoena, or other court order or pursuant to a subpoena or order of a state agency is not a breach of the security of the system. Notification Obligation. Any Entity to which the statute applies shall, when it becomes aware of a breach of the security of the system and determines that the use of information about a NE resident for an unauthorized purpose has occurred or is reasonably likely to occur, give notice to the affected NE resident. • Notification is not required if after a good-faith, reasonable and prompt investigation the Entity determines that it is unlikely that PI has been or will be used for an unauthorized purpose. Third-Party Data Notification. An Entity that maintains computerized data that includes PI that the Entity does not own or license shall give notice to and cooperate with the owner or licensee of the information of any breach of the security of the system when it becomes aware of a breach if use of PI about a NE resident for an unauthorized purpose occurred or is reasonably likely to occur. Cooperation includes, but is not limited to, sharing with the owner or licensee information relevant to the breach, not including information proprietary to the Entity. Timing of Notification. Notice shall be made as soon as possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the computerized data system. Personal Information Definition. A NE resident’s first name or first initial and last name in combination with any one or more of the following data elements that relate to the resident if either the name or the data elements are - 78 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 80. Revised October 2013 not encrypted, redacted, or otherwise altered by any method or technology in such a manner that the name or data elements are unreadable: • Social Security Number; • Driver license number or state identification card number; • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to a resident’s financial account; • Unique electronic ID number or routing code, in combination with any required security code, access code, or password; or • Unique biometric data, such as a fingerprint, voice print, or retina or iris image, or other unique physical representation. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by one of the following methods: • Written notice; • Telephonic notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice will exceed $75,000, that the affected class of NE residents to be notified exceeds 100,000 residents, or that the Entity does not have sufficient contact information to provide notice. Substitute notice requires all of the following: • Email notice if the Entity has email addresses for the members of the affected class of NE residents; • Conspicuous posting of the notice on the Entity’s Web site if it maintains one; and • Notice to major statewide media. Substitute Notice Exception. If the Entity has 10 employees or fewer and demonstrates that the cost of providing notice will exceed $10,000. Substitute notice requires all of the following: • Email notice if the Entity has email addresses for the members of the affected class of NE residents; • Notification by a paid advertisement in a local newspaper that is distributed in the geographic area in which the Entity is located, which - 79 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 81. Revised October 2013 advertisement shall be of sufficient size that it covers at least onequarter of a page in the newspaper and shall be published in the newspaper at least once a week for three consecutive weeks; • Conspicuous posting of the notice on the Entity’s Web site if it maintains one; and • Notification to major media outlets in the geographic area in which the Entity is located. Exception: Own Notification Policy. An Entity that maintains its own notice procedures which are part of an information security policy for the treatment of PI and which are otherwise consistent with the timing requirements of the statute, is deemed to be in compliance with the notice requirements of the statute if the Entity notifies affected NE residents in accordance with its notice procedures in the event of a breach of the security of the system. Exception: Compliance with Other Laws. • Primary Regulator. An Entity that is regulated by state or federal law and that maintains procedures for a breach of the security of the system pursuant to the laws, rules, regulations, guidance, or guidelines established by its primary or functional state or federal regulator is deemed to be in compliance with the notice requirements of the statute if the Entity notifies affected NE residents in accordance with the maintained procedures in the event of a breach of the security of the system. Other Key Provisions: • Delay for Law Enforcement. Notice may be delayed if a law enforcement agency determines that the notice will impede a criminal investigation. Notice shall be made in good-faith, without unreasonable delay, and as soon as possible after the law enforcement agency determines that notification will no longer impede the investigation. • AG Enforcement. AG may issue subpoenas and seek and recover direct economic damages for each affected NE resident injured by a violation of the statute. • Waiver Not Permitted. - 80 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 82. Revised October 2013 Nevada Nev. Rev. Stat. § 603A.010 et seq. Application. Any governmental agency, institution of higher education, corporation, financial institution or retail operator, or any other type of business entity or association (collectively, Entity), that owns or licenses computerized data that includes PI. S.B. 347 (signed into law June 17, 2005, Chapter 485) Security Breach Definition. An unauthorized acquisition of computerized data that materially compromises the security, confidentiality, or integrity of PI maintained by Entity. Effective October 1, 2005: Provisions regarding (i) forgery laboratories, (ii) crimes against older and vulnerable persons, (iii) requirements for state actors, and (iv) credit card issuer requirements Effective January 1, 2006: (i) credit card issuer requirements, (ii) data destruction requirements, (iii) ”reasonable protections” requirements, (iv) security breach notification provisions Effective January 1, 2008: Encryption provisions S.B. No. 186 (signed into law June 15, 2011) Effective October 1, 2011 • Good-faith acquisition of PI by an employee or agent of the Entity for the legitimate purposes of the Entity is not a breach of the security of the system if the PI is not otherwise used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security of the system data following discovery or notification of the breach to any resident of NV whose unencrypted PI was, or is reasonably believed to have been, acquired by an unauthorized person. Notification to Consumer Reporting Agencies. If an Entity determines that notification is required to be given to more than 1,000 persons at any one time, the Entity shall also notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the time the notification is distributed and the content of the notification. Third-Party Data Notification. If an Entity maintains computerized data that includes PI that the Entity does not own, the Entity must notify the owner or licensee of the information of any breach of the security of the system data immediately following discovery if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and restore the reasonable integrity of the system data. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when the name and data elements are not encrypted: • Social Security Number; • Driver license number or NV identification card number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account. PI does not include the last four digits of a Social Security Number or publicly - 81 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 83. Revised October 2013 available information that is lawfully made available to the general public. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, the affected class of subject persons to be notified exceeds 500,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the Entity has an email addresses for the subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification policies and procedures as part of an information security policy for the treatment of PI that is otherwise consistent with the timing requirements of the statute shall be deemed in compliance with the notification requirements of the statute if it notifies subject persons in accordance with its policies and procedures in the event of a security breach. Exception: Compliance with Other Laws. • Gramm-Leach-Bliley Act. An Entity that is subject to and complies with the privacy and security provisions of the Gramm-Leach-Bliley Act shall be deemed to be in compliance with the notification requirements. Other Key Provisions: • Delay for Law Enforcement. The notification required by the statute may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification must be made after the law enforcement agency determines that the notification will not compromise the investigation. • AG Enforcement. If the state AG or a district attorney of any county has reason to believe that any person is violating, proposes to violate or has violated the provisions of the statute, he may bring an action against that person to obtain a temporary or permanent injunction against the violation. • Right of Action for Data Collector. A data collector that provides - 82 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 84. Revised October 2013 the requisite notice may commence an action for damages against a person that unlawfully obtained or benefited from personal information obtained from records maintained by the data collector. • Special Notification Obligations for Government Agencies and Elected Officers. See Nev. Rev. Stat. § 242.181. • Special Rules Applicable to Electronic Health Records. See Nev. Rev. Stat. §§ 439, 603A.100. • Waiver Not Permitted. - 83 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 85. Revised October 2013 New Hampshire N.H. Rev. Stat. § 359-C:19 et seq. H.B. 1660 (signed into law June 2, 2006) Application. Any individual, corporation, trust, partnership, incorporated or unincorporated association, limited liability company, or other form of entity, or any agency, authority, board, court, department, division, commission, institution, bureau, or other state governmental entity, or any political subdivision of the state (collectively, Entity) doing business in NH that owns or licenses computerized data that includes PI. • Effective January 1, 2007 The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining PI, whether or not the Entity does business in NH. Security Breach Definition. An unauthorized acquisition of computerized data that compromises the security or confidentiality of PI maintained by an Entity doing business in NH. • Good-faith acquisition of PI by an employee or agent of an Entity for the purposes of the Entity’s business shall not be considered a security breach, provided that the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies, when it becomes aware of a security breach and determines that misuse of the information has occurred or is reasonably likely to occur, or if a determination cannot be made, shall notify the affected individuals. • Notification is not required if it is determined that misuse of the information has not occurred and is not reasonably likely to occur. Notification to Consumer Reporting Agencies. If an Entity is required to notify more than 1,000 consumers, the Entity shall also notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the anticipated date of the notification, the approximate number of consumers who will be notified, and the content of the notice. This obligation does not apply to entities subject to Title V of the Gramm-Leach-Bliley Act. Attorney General/Regulator Notification. An Entity engaged in trade or commerce that is subject to N.H. Rev. Stat. § 358-A:3(I) (trade or commerce that is subject to the jurisdiction of the bank commissioner, the director of securities regulation, the insurance commissioner, the public utilities commission, the financial institutions and insurance regulators of other states, or federal banking or securities regulators who possess the authority to regulate unfair or deceptive trade practices) shall also notify the regulator which has primary regulatory authority over such trade or commerce. All other Entities shall notify the state AG. The notice shall include the anticipated date of the notice to the individuals and the approximate number of individuals in NH who will be notified. Third-Party Data Notification. If an Entity maintains computerized data that includes PI that the Entity does not own, the Entity shall notify and cooperate - 84 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 86. Revised October 2013 with the owner or licensee of the information of any breach of the security of the data immediately following discovery if the PI was acquired by an unauthorized person. Cooperation includes sharing with the owner or licensee information relevant to the breach, except that such cooperation shall not be deemed to require the disclosure of confidential or business information or trade secrets. Timing of Notification. The Entity shall notify the affected individuals as soon as possible. Personal Information Definition. An individual’s first name or initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted: • Social Security Number; • Driver license number or other government identification number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account. Data shall not be considered to be encrypted if it is acquired in combination with any required key, security code, access code, or password that would permit access to the encrypted data. PI shall not include information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice shall include at a minimum: • A description of the incident in general terms; • The approximate date of the breach; • The type of PI obtained as a result of the security breach; and • The telephonic contact information of the Entity. Notice shall be provided by one of the following methods: • Written notice; • Telephonic notice, provided that a log of each such notification is kept by the person or business who notifies affected persons; • Electronic notice, if the Entity’s primary means of communication with affected individuals is by electronic means; or • Notice pursuant to the Entity’s internal notification procedures maintained as part of an information security policy for the treatment of PI. Substitute Notice Available. If the Entity demonstrates that the cost of - 85 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 87. Revised October 2013 providing notice would exceed $5,000, the affected class of subject individuals to be notified exceeds 1,000, or the Entity does not have sufficient contact information or consent to provide written, electronic or telephonic notice. Substitute notice shall consist of all of the following: • Email notice when the Entity has an email address for the affected individuals; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Compliance with Other Laws. • Primary Regulator. An Entity engaged in trade or commerce that maintains procedures for security breach notification pursuant to laws, rules, regulations, guidance, or guidelines issued by a state or federal regulator shall be deemed to be in compliance with this subdivision if it acts in accordance with such laws, rules, regulations, guidance or guidelines. Other Key Provisions: • Delay for Law Enforcement. The notification may be delayed if a law enforcement agency or national or homeland security agency determines that the notification will impede a criminal investigation or jeopardize national or homeland security. • AG Enforcement. • Private Right of Action. Any person injured by any violation may bring a civil action. If the court finds for the plaintiff, recovery shall be in the amount of actual damages. If the court finds that the act or practice was willful or knowing, it shall award as much as three times but not less than two times, such amount. In addition, a prevailing plaintiff shall be awarded the costs of the suit and attorney’s fees, as determined by the court. Injunctive relief shall be available to private individuals under this chapter without bond, subject to the discretion of the court. • Waiver Not Permitted. - 86 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 88. Revised October 2013 New Jersey N.J. Stat. § 56:8-163 A. 4001 (signed Sept. 22, 2005) Effective January 1, 2006 (all provisions except those governing police reports, which are effective on Sept. 22, 2005) Application. NJ, and any county, municipality, district, public authority, public agency, and any other political subdivision or public body in NJ, any sole proprietorship, partnership, corporation, association, or other entity, however organized and whether or not organized to operate at a profit, including a financial institution organized, chartered, or holding a license or authorization certificate under the law of NJ, any other state, the United States, or of any other country, or the parent or the subsidiary of a financial institution, that conducts business in NJ (collectively, Entity) that compiles or maintains computerized records that include PI. • The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining PI, whether or not the Entity conducts business in NJ. Security Breach Definition. Unauthorized access to electronic files, media or data containing PI that compromises the security, confidentiality or integrity of PI when access to the PI has not been secured by encryption or by any other method or technology that renders the PI unreadable or unusable. • Good-faith acquisition of PI by an employee or agent of the Entity for a legitimate business purpose is not a breach of security, provided that the PI is not used for a purpose unrelated to the business or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of security of computerized records following discovery or notification of the breach to any customer who is a resident of NJ whose PI was, or is reasonably believed to have been, accessed by an unauthorized person. • Disclosure of a breach of security to a customer shall not be required if the Entity establishes that misuse of the information is not reasonably possible. Any determination shall be documented in writing and retained for five years. Notification to Consumer Reporting Agencies. If an Entity discovers circumstances requiring notification pursuant to this section of more than 1,000 persons at one time, the Entity shall also notify, without unreasonable delay, all consumer reporting agencies that compile or maintain files on consumers on a nationwide basis of the timing, distribution and content of the notices. Attorney General/Police Notification. Any Entity required under this section to disclose a breach of security of a customer’s PI shall, prior to disclosure to the customer, report the breach of security and any information pertaining to the breach to the Division of State Police in the Department of Law and Public Safety for investigation or handling, which may include dissemination or referral to other appropriate law enforcement entities. Third-Party Data Notification. An Entity that compiles or maintains - 87 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 89. Revised October 2013 computerized records that include PI on behalf of another Entity shall notify that Entity of any breach of security of the computerized records immediately following discovery, if the PI was, or is reasonably believed to have been, accessed by an unauthorized person. Timing of Notification. The disclosure to a customer shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Personal Information Definition. An individual’s first name or first initial and last name linked with any one or more of the following data elements: • Social Security Number; • Driver license number or state identification card number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account. Dissociated data that, if linked, would constitute PI is PI if the means to link the dissociated data were accessed in connection with access to the dissociated data. PI shall not include publicly available information that is lawfully made available to the general public from federal, state or local government records, or widely distributed media. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, or that the affected class of subject individuals to be notified exceeds 500,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the Entity has email addresses; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI, and is otherwise consistent with the requirements of the statute, shall be deemed in compliance with the notification requirements of - 88 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 90. Revised October 2013 the statute if it notifies subject customers in accordance with its policies in the event of a breach of security of the system. Other Key Provisions: • Delay for Law Enforcement. The notification required by this section shall be delayed if a law enforcement agency determines that the notification will impede a criminal or civil investigation and that agency has made a request that the notification be delayed. - 89 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 91. Revised October 2013 New York N.Y. Gen. Bus. Law § 899-aa A.B. 4254 (signed into law August 10, 2005) Application. Any person, business, or state entity (excepting the judiciary, cities, counties, municipalities, villages, towns and other local agencies) (collectively, Entity) which conducts business in New York state and which owns or licenses computerized data which includes private information. • N.Y. State Tech. Law § 208 Effective December 7, 2005 S. 2605-D (signed into law March 28, 2013) The provisions governing maintenance of private information that the Entity does not own appear applicable to any Entity maintaining private information, whether or not the Entity conducts business in NY. Security Breach Definition. Unauthorized acquisition or acquisition without valid authorization of computerized data that compromises the security, confidentiality, or integrity of PI maintained by a business. In determining whether information has been acquired, or is reasonably believed to have been acquired, by an unauthorized person or a person without valid authorization, Entities may consider the following factors, among others: • Indications that the information is in the physical possession and control of an unauthorized person, such as a lost or stolen computer or other device containing information; • Indications that the information has been downloaded or copied; or • Effective March 28, 2013 Indications that the information was used by an unauthorized person, such as fraudulent accounts opened or instances of identity theft reported. Good-faith acquisition of PI by an employee or agent of the Entity for the purposes of the Entity is not a breach of the security of the system, provided that the private information is not used or subject to unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security following discovery or notification of the breach in the security of the system to any resident of NY whose private information was, or is reasonably believed to have been, acquired by a person without valid authorization. Notification to Consumer Reporting Agencies. If more than 5,000 NY residents are to be notified at one time, the Entity shall also notify consumer reporting agencies as to the timing, content and distribution of the notices and approximate number of affected persons. Attorney General/Agency Notification. If any NY residents are to be notified, the Entity shall notify the state Attorney General, the consumer protection board, the division of state police, and the state Office of Information Technology Services as to the timing, content and distribution of the notices and approximate number of affected persons. The state AG’s website has a form to be used for notifications. Third-Party Data Notification. Any Entity that maintains computerized data that includes private information that the Entity does not own shall notify the - 90 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 92. Revised October 2013 owner or licensee of the information of any breach of the security of the system immediately following discovery, if the private information was, or is reasonably believed to have been, acquired by a person without valid authorization. Timing of Notification. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and restore the reasonable integrity of the system. Personal Information Definition. Information concerning a natural person which, because of name, number, personal mark, or other identifier, can be used to identify such natural person Private Information Definition. Personal information consisting of any information in combination with any one or more of the following data elements, when either the personal information or the data element is not encrypted, or encrypted with an encryption key that has also been acquired: • Social Security Number; • Driver license number or non-driver identification card number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account. Notice Required. Notice shall include: • Contact information for the Entity making the notification; and • A description of the categories of information that were, or are reasonably believed to have been, acquired by a person without valid authorization, including specification of which of the elements of PI and private information were, or are reasonably believed to have been, so acquired. The notice required shall be directly provided to the affected persons by one of the following methods: • Written notice; • Telephonic notice, provided that a log of each such notification is kept by the Entity; or • Electronic notice, provided that the person to whom notice is required has expressly consented to receiving said notice in electronic form and a log of each such notification is kept by the Entity who notifies affected persons in such form; provided further, however, that in no case shall any Entity require a person to consent to accepting said notice in said form as a condition of establishing any business - 91 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 93. Revised October 2013 relationship or engaging in any transaction. Substitute Notice Available. If the Entity demonstrates to the state AG that the cost of providing notice would exceed $250,000, or that the affected class of subject persons to be notified exceeds 500,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the Entity has an email addresses for the subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Other Key Provisions: • Delay for Law Enforcement. The notification required by this section may be delayed if a law enforcement agency determines that such notification impedes a criminal investigation. The required notification shall be made after such law enforcement agency determines that such notification does not compromise such investigation. • AG Enforcement. The AG may bring an action to enjoin and restrain the continuation of such violation. - 92 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 94. Revised October 2013 North Carolina N.C. GEN. STAT. §§ 75-61, 7565 Effective December 1, 2005 S.B. 1048 (signed into law September 21, 2005) Amended by S.B. 1017 (signed into law July 27, 2009) Application. Any sole proprietorship, partnership, corporation, association, or other group, however organized and whether or not organized to operate at a profit, including a financial institution organized, chartered, or holding a license or authorization certificate under the laws of any state or country, or the parent or the subsidiary of any such financial institution, but not including any government or governmental subdivision or agency (collectively, Entity) that owns or licenses PI of residents of NC or any Entity that conducts business in NC that owns or licenses PI in any form (computerized, paper, or otherwise). Security Breach Definition. An incident of unauthorized access to and acquisition of unencrypted and unredacted records or data containing PI where illegal use of the PI has occurred or is reasonably likely to occur or that creates a material risk of harm to a consumer. Any incident of unauthorized access to and acquisition of encrypted records or data containing PI along with the confidential process or key shall constitute a security breach. • Good-faith acquisition of PI by an employee or agent of the Entity for a legitimate purpose is not a security breach, provided that the PI is not used for a purpose other than a lawful purpose of the Entity and is not subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall provide notice to the affected person that there has been a security breach following discovery or notification of the breach. Notification to Consumer Reporting Agencies. In the event an Entity provides notice to more than 1,000 persons at one time pursuant to this section, the Entity shall notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the timing, distribution, and content of the notice. Attorney General Notification. In the event a business provides notice to an affected person pursuant to this section, the business shall notify without unreasonable delay the Consumer Protection Division of the state AG’s office of the nature of the breach, the number of consumers affected by the breach, steps taken to investigate the breach, steps taken to prevent a similar breach in the future, and information regarding the timing, distribution, and content of the notice. The AG’s website contains a form to be used for notification. Third-Party Data Notification. Any business that possesses records containing PI of residents of NC that the business does not own or license, or conducts business in NC that possesses records containing PI that the business does not own or license shall notify the owner or licensee of the information of any security breach immediately following discovery of the breach. Timing of Notification. The disclosure shall be made without unreasonable delay, consistent with any measures necessary to determine sufficient contact information, determine the scope of the breach and restore the reasonable - 93 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 95. Revised October 2013 integrity, security, and confidentiality of the data system. Personal Information Definition. A person’s first name or first initial and last name in combination with any of the following identifying information: • Social Security Number; • Drivers license, NC identification card or passport numbers; • Checking account numbers; • Savings account numbers; • Credit card numbers; • Debit card numbers; • PIN; • Digital signatures; • Any other numbers or information that can be used to access a person’s financial resources; • Biometric data; or • Fingerprints. Additionally, if (but only if) any of the following information “would permit access to a person’s financial account or resources,” it is considered PI when taken in conjunction with a person’s first name, or first initial and last name: • Electronic ID numbers; • Email names or addresses; • Internet account numbers; • Internet ID names; • Parent’s legal surname prior to marriage; or • Passwords. PI does not include publicly available directories containing information an individual has voluntarily consented to have publicly disseminated or listed, including name, address, and telephone number, and does not include information made lawfully available to the general public from federal, state, or local government records Notice Required. Notice must be clear, conspicuous, and shall include all of the following: • A description of the incident in general terms; • A description of the type of PI that was subject to the unauthorized - 94 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 96. Revised October 2013 access and acquisition; • A description of the general acts of the business to protect the PI from further unauthorized access; • A telephone number for the business that the person may call for further information and assistance, if one exists; • Advice that directs the person to remain vigilant by reviewing account statements and monitoring free credit reports; • The toll-free numbers and addresses for the major consumer reporting agencies; and • The toll-free numbers, addresses, and Web site addresses for the Federal Trade Commission and the NC AG’s office, along with a statement that the individual can obtain information from these sources about preventing identity theft. It may be provided by one of the following methods: • Written notice; • Telephonic notice provided that contact is made directly with the affected persons; or • Electronic notice, for those persons for whom it has a valid e-mail address and who have agreed to receive communications electronically if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the business demonstrates that the cost of providing notice would exceed $250,000 or that the affected class of subject persons to be notified exceeds 500,000, or if the business does not have sufficient contact information or consent to provide notice as required under the statute, for only those affected persons without sufficient contact information or consent, or if the business is unable to identify particular affected persons, for only those unidentifiable affected persons. Substitute notice shall consist of all the following: • Email notice when the Entity has an email address for the subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Compliance with Other Laws. • A financial institution that is subject to and in compliance with the Federal Interagency Guidance Response Programs for Unauthorized - 95 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 97. Revised October 2013 Access to Consumer Information and Customer Notice, issued on March 7, 2005, by the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the Office of the Comptroller of the Currency, and the Office of Thrift Supervision, and any revisions, additions, or substitutions relating to said Interagency Guidance, shall be deemed to be in compliance. Other Key Provisions: • Delay for Law Enforcement. The notice required by this section shall be delayed if a law enforcement agency informs the business that notification may impede a criminal investigation or jeopardize national or homeland security, provided that such request is made in writing or the business documents such request contemporaneously in writing, including the name of the law enforcement officer making the request and the officer’s law enforcement agency engaged in the investigation. The notice required shall be provided without unreasonable delay after the law enforcement agency communicates to the business its determination that notice will no longer impede the investigation or jeopardize national or homeland security. • AG Enforcement. Civil and criminal penalties available. • Private Right of Action. An individual injured as a result of a violation of this section may institute a civil action. • Waiver Not Permitted. - 96 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 98. Revised October 2013 North Dakota N.D. Cent. Code § 51-30-01 et seq. S.B. 2251 (signed into law April 22, 2005) Effective June 1, 2005 H.B. 1435 (signed into law April 18, 2013) Application. Any Entity that conducts business in ND and that owns or licenses computerized data that includes PI. • The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining PI, whether or not the Entity conducts business in ND. Security Breach Definition. Unauthorized acquisition of computerized data when access to PI has not been secured by encryption or by any other method or technology that renders the electronic files, media, or data bases unreadable or unusable. • Good-faith acquisition of PI by an employee or agent of the Entity is not a breach of the security of the system if the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of ND whose unencrypted PI was, or is reasonably believed to have been, acquired by an unauthorized person. Third-Party Data Notification. Any person that maintains computerized data that includes PI that the person does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following the discovery, if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The disclosure must be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and to restore the integrity of the data system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any of the following data elements, when the name and the data elements are not encrypted: • Social Security Number; • The operator’s license number assigned to an individual by the department of transportation; • A non-driver color photo identification card number assigned to the individual by the department of transportation; • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial accounts; • The individual’s date of birth; - 97 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 99. Revised October 2013 • The maiden name of the individual’s mother; • Medical information; • Health insurance information; • An identification number assigned to the individual by the individual’s employer; or • The individual’s digitized or other electronic signature. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the person demonstrates that the cost of providing notice would exceed $250,000, the affected class of subject individuals to be notified exceeds 500,000, or the person does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the person has an email address for the subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and is otherwise consistent with the timing requirements of this chapter is deemed to be in compliance with the notification requirements of this chapter if the Entity notifies subject individuals in accordance with its policies in the event of a breach of security of the system. Exception: Compliance with Other Laws. • A financial institution, trust company, or credit union that is subject to, examined for, and in compliance with the Federal Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice is deemed to be in compliance with this chapter. • An Entity, business associate, or subcontractor that is subject to the - 98 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 100. Revised October 2013 breach notification requirements of title 45 of the Code of Federal Regulations, part 164, subpart D, is considered to be in compliance with this chapter. Other Key Provisions: • Delay for Law Enforcement. The notification required by this chapter may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The required notification must be made after the law enforcement agency determines that the notification will not compromise the investigation. • AG Enforcement. - 99 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 101. Revised October 2013 Ohio Ohio Rev. Code § 1349.19 Application. Any individual, corporation, business trust, estate, trust, partnership, or association (collectively, Entity) that conducts business in OH and owns or licenses computerized data that includes PI. • H.B. 104 (signed into law Nov. 17, 2005), amended by S.B. 126 (signed into law Dec. 29, 2006) Effective February 17, 2006 (amendment to exclude “covered entities” under HIPAA effective March 30, 2007) The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining PI, whether or not the Entity conducts business in OH. Security Breach Definition. Unauthorized access to and acquisition of computerized data that compromises the security or confidentiality of PI owned or licensed by an Entity and that causes, reasonably is believed to have caused, or reasonably is believed will cause a material risk of identity theft or other fraud to the person or property of OH. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security of the system, following its discovery or notification of the breach of the security of the system, to any individual whose principal mailing address as reflected in the records of the Entity is in OH and whose PI was, or reasonably is believed to have been, accessed and acquired by an unauthorized person if the access and acquisition by the unauthorized person causes or reasonably is believed will cause a material risk of identity theft or other fraud to the resident. Notification to Consumer Reporting Agencies. If an Entity discovers circumstances that require disclosure under this section to more than 1,000 residents of OH involved in a single occurrence of a breach of the security of the system, the Entity shall notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the timing, distribution, and content of the disclosure given by the Entity to the residents of OH. This requirement does not apply to “covered entities” as defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Third-Party Data Notification. Any Entity that, on behalf of or at the direction of another Entity or on behalf of or at the direction of any governmental entity, is the custodian of or stores computerized data that includes PI shall notify that other Entity or governmental entity of any breach of the security of the system in an expeditious manner, if the PI was, or reasonably is believed to have been, accessed and acquired by an unauthorized person and if the access and acquisition by the unauthorized person causes or reasonably is believed will cause a material risk of identity theft or other fraud to a resident of OH. Timing of Notification. The disclosure shall be made in the most expedient time possible but not later than 45 days following discovery or notification of the breach in the security of the system, consistent with any measures necessary to determine the scope of the breach, including which residents’ PI was accessed and acquired, and to restore the reasonable integrity of the data system. - 100 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 102. Revised October 2013 Personal Information Definition. An individual’s name, consisting of the individual’s first name or first initial and last name, in combination with and linked to any one or more of the following data elements, when the data elements are not encrypted, redacted, or altered by any method or technology in such a manner that the data elements are unreadable: • Social Security Number; • Driver license number or state identification card number; or • Account number or credit card number or debit card number in combination with and linked to any required security code, access code, or password that would permit access to an individual’s financial account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records or any of the following that are widely distributed: • Any news, editorial, or advertising statement published in any bona fide newspaper, journal, or magazine, or broadcast over radio or television, or any type of media similar in nature; • Any gathering or furnishing of information or news by any bona fide reporter, correspondent, or news bureau to any bona fide newspaper, journal, magazine, radio or television news media, or any type of media similar in nature; or • Any publication designed for and distributed to members of any bona fide association or charitable or fraternal nonprofit corporation, or any type of media similar in nature. Notice Required. Notice may be provided by any of the following methods: • Written notice; • Telephonic notice; or • Electronic notice, if the Entity’s primary method of communication with the resident to whom the disclosure must be made is by electronic means. Substitute Notice Available. If the Entity demonstrates that the cost of providing disclosure or notice to residents to whom disclosure or notification is required would exceed $250,000, that the affected class of subject residents to whom disclosure or notification is required exceeds 500,000 persons, or that it does not have sufficient contact information to provide written, telephonic or electronic notice. Substitute notice under this division shall consist of all of the following: • Email notice if the Entity has an email address for the resident to whom the disclosure must be made; - 101 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 103. Revised October 2013 • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major media outlets, to the extent that the cumulative total of the readership, viewing audience, or listening audience of all of the outlets so notified equals or exceeds 75% of the population of OH. Substitute Notice Exception. If the Entity demonstrates it has 10 employees or fewer and that the cost of providing the disclosures or notices to residents to whom disclosure or notification is required will exceed $10,000. Substitute notice under this division shall consist of all of the following: • Notification by a paid advertisement in a local newspaper that is distributed in the geographic area in which the Entity is located, which advertisement shall be of sufficient size that it covers at least onequarter of a page in the newspaper and shall be published in the newspaper at least once a week for three consecutive weeks; • Conspicuous posting of the disclosure or notice on the Entity’s Web site if the Entity maintains one; and • Notification to major media outlets in the geographic area in which the Entity is located. Exception: Compliance with Other Laws. • A financial institution, trust company, or credit union or any affiliate of a financial institution, trust company, or credit union that is required by federal law, including, but not limited to, any federal statute, regulation, regulatory guidance, or other regulatory action, to notify its customers of an information security breach with respect to information about those customers and that is subject to examination by its functional government regulatory agency for compliance with the applicable federal law, is exempt from the requirements of the statute. Exception: Preexisting Contract. Disclosure may be made pursuant to any provision of a contract entered into by the Entity with another Entity prior to the date the breach of the security of the system occurred if that contract does not conflict with any provision of this section and does not waive any provision of this section. Other Key Provisions: • Delay for Law Enforcement. The Entity may delay the disclosure if a law enforcement agency determines that the disclosure or notification will impede a criminal investigation or jeopardize homeland or national security, in which case, the Entity shall make the disclosure or notification after the law enforcement agency - 102 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 104. Revised October 2013 determines that disclosure or notification will not compromise the investigation or jeopardize homeland or national security. • AG Enforcement. The AG may conduct an investigation and bring a civil action upon an alleged failure by an Entity to comply with this statute. - 103 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 105. Revised October 2013 Oklahoma 24 Okla. Stat. § 161 et seq. H.B. 2245 (signed into law April 28, 2008) Effective November 1, 2008 Application. Any corporations, business trusts, estates, partnerships, limited partnerships, limited liability partnerships, limited liability companies, associations, organizations, joint ventures, governments, governmental subdivisions, agencies, or instrumentalities, or any other legal entity, whether for profit or not-for-profit (collectively, Entity) that owns or licenses computerized data that includes PI of OK residents. Security Breach Definition. Unauthorized access and acquisition of unencrypted and unredacted computerized data that compromises the security or confidentiality of PI maintained by an Entity as part of a database of PI regarding multiple individuals and that causes, or the Entity reasonably believes has caused or will cause, identity theft or other fraud to any resident of OK. • Good-faith acquisition of PI by an employee or agent of an Entity for the purposes of the Entity is not a breach of the security of the system, provided that the PI is not used for a purpose other than a lawful purpose of the Entity or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security of the system following discovery or notification of the breach of the security of the system to any resident of OK whose unencrypted and unredacted PI was or is reasonably believed to have been accessed and acquired by an unauthorized person and that causes, or the individual or entity reasonably believes has caused or will cause, identity theft or other fraud to any resident of OK. • An Entity must disclose the breach of the security of the system if encrypted information is accessed and acquired in an unencrypted form or if the security breach involves a person with access to the encryption key and the individual or entity reasonably believes that such breach has caused or will cause identity theft or other fraud to any resident of OK. Third-Party Data Notification. An Entity that maintains computerized data that includes PI that the Entity does not own or license shall notify the owner or licensee of the information of any breach of the security of the system as soon as practicable following discovery, if the PI was or if the Entity reasonably believes was accessed and acquired by an unauthorized person. Timing of Notification. The disclosure shall be made without unreasonable delay consistent with any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the system. Personal Information Definition. The first name or first initial and last name of an individual in combination with and linked to any one or more of the following data elements that relate to a resident of OK, when the data elements are neither encrypted nor redacted: - 104 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 106. Revised October 2013 • Social Security Number; • Driver license or state identification card number issued in lieu of a driver license; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to the financial accounts of a resident. PI shall not include information that is lawfully obtained from publicly available information, or from federal, state, or local government records lawfully made available to the general public. Notice Required. Notice means one of the following methods: • Written notice to the postal address in the records of the Entity; • Telephonic notice; or • Electronic notice. Substitute Notice Available. If an Entity demonstrates that the cost of providing notice would exceed $50,000, the affected class of residents to be notified exceeds 100,000, or the Entity does not have sufficient contact information. Substitute notice consists of any two of the following: • Email notice if the Entity has e-mail addresses for the members of the affected class of residents; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; or • Notification to major statewide media. Exception: Own Notification Policy. An entity that maintains its own notification procedures as part of an information privacy or security policy for the treatment of PI and that are consistent with the timing requirements of the statute shall be deemed to be in compliance with the notification requirements of the statute if it notifies residents of OK in accordance with its procedures in the event of a breach of security of the system. Exception: Compliance with Other Laws. • Interagency Guidance. A financial institution that complies with the notification requirements prescribed by the Federal Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice is deemed to be in compliance with the provisions of the statute. • Primary Regulator. An Entity that complies with the notification requirements or procedures pursuant to the rules, regulation, procedures, or guidelines established by the primary or functional - 105 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 107. Revised October 2013 federal regulator of the Entity shall be deemed to be in compliance with the provisions of the statute. Penalties. The state AG or a district attorney shall have exclusive authority to bring an action and may obtain either actual damages for a violation of the statute or a civil penalty not to exceed $150,000 per breach of the security of the system or series of breaches of a similar nature that are discovered in a single investigation. Other Key Provisions: • Delay for Law Enforcement. Notice required may be delayed if a law enforcement agency determines and advises the Entity that the notice will impede a criminal or civil investigation or homeland or national security. Notice required must be made without unreasonable delay after the law enforcement agency determines that notification will no longer impede the investigation or jeopardize national or homeland security. - 106 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 108. Revised October 2013 Oregon Or. Rev. Stat. §§ 646A.600, 646A.602, 646A.604, 646A.624, 646A.626 S.B. 583 (signed into law July 12, 2007) Effective October 1, 2007 Application. Any individual, private or public corporation, partnership, cooperative, association, estate, limited liability company, organization or other entity, whether or not organized to operate at a profit, or a public body as defined in Or. Rev. Stat. § 174.109 (collectively, Entity) that owns, maintains or otherwise possesses data that includes an individual’s PI that is used in the course of the Entity’s business, vocation, occupation or volunteer activities and was subject to the breach of security. Security Breach Definition. Unauthorized acquisition of computerized data that materially compromises the security, confidentiality or integrity of PI maintained by the Entity. • Does not include good-faith acquisition of PI by an Entity or that Entity’s employee or agent for a legitimate purpose of that Entity if the PI is not used in violation of applicable law or in a manner that harms or poses an actual threat to the security, confidentiality or integrity of the PI. • [Effective Sept. 12, 2013: Does not include an inadvertent acquisition of PI by an Entity or that Entity’s employee or agent if the PI is not used in violation of applicable law or in a manner that harms or poses an actual threat to the security, confidentiality or integrity of the PI.] S.B. 574 (signed into law June 13, 2013) Effective Sept. 12, 2013 Notification Obligation. Any Entity to which the statute applies shall give notice of the breach of security following discovery of such breach of security, or receipt of notification, to any Entity whose PI was included in the information that was breached. • Notification is not required if, after an appropriate investigation or after consultation with relevant federal, state or local agencies responsible for law enforcement, the Entity reasonably determines that the breach has not and will not likely result in harm to the individuals whose PI has been acquired and accessed. Such a determination must be documented in writing and the documentation must be maintained for five years. Notification to Consumer Reporting Agencies. If an Entity discovers a breach of security affecting more than 1,000 individuals that requires disclosure under this section, the Entity shall notify, without unreasonable delay, all consumer reporting agencies that compile and maintain reports on individuals on a nationwide basis of the timing, distribution and content of the notification given by the Entity to the individuals. The Entity shall include the police report number, if available, in its notification to the consumer reporting agencies. Third-Party Data Notification. Any person that maintains or otherwise possesses PI through a licensing agreement with another person shall notify the owner or licensee of the information of any breach of security immediately following discovery of such breach of security if an individual’s PI was - 107 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 109. Revised October 2013 included in the information that was breached. Timing of Notification. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine sufficient contact information for the individuals, determine the scope of the breach and restore the reasonable integrity, security and confidentiality of the data. Personal Information Definition. An OR resident’s first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not rendered unusable through encryption, redaction or other methods, or when the data elements are encrypted and the encryption key has also been acquired: • Social Security Number; • Driver license number or state identification card number issued by the department of transportation; • Identification number issued by a foreign nation; • Passport number or other United States-issued identification number; • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an OR resident’s financial account. PI also includes any PI data element or any combination of the PI data elements if the information would be sufficient to permit an individual to fraudulently assume the identity of the OR resident whose information was compromised. PI does not include publicly available information, other than a Social Security Number, that is lawfully made available to the general public from federal, state or local government records. Notice Required. Notice shall include at a minimum: • A description of the incident in general terms; • The approximate date of the breach of security; • The type of PI obtained as a result of the breach of security; • Contact information of the person subject to this section; • Contact information for national consumer reporting agencies; and • Advice to the individual to report suspected identity theft to law enforcement. Notice may be provided by one of the following methods: • Written notice; • Telephone notice, provided that contact is made directly with the - 108 - This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 110. Revised October 2013 affected individual; or • Electronic notice if the Entity’s primary method of communication with the individual is by electronic means or is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, that the affected class of individuals to be notified exceeds 350,000, or if the Entity does not have sufficient contact information to provide notice. Substitute notice consists of the following: • Conspicuous posting of the notice or a link to the notice on the home page of the Entity’s Web site if the Entity maintains one; and • Notification to major statewide television and newspaper media. Exception: Compliance with Other Laws. • Primary Regulator. An Entity that complies with the notification requirements or breach of security procedures that provide greater protection to PI and at least as thorough disclosure requirements pursuant to the rules, regulations, procedures, guidance or guidelines established by the Entity’s primary or functional federal regulator. • Gramm-Leach-Bliley Act. A person that complies with regulations regarding notification requirements or breach of security procedures that provide greater protection to PI and at least as thorough disclosure requirements promulgated pursuant to Title V of the Gramm-Leach-Bliley Act. • More Restrictive State or Federal Law. An Entity that complies with a state or federal law that provides greater protection to PI and at least as thorough disclosure requirements for breach of security of PI than that provided by this section. Other Key Provisions: • Delay for Law Enforcement. Notification may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation and that agency has made a written request that the notification be delayed. The required notification shall be made after that law enforcement agency determines that its disclosure will not compromise the investigation and notifies the Entity in writing. - 109 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 111. Revised October 2013 Pennsylvania 73 Pa. Stat. § 2301 et seq. Application. Any state agency, political subdivision, or an individual or a business (collectively, Entity) doing business in PA that maintains, stores or manages computerized data that includes PI of PA residents. • S.B. 712 (signed into law Dec. 22, 2005, Act No. 94) Effective June 20, 2006 The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining PI, whether or not the Entity conducts business in PA. Security Breach Definition. Unauthorized access and acquisition of computerized data that materially compromises the security or confidentiality of PI maintained by the Entity as part of a database of PI regarding multiple individuals and that causes or the Entity reasonably believes has caused or will cause loss or injury to any resident of PA. • Good-faith acquisition of PI by an employee or agent of the Entity for the purposes of the Entity is not a breach of the security of the system if the PI is not used for a purpose other than the lawful purpose of the Entity and is not subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall provide notice of any breach of the security of the system following discovery of the breach of the security of the system to any individual whose principal mailing address, as reflected in the computerized data which is maintained, stored or managed by the Entity, is in PA whose unencrypted and unredacted PI was or is reasonably believed to have been accessed and acquired by an unauthorized person. • An Entity must provide notice of the breach if encrypted information is accessed and acquired in an unencrypted form, if the security breach is linked to a breach of the security of the encryption or if the security breach involves a person with access to the encryption. Notification to Consumer Reporting Agencies. When an Entity provides notification under this act to more than 1,000 persons at one time, the Entity shall also notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the timing, distribution and number of notices. Third-Party Data Notification. An Entity that maintains, stores or manages computerized data on behalf of another Entity shall provide notice of any breach of the security system following discovery to the Entity on whose behalf it maintains, stores or manages the data. Timing of Notification. Except in order to take any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the data system, the notice shall be made without unreasonable delay. Personal Information Definition. An individual’s first name or first initial and last name in combination with and linked to any one or more of the following data elements when the data elements are not encrypted or redacted: - 110 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 112. Revised October 2013 • Social Security Number; • Driver license number or state identification card number issued in lieu of a driver license; or • Account number or credit card number or debit card number in combination with any required security code, access code or password that would permit access to an individual’s financial account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by any of the following methods: • Written notice to the last known home address for the individual; • Telephonic notice, if the customer can be reasonably expected to receive it and the notice is given in a clear and conspicuous manner, describes the incident in general terms and verifies PI but does not require the customer to provide PI, and the customer is provided with a telephone number to call or Internet Web site to visit for further information or assistance; or • Email notice, if a prior business relationship exists and the Entity has a valid email address for the individual. Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $100,000, the affected class of subject persons to be notified exceeds 175,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the Entity has an email address for the subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information privacy or security policy for the treatment of PI and is consistent with the notice requirements of this act shall be deemed to be in compliance with the notification requirements of this act if it notifies subject persons in accordance with its policies in the event of a breach of security. Exception: Compliance with Other Laws. • Compliance with Primary Regulator. An Entity that complies with the notification requirements or procedures pursuant to the rules, - 111 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 113. Revised October 2013 regulations, procedures or guidelines established by the Entity’s primary or functional federal regulator shall be in compliance with this act. • Federal Interagency Guidance. A financial institution that complies with the notification requirements prescribed by the Federal Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice is deemed to be in compliance with this act. Other Key Provisions: • Delay for Law Enforcement. Notification required may be delayed if a law enforcement agency determines and advises the Entity in writing, specifically referencing the statute, that the notification will impede a criminal or civil investigation. The required notification shall be made after the law enforcement agency determines that it will not compromise the investigation or national or homeland security. • AG Enforcement. The AG shall have exclusive authority to bring an action under the Unfair Trade Practices and Consumer Protection Law for a violation of the statute. - 112 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 114. Revised October 2013 Puerto Rico Application. Any entity that is the owner or custodian of a database that includes personal information of residents of Puerto Rico. 10 L.P.R.A. St § 4051 et seq. Violation of Security System Definition. Any situation in which it is detected that access has been permitted to unauthorized persons or entities to the data files so that the security, confidentiality or integrity of the information in the data bank has been compromised; or when normally authorized persons or entities have had access and it is known or there is reasonable suspicion that they have violated the professional confidentiality or obtained authorization under false representation with the intention of making illegal use of the information. H.B. 1184 (Signed into law Sept. 7, 2005, No. 111). Effective January 5, 2006 • This includes both access to the data banks through the system and physical access to the recording media that contain the same and any removal or undue retrieval of said recordings. Notification Obligation. Any entity to which the statute applies must notify citizens of any breach of the security system when the breached database contains, in whole or in part, personal information files not protected by encrypted code but only by a password. Third-Party Data Notification. Any entity that as part of their operations resells or provides access to digital data banks that at the same time contain personal information files of citizens must notify the proprietor, custodian or holder of said information of any violation of the system's security that has allowed access to those files to unauthorized persons Timing of Notification. Clients must be notified as expeditiously as possible, taking into consideration the need of law enforcement agencies to secure possible crime scenes and evidence as well as the application of measures needed to restore the system's security. • Within a non-extendable term of ten (10) days after the violation of the system's security has been detected, the parties responsible shall inform the Department of Consumer Affairs, which shall make a public announcement of the fact within twenty-four (24) hours after having received the information. Personal Information Definition. At least the name or first initial and the surname of a person, together with any of the following data so that an association may established between certain information with another and in which the information is legible enough so that in order to access it there is no need to use a special cryptographic code. • Social Security Number. • Driver license number, voter's identification or other official identification. • Bank or financial account numbers of any type with or without passwords or access code that may have been assigned. - 113 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 115. Revised October 2013 • Names of users and passwords or access codes to public or private information systems. • Medical information protected by the Health Insurance Portability and Accountability Act. • Tax information. • Work-related evaluations. Neither the mailing nor the residential address is included in the protected information or information that is a public document and that is available to the citizens in general. Notice Required. The notice of the security system breach shall be submitted in a clear and conspicuous manner and should describe the breach in general terms and the type of sensitive information compromised. The notification shall also include a toll free number and an Internet site for people to use in order to obtain information or assistance. Notice may be provided by one of the following methods: • Written notice; or • Authenticated electronic means according to the Digital Signatures Act. Substitute Notice Available. When the cost of notifying all those potentially affected or of identifying them is excessively onerous due to the number of persons affected, to the difficulty in locating all persons or to the economic situation of the enterprise or entity; or whenever the cost exceeds one hundred thousand dollars ($100,000) or the number of persons exceeds one hundred thousand [(100,000)], the entity shall issue the notice through the following two (2) steps: • Prominent display of an announcement to that respect at the entities premises, on the web page of the entity, if any, and in any informative flier published and sent through mailing lists both postal and electronic; and • A communication to that respect to the media informing of the situation and providing information as to how to contact the entity to allow for better follow-up. When the information is of relevance to a specific professional or commercial sector, the announcement may be made through publications or programming of greater circulation oriented towards that sector. Exception: Conflict with preexisting institutional security polices. No provision of this chapter shall be interpreted as being prejudicial to those institutional information and security policies that an enterprise or entity may have in force prior to its effectiveness and whose purpose is to provide protection equal or better to the information on security herein established. - 114 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 116. Revised October 2013 - 115 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 117. Revised October 2013 Rhode Island R.I. Gen. Laws § 11- 49.2-1 et seq. H.B. 6191 (became law without Governor’s signature, July 10, 2005, Chapter 225) Application. A state agency, individual, partnership association, corporation or joint venture (collectively, Entity) that owns, maintains or licenses computerized data that includes PI. Security Breach Definition. Unauthorized acquisition of unencrypted computerized data that compromises the security, confidentiality, or integrity of PI maintained by the Entity. • Effective March 1, 2006 Good-faith acquisition of PI by an employee or agent of the Entity for the purposes of the Entity is not a breach of the security of the system, provided that the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security of the system which poses a significant risk of identity theft following discovery or notification of the breach in the security of the data to any resident of RI whose unencrypted PI was, or is reasonably believed to have been, acquired by an unauthorized person or a person without authority, to acquire said information. • Notification of a breach is not required if, after an appropriate investigation or after consultation with relevant federal, state, or local law enforcement agencies, a determination is made that the breach has not and will not likely result in a significant risk of identity theft to the individuals whose PI has been acquired. Third-Party Data Notification. Any Entity that maintains computerized unencrypted data that includes PI that the Entity does not own shall notify the owner or licensee of the information of any breach of the security of the data which poses a significant risk of identity theft immediately following discovery, if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted: • Social Security Number; • Driver license number or RI identification card number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account. - 116 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 118. Revised October 2013 Notice Required. Notice may be provided by any of the following methods: • Written notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $25,000, or that the affected class of subject persons to be notified exceeds 50,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the Entity has an email address for the subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. Any Entity that maintains its own security breach procedures as part of an information security policy for the treatment of PI and otherwise complies with the timing requirements of the statute, shall be deemed to be in compliance with the security breach notification, provided such Entity notifies subject persons in accordance with such Entity’s policies in the event of a breach of security. Exception: Compliance with Other Laws. • Compliance with Primary Regulator. Any Entity that maintains a security breach procedure pursuant to the rules, regulations, procedures or guidelines established by the primary or functional regulator shall be deemed to be in compliance with the security breach notification requirements of this section, provided such Entity notifies subject persons in accordance with the policies or the rules, regulations, procedures or guidelines established by the primary or functional regulator in the event of a breach of security of the system. • Federal Interagency Guidance. A financial institution, trust company, credit union or its affiliates that is subject to and examined for, and found in compliance with the Federal Interagency Guidelines on Response Programs for Unauthorized Access to Customer Information and Customer Notice shall be deemed in compliance with this chapter. • HIPAA-Covered Entities. A provider of health care, health care service plan, health insurer, or a covered entity governed by the medical privacy and security rules issued by the federal Department of Health and Human Services pursuant to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) shall be deemed in - 117 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 119. Revised October 2013 compliance with this chapter. Penalties. Each violation is a civil violation for which a penalty of not more than $100 per occurrence and not more than $25,000 may be adjudged against a defendant. Other Key Provisions: • Delay for Law Enforcement. The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The required notification shall be made after the law enforcement agency determines that it will not compromise the investigation. • Waiver Not Permitted. - 118 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 120. Revised October 2013 South Carolina S.C. Code § 39-1-90 S.B. 453 (signed into law April 2, 2008) Effective July 1, 2009 H.B. 3248 (signed into law April 23, 2013) Effective April 23, 2013 Application. A natural person, an individual, or a corporation, government or governmental subdivision or agency, trust, estate, partnership, cooperative or association (collectively, Entity) conducting business in SC, and owning or licensing computerized data or other data that includes PI. Security Breach Definition. Unauthorized access to and acquisition of computerized data that was not rendered unusable through encryption, redaction, or other methods that compromises the security, confidentiality, or integrity of PI maintained by the Entity, when illegal use of the information has occurred or is reasonably likely to occur or use of the information creates a material risk of harm to a resident. • Good-faith acquisition of PI by an employee or agent of the Entity for the purposes of its business is not a breach of the security of the system if the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of SC whose unencrypted and unredacted PI was, or is reasonably believed to have been, acquired by an unauthorized person when the illegal use of the information has occurred or is reasonably likely to occur or use of the information creates a material risk of harm to the resident. Notification to Consumer Reporting Agencies. If an Entity provides notice to more than 1,000 persons at one time pursuant to the statute, the Entity shall notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on a nationwide basis of the timing, distribution, and content of the notice. Attorney General/Agency Notification. If an Entity provides notice to more than 1,000 SC residents, the Entity shall notify, without unreasonable delay, the Consumer Protection Division of the Department of Consumer Affairs of the timing, distribution, and content of the notice. Third-Party Data Notification. An Entity conducting business in SC and maintaining computerized data or other data that includes PI that the Entity does not own shall notify the owner or licensee of the information of a breach of the security of the data immediately following discovery, if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The disclosure must be made in the most expedient time possible and without unreasonable delay, consistent with measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Personal Information Definition. The first name or first initial and last name in combination with and linked to any one or more of the following data elements that relate to a resident of SC, when the data elements are neither - 119 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 121. Revised October 2013 encrypted nor redacted: • Social Security Number; • Driver license number or state identification card number issued instead of a driver license; • Financial account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to a resident’s financial account; or • Other numbers or information that may be used to access a person’s financial accounts or numbers or information issued by a governmental or regulatory entity that uniquely will identify an individual. PI does not include information that is lawfully obtained from publicly available information, or from federal, state, or local government records lawfully made available to the general public. Notice Required. Notice may be provided by one of the following methods: • Written notice; • Telephonic notice; or • Electronic notice, if the person’s primary method of communication with the individual is by electronic means or is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice exceeds $250,000, or that the affected class of subject persons to be notified exceeds 500,000, or the person has insufficient contact information. Substitute notice consists of: • Email notice when the Entity has an email address for the subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and is otherwise consistent with the timing requirements of the statute shall be deemed to be in compliance with the notification requirements of the statute if it notifies subject persons in accordance with its policies in the event of a breach of security of the system. Exception: Compliance with Other Laws. - 120 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 122. Revised October 2013 • Gramm-Leach-Bliley Act. This section does not apply to a bank or financial institution that is subject to and in compliance with the privacy and security provisions of the Gramm-Leach-Bliley Act. • Interagency Guidance. A financial institution that is subject to and in compliance with the federal Interagency Guidance Response Programs for Unauthorized Access to Consumer Information and Customer Notice, issued March 7, 2005, by the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the Office of the Comptroller of the Currency, and the Office of Thrift Supervision, as amended, is considered to be in compliance with this section. Penalties. A person who knowingly and willfully violates this section is subject to an administrative fine of $1,000 for each resident whose information was accessible by reason of the breach, the amount to be decided by the Department of Consumer Affairs. Other Key Provisions: • Delay for Law Enforcement. The notification required by the statute may be delayed if a law enforcement agency determines that the notification impedes a criminal investigation. The notification required by the statute must be made after the law enforcement agency determines that it no longer compromises the investigation. • Private Right of Action. A resident of SC who is injured by a violation of this section, in addition to and cumulative of all other rights and remedies available at law, may: institute a civil action to recover damages in case of a willful and knowing violation; institute a civil action to recover only actual damages resulting from a violation in case of a negligent violation; seek an injunction to enforce compliance; and recover attorney’s fees and court costs, if successful. - 121 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 123. Revised October 2013 Tennessee Tenn. Code § 47-18-2107 Application. Any person or business that conducts business in TN, or any agency of TN or any of its political subdivisions (collectively, Entity), that owns or licenses computerized data that includes PI. • H.B. 2170 (signed into law June 8, 2005, Chapter 473) Effective July 1, 2005 The provisions governing maintenance of PI that the Entity does not own appear applicable to any Entity maintaining PI, whether or not the Entity conducts business in TN. Security Breach Definition. Unauthorized acquisition of unencrypted computerized data that materially compromises the security, confidentiality, or integrity of PI maintained by the Entity. • Good-faith acquisition of PI by an employee or agent of the Entity for the purposes of the Entity is not a breach of the security of the system, provided that the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security of the system, following discovery or notification of the breach in the security of the data, to any resident of TN whose unencrypted PI was, or is reasonably believed to have been, acquired by an unauthorized person. Notification to Consumer Reporting Agencies. If an Entity is required to notify more than 1,000 persons at one time, the person shall also notify, without unreasonable delay, all consumer reporting agencies and credit bureaus that compile and maintain files on consumers on a nationwide basis of the timing, distribution and content of the notices. Third-Party Data Notification. Any Entity that maintains computerized data that includes PI that the Entity does not own shall notify the owner or licensee of the information of any breach of the security of the data immediately following discovery, if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Personal Information Definition. An individual’s first name or first initial and last name, in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted: • Social Security Number; • Driver license number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial - 122 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 124. Revised October 2013 account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by one of the following methods: • Written notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, or that the affected class of subject persons to be notified exceeds 500,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the Entity has an email address for the subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and is otherwise consistent with the timing requirements of the statute shall be deemed to be in compliance with the notification requirements of the statute if it notifies subject persons in accordance with its policies in the event of a breach of security of the system. Exception: Compliance with Other Laws. • The provisions of this statute shall not apply to any Entity that is subject to the provisions of Title V of the Gramm-Leach-Bliley Act. Other Key Provisions: • Delay for Law Enforcement. The notification required may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The required notification shall be made after the law enforcement agency determines that it will not compromise the investigation. • Private Right of Action. - 123 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 125. Revised October 2013 Texas Tex. Bus. & Com. Code §§ 521.002, 521.053 Acts 2007, 80th Leg., ch. 885, § 2.01. Amended by Acts 2009, 81st Leg., ch. 419, § 3. Effective April 1, 2009 Application. A person (Entity) that conducts business in TX and owns or licenses computerized data that includes sensitive PI. • Security Breach Definition. Unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of sensitive PI maintained by an Entity, including data that is encrypted if the person accessing the data has the key required to decrypt the data. • Acts 2011, 82nd Leg., ch. 1126, § 14 (H.B. No. 300). Effective Sept. 1, 2012 S.B. 1610 (signed into law June 14, 2013) Effective June 14, 2013 The provisions governing maintenance of sensitive PI that the Entity does not own appear applicable to any Entity maintaining PI, whether or not the Entity conducts business in TX. Good-faith acquisition of sensitive PI by an employee or agent of the Entity for the purposes of the Entity is not a breach of system security unless the sensitive PI is used or disclosed by the person in an unauthorized manner. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of system security, after discovering or receiving notification of the breach, to any person, including nonresidents, whose sensitive PI was, or is reasonably believed to have been, acquired by an unauthorized person. Notification to Consumer Reporting Agencies. If an Entity is required by this section to notify at one time more than 10,000 persons of a breach of system security, the Entity shall also notify, without unreasonable delay, all consumer reporting agencies that maintain files on consumers on a nationwide basis of the timing, distribution, and content of the notices. Third-Party Data Notification. Any Entity that maintains computerized data that includes sensitive PI that the Entity does not own shall notify the owner or license holder of the information of any breach of system security immediately after discovering the breach, if the sensitive PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The disclosure shall be made as quickly as possible, consistent with the legitimate needs of law enforcement or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Sensitive Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following items, if the name and the items are not encrypted: • Social Security Number; • Driver license number or government-issued ID number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial - 124 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 126. Revised October 2013 account. Sensitive PI also includes information that identifies an individual and relates to: • The physical or mental health or condition of the individual; • The provision of health care to the individual; or • Payment for the provision of health care to the individual. Sensitive PI does not include publicly available information that is lawfully made available to the general public from the federal government or a state or local government. Notice Required. Notice may be provided by one of the following methods: • Written notice at the last known address of the individual; or • Electronic notice, if the notice is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). However, if the affected person is a resident of a state that has its own breach notification requirement, the Entity may provide notice under that state’s law or under Texas’s law. Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, the number of affected persons exceeds 500,000, or the Entity does not have sufficient contact information, the notice may be given by any of the following: • Email notice when the Entity has an email address for the affected persons; • Conspicuous posting of the notice on the Entity’s Web site; or • Notice published in or broadcast on major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of sensitive PI that complies with the timing requirements for notice under this section complies with this section if the Entity notifies affected persons in accordance with that policy. Other Key Provisions: • Delay for Law Enforcement. An Entity may delay providing notice as required at the request of a law enforcement agency that determines that the notification will impede a criminal investigation. The required notification shall be made as soon as the law enforcement agency determines that the required notice will not compromise the investigation. - 125 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 127. Revised October 2013 • AG Enforcement. Remedies include injunctive relief and civil penalties of at least $2,000 but not more than $50,000 for each violation. • Civil penalties for failure to comply with notification requirements are raised to up to $100 per person to whom notification is due, per day, not to exceed $250,000 per breach. - 126 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 128. Revised October 2013 Utah Application. Any Entity who owns or licenses computerized data that includes PI concerning a UT resident. Utah Code §§ 13-44-101, 1344-202, 13-44-301 Security Breach Definition. Unauthorized acquisition of computerized data maintained by an Entity that compromises the security, confidentiality, or integrity of PI. S.B. 69 (signed into law March 20, 2006, Session Law Chapter 343) Effective January 1, 2007 S.B. 208 (signed into law March 30, 2009) • Does not include the acquisition of PI by an employee or agent of the Entity possessing unencrypted computerized data unless the PI is used for an unlawful purpose or disclosed in an unauthorized manner. Notification Obligation. If investigation reveals that the misuse of PI for identity theft or fraud has occurred, or is reasonably likely to occur, the person shall provide notification to each affected UT resident. • Effective May 12, 2009 Notification is not required if after a good-faith, reasonable and prompt investigation the Entity determines that it is unlikely that PI has been or will be misused for identity theft or fraud. Third-Party Data Notification. An Entity that maintains computerized data that includes PI that the Entity does not own or license shall notify and cooperate with the owner or licensee of the information of any breach of system security immediately following the Entity’s discovery of the breach if misuse of the PI occurs or is reasonably likely to occur. Timing of Notification. Notification shall be provided in the most expedient time possible without unreasonable delay, after determining the scope of the breach of system security and after restoring the reasonable integrity of the system. Personal Information Definition. A person’s first name or first initial and last name, combined with any one or more of the following data elements relating to that person when either the name or data element is unencrypted or not protected by another method that renders the data unreadable or unusable: • Social Security Number; • Driver license number or state identification card number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to the person’s account. PI does not include information regardless of its source, contained in federal, state, or local government records or in widely distributed media that are lawfully made available to the general public. Notice Required. Notice may be provided by one of the following methods: • In writing by first-class mail to the most recent address the Entity has for the resident; • By telephone, including through the use of automatic dialing - 127 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 129. Revised October 2013 technology not prohibited by other law; • Electronically, if the Entity’s primary method of communication with the resident is by electronic means, or if provided consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act); or • By publishing notice of the breach of system security in a newspaper of general circulation. Such notice must comply with Utah Code § 451-101. Substitute Notice. Substitute notice is not available in UT. Exception: Own Notification Policy. If an Entity maintains its own notification procedures as part of an information security policy for the treatment of PI the Entity is considered to be in compliance with this chapter’s notification requirements if the procedures are otherwise consistent with this chapter’s timing requirements and the Entity notifies each affected UT resident in accordance with the Entity’s information security policy in the event of a breach. Exception: Compliance with Other Laws. An Entity who is regulated by state or federal law and maintains procedures for a breach of system security under applicable law established by the primary state or federal regulator is considered to be in compliance with this part if the Entity notifies each affected UT resident in accordance with the other applicable law in the event of a breach. Penalties. Violators are subject to a civil fine of no more than $2,500 for a violation or series of violations concerning a specific consumer and no more than $100,000 in the aggregate for related violations concerning more than one consumer. Other Key Provisions: • Delay for Law Enforcement. An Entity may delay providing notification at the request of a law enforcement agency that determines that notification may impede a criminal investigation. Notification shall be provided in good faith, without unreasonable delay, and in the most expedient time possible after the law enforcement agency informs the person that notification will no longer impede the criminal investigation. • AG Enforcement. • Waiver Not Permitted. - 128 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 130. Revised October 2013 Vermont 9 V.S.A. §§ 2430, 2435 S. 284 (signed into law May 18, 2006, Act 162). Amended by H. 254 (signed into law May 8, 2012, Act 109). Effective May 8, 2012. H. 513 (signed into law May 13, 2013) Application. Any data collector, including, but not limited to, the state, state agencies, political subdivisions of the state, public and private universities, privately and publicly held corporations, limited liability companies, financial institutions, retail operators, and any other entity that, for any purpose, whether by automated collection or otherwise, handles, collects, disseminates, or otherwise deals with nonpublic PI (Entity), that owns or licenses computerized PI that includes PI concerning an individual residing in VT. Security Breach Definition. Unauthorized acquisition of electronic data or a reasonable belief of such unauthorized acquisition that compromises the security, confidentiality, or integrity of PI maintained by an Entity. • Effective May 13, 2013 Does not include good-faith but unauthorized acquisition or access of PI by an employee or agent of the Entity for a legitimate purpose of the Entity, provided that the PI is not used for a purpose unrelated to the Entity’s business or subject to further unauthorized disclosure. To determine whether this definition applies, any Entity may consider the following factors (among others): • Indications that the information is in the physical possession and control of a person without valid authorization, such as a lost or stolen computer or other device containing information; • Indications that the information has been downloaded or copied; • Indications that the information was used by an unauthorized person, such as fraudulent accounts opened or instances of identity theft reported; or • That the information has been made public. Notification Obligation. An Entity shall notify affected individuals residing in VT that there has been a security breach following discovery or notification to the Entity of the breach. • Notice of a security breach is not required if the Entity establishes that misuse of PI is not reasonably possible and the Entity provides notice of the determination that the misuse of the PI is not reasonably possible and a detailed explanation for said determination to the VT AG or to the Department of Banking, Insurance, Securities, and Health Care Administration in the event that the Entity is a person or entity licensed or registered with the Department. Notification to Consumer Reporting Agencies. In the event an Entity is required to provide notice to more than 1,000 residents of VT at one time, the Entity shall notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the timing, distribution, and content of the notice. This subsection shall not apply to a person who is licensed or registered under Title 8 by the department of banking, insurance, securities, and health care administration. Attorney General/Agency Notification. An Entity shall notify the AG or - 129 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 131. Revised October 2013 Department of Financial Regulation of any breach within 14 days of the date the Entity discovers the breach or the date the Entity provides notice to consumers, whichever is sooner. Any Entity that has, prior to the breach, sworn in writing on a form and in a manner prescribed by the AG that the Entity maintains written policies and procedures to maintain the security of PI and respond to breaches in a manner consistent with state law shall notify the AG before providing notice to consumers. Notice to the AG shall contain the date the breach occurred, the date the breach was discovered, and a description of the breach. If the date of the breach is unknown, then the Entity shall send notice to the AG or the Department as soon as the date becomes known. If an Entity provides notice of the breach to consumers, the Entity shall notify the AG or the Department of the number of Vermont affected, if known, and shall provide a copy of the notice that was provided to consumers. An Entity may also send the AG or Department a second copy of the notice to consumers that redacts the type of PI breached for any public disclosure of the breach. Third-Party Data Notification. Any Entity that maintains or possesses computerized data containing PI of an individual residing in VT that the Entity does not own or license or any Entity that conducts business in VT that maintains or possesses records or data containing PI that the Entity does not own or license shall notify the owner or licensee of the information of any security breach immediately following discovery of the breach, consistent with the legitimate needs of law enforcement. Timing of Notification. Notice of the breach shall be made in the most expedient time possible and without unreasonable delay, but not later than 45 days after the discovery of the breach, consistent with any measures necessary to determine the scope of the breach and restore the reasonable integrity, security, and confidentiality of the data system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or redacted or protected by another method that renders them unreadable or unusable by unauthorized persons: • Social Security Number; • Motor vehicle operator’s license number or nondriver identification card number; • Account number or credit card number or debit card number if circumstances exist in which the number could be used without additional identifying information, access codes, or passwords; or • Account passwords or personal identification numbers or other access codes for a financial account. - 130 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 132. Revised October 2013 PI does not mean publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. The notice to a consumer shall be clear and conspicuous and include a description of each of the following, if known to the Entity: • The incident in general terms; • The type of PI that was subject to the security breach; • The general acts of the Entity to protect the PI from further security breach; • A telephone number (toll-free, if available) that the consumer may call for further information and assistance; • Advice that directs the consumer to remain vigilant by reviewing account statements and monitoring free credit reports; and • The approximate date of the security breach. Notice may be provided by one of the following methods: • Written notice mailed to the individual’s residence; • Telephonic notice, provided that telephonic contact is made directly with each affected resident of VT, and the telephonic contact is not through a prerecorded message; or • Electronic notice, for those individuals for whom the Entity has a valid e-mail address if: (i) the Entity does not have the individual’s address or telephone contact information, the Entity’s primary method of communication with the individual is by electronic means, the electronic notice does not request or contain a hypertext link to a request that the individual provide PI, and the electronic notice conspicuously warns individuals not to provide PI in response to electronic communications regarding security breaches; or (ii) the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing written or telephonic notice to affected residents would exceed $5,000, or that the affected class of affected residents to be provided written or telephonic notice exceeds 5,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide and regional media. Exception: Compliance with Other Laws. - 131 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 133. Revised October 2013 • A financial institution that is subject to the following guidance, and any revisions, additions, or substitutions relating to said interagency guidance shall be exempt from this section: (i) The Federal Interagency Guidance Response Programs for Unauthorized Access to Consumer Information and Customer Notice, issued on March 7, 2005, by the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the Office of the Comptroller of the Currency, and the Office of Thrift Supervision; or (ii) Final Guidance on Response Programs for Unauthorized Access to Member Information and Member Notice, issued on April 14, 2005, by the National Credit Union Administration. Other Key Provisions: • Delay for Law Enforcement. The required notice to a consumer shall be delayed upon request of a law enforcement agency. A law enforcement agency may request the delay if it believes that notification may impede a law enforcement investigation, or a national or homeland security investigation, or jeopardize public safety or national or homeland security interests. In the event law enforcement makes the request in a manner other than in writing, the Entity shall document such request contemporaneously in writing, including the name of the law enforcement officer making the request and the officer’s law enforcement agency engaged in the investigation. The Entity shall provide the required notice without unreasonable delay upon receipt of a written communication, which includes facsimile or electronic communication, from the law enforcement agency withdrawing its request for delay. • AG Enforcement. • Waiver Not Permitted. - 132 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 134. Revised October 2013 Virginia Va. Code § 18.2-186.6 (effective July 1, 2008), § 32.1127.1:05 (effective January 1, 2011) Application. An individual, corporation, business trust, estate, partnership, limited partnership, limited liability partnership, limited liability company, association, organization, joint venture, government, governmental subdivision, agency, or instrumentality or any other legal entity, whether for profit or not for profit (collectively, Entity) that owns or licenses computerized data that includes PI. • A separate provision covering health information applies only to government entities, defined as any authority, board, bureau, commission, district or agency of the Commonwealth or of any political subdivision of the Commonwealth, including cities, towns and counties, municipal councils, governing bodies of counties, school boards and planning commissions; boards of visitors of public institutions of higher education; and other organizations, corporations, or agencies in VA supported wholly or principally by public funds. Security Breach Definition. Unauthorized access and acquisition of unencrypted and unredacted computerized data that compromises the security or confidentiality of PI maintained by an Entity as part of a database of PI regarding multiple individuals and that causes, or the Entity reasonably believes has caused, or will cause, identity theft or other fraud to any resident of VA. • Good-faith acquisition of PI by an employee or agent of an Entity for the purposes of the Entity is not a breach of the security of the system, provided that the PI is not used for a purpose other than a lawful purpose of the individual or entity or subject to further unauthorized disclosure. Notification Obligation. If unencrypted or unredacted PI was or is reasonably believed to have been accessed and acquired by an unauthorized person and causes, or the Entity reasonably believes has caused or will cause, identity theft or another fraud to any resident of VA, an Entity to which the statute applies shall disclose any breach of the security of the system following discovery or notification of the breach of the security of the system to any affected resident of VA. • An Entity shall disclose the breach of the security of the system if encrypted information is accessed and acquired in an unencrypted form, or if the security breach involves a person with access to the encryption key and the Entity reasonably believes that such a breach has caused or will cause identity theft or other fraud to any resident of VA. • For health information, the Entity must notify both the subject of the medical information and any affected resident of the VA, if those are not the same person. Notification to Consumer Reporting Agencies. In the event an Entity provides notice to more than 1,000 persons at one time pursuant to the - 133 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 135. Revised October 2013 general security breach section, the Entity shall notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis, as defined in 15 U.S.C. Section 1682(a)(p), of the timing, distribution, and content of the notice. Attorney General/Agency Notification. The state AG must be notified whenever any VA residents are notified under the criteria above. In the event an Entity provides notice to more than 1,000 persons at one time pursuant to this section, the individual or entity shall notify, without unreasonable delay, the state AG of the timing, distribution, and content of the notice. For health information, the Entity must also notify the Commissioner of Health. Third-Party Data Notification. An Entity that maintains computerized data that includes PI that the Entity does not own or license shall notify the owner or licensee of the information of any breach of the security of the system without unreasonable delay following discovery of the breach of the security of the system, if the PI was accessed and acquired by an unauthorized person or the Entity reasonably believes the PI was accessed and acquired by an unauthorized person. Timing of Notification. Notice required by the statute shall be made without unreasonable delay. Notice may be reasonably delayed to allow individual or entity to determine scope of the breach of security and restore the reasonable integrity of the system. Personal Information Definition. The first name or first initial and last name in combination with and linked to any one or more of the following data elements that relate to a resident of VA, when the data elements are neither encrypted nor redacted: • Social Security Number; • Driver license number or state identification card number issued in lieu of a driver license number; or • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to a resident’s financial accounts. The health information breach law applies to the first name or first initial and last name with any of the following elements: • Any information regarding an individual’s medical or mental health history, mental or physical condition, or medical treatment or diagnosis by a health care professional; or • An individual’s health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individual’s application and claims history, including any appeals records. PI does not include information that is lawfully obtained from publicly available - 134 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 136. Revised October 2013 information, or from federal, state, or local government records lawfully made available to the general public. Notice Required. Notice shall include a description of the following: • The incident in general terms; • The type of PI or medical information that was subject to the unauthorized access and acquisition; • The general acts of the individual or entity to protect the PI from further unauthorized access; • A telephone number that the person may call for further information and assistance, if one exists; and • Advice that directs the person to remain vigilant by reviewing account statements and monitoring free credit reports. Notice means: • Written notice to the last known postal address in the records of the individual or entity; • Telephone notice; or • Electronic notice. Substitute Notice Available. If the Entity demonstrates that the cost of providing notice will exceed $50,000, the affected class of VA residents to be notified exceeds 100,000 residents, or the individual or the entity does not have sufficient contact information or consent to provide written, electronic or telephonic notice. Substitute notice consists of all of the following: • E-mail notice if the individual or the entity has e-mail addresses for the members of the affected class of residents; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notice to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information privacy or security policy for the treatment of PI that are consistent with the timing requirements of this section shall be deemed to be in compliance with the notification requirements of this section if it notifies residents of VA in accordance with its procedures in the event of a breach of the security of the system. Exception: Compliance with Other Laws. • Gramm-Leach-Bliley Act. An entity that is subject to Title V of the Gramm-Leach-Bliley Act and maintains procedures for notification of a breach of the security of the system in accordance with the - 135 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 137. Revised October 2013 provision of that Act and any rules, regulations, or guidelines promulgated thereto shall be deemed to be in compliance with this section. • Primary Regulator. An entity that complies with the notification requirements or procedures pursuant to the rules, regulations, procedures, or guidelines established by the entity’s primary or functional state or federal regulator shall be in compliance with this section. • HIPAA-Covered Entities. The notification requirements for incidents involving medical information do not apply to (i) a “covered entity” or “business associate” subject to requirements for notification in the case of a breach of protected health information (42 U.S.C. § 17932 et seq.) or (ii) a person or entity who is a non-HIPAA-covered entity subject to the Health Breach Notification Rule promulgated by the Federal Trade Commission pursuant to 42 U.S.C. § 17937 et seq. Penalties. The state AG may impose a civil penalty not to exceed $150,000 per breach of the security of the system or a series of breaches of a similar nature that are discovered in a single investigation. (This provision does not apply to health information breaches.) Other Key Provisions: • Delay for Law Enforcement. Notice required by this section may be delayed if, after the Entity notifies a law enforcement agency, the law enforcement agency determines and advises the Entity that the notice will impede a criminal or civil investigation, or homeland or national security. Notice shall be made without unreasonable delay after the law enforcement agency determines that the notification will no longer impede the investigation or jeopardize national or homeland security. • AG Enforcement. - 136 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 138. Revised October 2013 Washington Wash. Rev. Code § 19.255.010 et seq. S.B. 6043 (signed into law May 10, 2005, Chapter 368) Application. Any state or local agency or any person or business which conducts business in WA (collectively, Entity) that owns or licenses computerized data that includes PI. Security Breach Definition. Unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of PI maintained by the Entity. • Effective July 24, 2005 H.B. 1149 (signed into law March 22, 2010) requiring reimbursement from payment processors, businesses, and vendors to financial institutions for the cost of replacing credit and debit cards after a breach Effective July 1, 2010 Good-faith acquisition of PI by an employee or agent of the Entity for the purposes of the Entity is not a breach of the security of the system when the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of WA whose unencrypted PI was, or is reasonably believed to have been, acquired by an unauthorized person. • An Entity shall not be required to disclose a technical breach of the security system that does not seem reasonably likely to subject customers to a risk of criminal activity. Third-Party Data Notification. Any Entity that maintains computerized data that includes PI that the Entity does not own shall notify the owner or licensee of the information of any breach immediately following discovery, if the PI was, or is reasonably believed to have been, acquired by an unauthorized person. Timing of Notification. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted: • Social Security Number; • Driver license number or Washington identification card number; • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account. PI does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notice Required. Notice may be provided by the following methods: - 137 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 139. Revised October 2013 • Written notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $250,000, or that the affected class of subject persons to be notified exceeds 500,000, or the Entity does not have sufficient contact information. Substitute notice shall consist of all of the following: • Email notice when the Entity has an email address for the subject persons; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; and • Notification to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information security policy for the treatment of PI and is otherwise consistent with the timing requirements of this section is in compliance with the notification requirements of this section if the Entity notifies subject persons in accordance with its policies in the event of a breach of security. Other Key Provisions: • Delay for Law Enforcement. Notification may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The required notification shall be made after the law enforcement agency determines that it will not compromise the investigation. • Private Right of Action. Any customer injured by a violation of this section may institute a civil action to recover damages. • Waiver Not Permitted. Reimbursement from Businesses to Financial Institutions. In the event of a breach where an entity held unencrypted account information or was not PCI DSS compliant, payment processors, businesses, and vendors can be liable to a financial institution for the cost of reissuing credit and debit cards in the event of a breach that results in the disclosure of the full, unencrypted account information contained on an identification device, or the full, unencrypted account number on a credit or debit card or identification device plus the cardholder’s name, expiration date, or service code. - 138 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 140. Revised October 2013 West Virginia W. VA. Code § 46A-2A-101 et seq. S.B. 340 (signed into law March 27, 2008) Effective June 6, 2008 Application. An individual, corporation, business trust, estate, partnership, limited partnership, limited liability partnership, limited liability company, association, organization, joint venture, government, governmental subdivision, agency or instrumentality, or any other legal entity, whether for profit or not for profit, (collectively, Entity) that owns or licenses computerized data that includes PI. Security Breach Definition. Unauthorized access and acquisition of unencrypted and unredacted computerized data that compromises the security or confidentiality of PI maintained by an Entity as part of a database of PI regarding multiple individuals and that causes the Entity to reasonably believe that the breach of security has caused or will cause identity theft or other fraud to any resident of WV. • Good-faith acquisition of PI by an employee or agent of an Entity for the purposes of the Entity is not a breach of the security of the system, provided that the PI is not used for a purpose other than a lawful purpose of the Entity or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall give notice of any breach of the security of the system following discovery or notification of the breach of the security of the system to any resident of WV whose unencrypted and unredacted PI was or is reasonably believed to have been accessed and acquired by an unauthorized person and that causes, or the individual or entity reasonably believes has caused or will cause, identity theft or other fraud to any resident of WV. • An Entity must give notice of the breach of the security of the system if encrypted information is accessed and acquired in an unencrypted form or if the security breach involves a person with access to the encryption key and the Entity reasonably believes that such breach has caused or will cause identity theft or other fraud to any resident of this state. Notification to Consumer Reporting Agencies. If an Entity is required to notify more than 1,000 persons of a breach of security pursuant to this article, the Entity shall also notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on a nationwide basis of the timing, distribution and content of the notices. Nothing in this subsection shall be construed to require the entity to provide to the consumer reporting agency the names or other PI of breach notice recipients. Third-Party Data Notification. An Entity that maintains computerized data that includes PI that the Entity does not own or license shall give notice to the owner or licensee of the information of any breach of the security of the system as soon as practicable following discovery, if the PI was or the Entity reasonably believes was accessed and acquired by an unauthorized person. Timing of Notification. Except in order to take any measures necessary to - 139 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 141. Revised October 2013 determine the scope of the breach and to restore the reasonable integrity of the system, the notice shall be made without unreasonable delay. Personal Information Definition. The first name or first initial and last name linked to any one or more of the following data elements that relate to a resident of WV, when the data elements are neither encrypted nor redacted: • Social Security Number; • Driver license number or state identification card number issued in lieu of a driver license; or • Account number or credit card number or debit card number in combination with any required security code, access code or password that would permit access to a resident’s financial accounts. PI does not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public. Notice Required. The notice shall include: • To the extent possible, a description of the categories of information that were reasonably believed to have been accessed or acquired by an unauthorized person, including Social Security Numbers, driver licenses or state identification numbers and financial data; • A telephone number or Web site address that the individual may use to contact the entity or the agent of the entity and from whom the individual may learn: what types of information the entity maintained about that individual or about individuals in general; and whether or not the entity maintained information about that individual; and • The toll-free contact telephone numbers and addresses for the major credit reporting agencies and information on how to place a fraud alert or security freeze. Notice may be provided by one of the following methods: • Written notice to the postal address in the records of the Entity; • Telephonic notice; or • Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act). Substitute Notice Available. If an Entity demonstrates that the cost of providing notice will exceed $50,000, or that the affected class of residents to be notified exceeds 100,000 persons, or that the Entity does not have sufficient contact information to provide notice. Substitute notice consists of any two of the following: - 140 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 142. Revised October 2013 • E-mail notice if the Entity has e-mail addresses for the members of the affected class of residents; • Conspicuous posting of the notice on the Entity’s Web site if the Entity maintains one; or • Notice to major statewide media. Exception: Own Notification Policy. An Entity that maintains its own notification procedures as part of an information privacy or security policy for the treatment of PI and that are consistent with the timing requirements of this article shall be deemed to be in compliance with the notification requirements of this article if it notifies residents of WV in accordance with its procedures in the event of a breach of security of the system. Exception: Compliance with Other Laws. • Federal Interagency Guidance. A financial institution that responds in accordance with the notification guidelines prescribed by the Federal Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice is deemed to be in compliance with this article. • Primary Regulator. An Entity that complies with the notification requirements or procedures pursuant to the rules, regulation, procedures or guidelines established by the Entity’s primary or functional regulator shall be in compliance with this article. Other Key Provisions: • Delay for Law Enforcement. Notice required by this section may be delayed if a law-enforcement agency determines and advises the Entity that the notice will impede a criminal or civil investigation or homeland or national security. Notice required by this section must be made without unreasonable delay after the law-enforcement agency determines that notification will no longer impede the investigation or jeopardize national or homeland security. • AG Enforcement. • This subsection shall not apply to an entity subject to Title V of the Gramm-Leach-Bliley Act. - 141 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 143. Revised October 2013 Wisconsin Wis. Stat. § 134.98 S.B. 164 (signed into law March 16, 2006, Act 138) Effective March 31, 2006 Application. Any Entity that maintains or licenses PI in WI or that knows that PI pertaining to a resident of WI has been acquired by a person whom the Entity has not authorized to acquire the PI. Entity includes: the state of WI and any office, department, independent agency, authority, institution, association, society, or other body in state government created or authorized to be created by the constitution or any law, including the legislature and the courts; a city, village, town, or county; a person, other than an individual, that does any of the following: • Conducts business in WI and maintains PI in the ordinary course of business; • Licenses PI in WI; • Maintains for a resident of WI a depository account; • Lends money to a resident of WI. Security Breach Definition. When an Entity whose principal place of business is located in WI or an Entity that maintains or licenses PI in WI knows that PI in the Entity’s possession has been acquired by a person whom the Entity has not authorized to acquire the PI, or, in the case of an Entity whose principal place of business is not located in WI, when it knows that PI pertaining to a resident of WI has been acquired by a person whom the Entity has not authorized to acquire the PI. Notification Obligation. Any Entity to which the statute applies shall make reasonable efforts to notify each subject of the PI. • An Entity is not required to provide notice of the acquisition of PI if the acquisition of PI does not create a material risk of identity theft or fraud to the subject of the PI or if the PI was acquired in good faith by an employee or agent of the Entity, if the PI is used for a lawful purpose of the Entity. Notification to Consumer Reporting Agencies. If, as the result of a single incident, an Entity is required to notify 1,000 or more individuals that PI pertaining to the individuals has been acquired, the Entity shall without unreasonable delay notify all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis, of the timing, distribution, and content of the notices sent to the individuals. Third-Party Data Notification. If a person, other than an individual, that stores PI pertaining to a resident of WI, but does not own or license the PI, knows that the PI has been acquired by a person whom the person storing the PI has not authorized to acquire the PI, and the person storing the PI has not entered into a contract with the person that owns or licenses the PI, the person storing the PI shall notify the person that owns or licenses the PI of the acquisition as soon as practicable. Timing of Notification. An Entity shall provide the notice within a reasonable - 142 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 144. Revised October 2013 time, not to exceed 45 days after the Entity learns of the acquisition of PI. A determination as to reasonableness shall include consideration of the number of notices that an Entity must provide and the methods of communication available to the Entity. Personal Information Definition. An individual’s last name and the individual’s first name or first initial, in combination with and linked to any of the following elements, if the element is not publicly available information and is not encrypted, redacted, or altered in a manner that renders the element unreadable: • Social Security Number; • Driver license number or state identification number; • Account number or credit card number or debit card number or any security code, access code, or password that would permit access to the individual’s financial account; • DNA profile; or • Unique biometric data, including fingerprint, voice print, retina or iris image, or any other unique physical representation. An element is publicly available if the Entity reasonably believes that it was lawfully made widely available through any media or lawfully made available to the general public from federal, state, or local government records or disclosures to the general public that are required to be made by federal, state, or local law. Notice Required. The notice shall indicate that the Entity knows of the unauthorized acquisition of PI pertaining to the resident of WI who is the subject of the PI. Notice may be provided by one of the following methods: • Mail; or • A method the Entity has previously employed to communicate with the subject of the PI. Substitute Notice Available. If an Entity cannot with reasonable diligence determine the mailing address of the subject of the PI, and if the Entity has not previously communicated with the subject of the PI, the Entity shall provide notice by a method reasonably calculated to provide actual notice to the subject of the PI. Exception: Compliance with Other Laws. • Gramm-Leach-Bliley Act. An Entity that is subject to, and in compliance with, the privacy and security requirements of Title V of the Gramm-Leach-Bliley Act, or a person that has a contractual obligation to such an Entity, if the Entity or person has in effect a policy concerning breaches of information security. - 143 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 145. Revised October 2013 • HIPAA-Covered Entities. A health plan, health care clearinghouse, or health care provider who transmits any health information in electronic form, if the Entity complies with the requirements of 45 C.F.R. pt. 164. Other Key Provisions: • Delay for Law Enforcement. A law enforcement agency may, in order to protect an investigation or homeland security, ask an Entity not to provide a required notice for any period of time. If an Entity receives such a request, the Entity may not provide notice of or publicize an unauthorized acquisition of PI, except as authorized by the law enforcement agency that made the request. - 144 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 146. Revised October 2013 Wyoming Wyo. Stat. § 40-12-501 et seq. Effective July 1, 2007 Application. An individual or commercial entity (collectively, Entity) that conducts business in WY and that owns or licenses computerized data that includes PI about a resident of WY. Security Breach Definition. Unauthorized acquisition of computerized data that materially compromises the security, confidentiality or integrity of PI maintained by an Entity and causes or is reasonably believed to cause loss or injury to a resident of WY. • Good-faith acquisition of PI by an employee or agent of an Entity for the purposes of the Entity is not a breach of the security of the data system, provided that the PI is not used or subject to further unauthorized disclosure. Notification Obligation. Any Entity to which the statute applies shall, when it becomes aware of a breach of the security of the system, conduct in good faith a reasonable and prompt investigation to determine the likelihood that PI has been or will be misused. If the investigation determines that the misuse of PI about a WY resident has occurred or is reasonably likely to occur, the Entity shall give notice as soon as possible to the affected WY resident. Third-Party Data Notification. An Entity that maintains computerized data that includes PI on behalf of another Entity shall disclose to the Entity for which the information is maintained any breach of the security of the system as soon as practicable following the determination that PI was, or is reasonably believed to have been, acquired by an unauthorized person. The Entity that maintains the data on behalf of another Entity and Entity on whose behalf the data is maintained may agree which Entity will provide any required notice, provided only a single notice for each breach of the security of the system shall be required. If agreement regarding notification cannot be reached, the Entity who has the direct business relationship with the resident of WY shall provide the required notice. Timing of Notification. Notice shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the computerized data system. Personal Information Definition. The first name or first initial and last name of a person in combination with one or more of the following data elements when either the name or the data elements are not redacted: • Social Security Number; • Driver license number or WY identification card number; • Account number or credit card number or debit card number in combination with any security code, access code or password that would allow access to a financial account of the person; - 145 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 147. Revised October 2013 • Tribal identification card; or • Federal or state government-issued identification card. PI does not include information, regardless of its source, contained in any federal, state or local government records or in widely distributed media that are lawfully made available to the general public. Notice Required. Notice shall include a toll-free number that the individual may use to contact the person collecting the data, or his agent; and from which the individual may learn the toll-free contact telephone numbers and addresses for the major credit reporting agencies. Notice may be provided by one of the following methods: • Written notice; or • Electronic mail notice. Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $10,000 for WY-based Entities, and $250,000 for all other Entities operating but not based in Wyoming; that the affected class of subject persons to be notified exceeds 10,000 for WY-based Entities and 500,000 for all other businesses operating but not based in WY; or the person does not have sufficient contact information. Substitute notice shall consist of all of the following: • Conspicuous posting of the notice on the Internet, the World Wide Web or a similar proprietary or common carrier electronic system site of the person collecting the data, if the person maintains a public Internet, World Wide Web or a similar proprietary or common carrier electronic system site; and • Notification to major statewide media. The notice to media shall include a toll-free phone number where an individual can learn whether or not that individual’s personal data is included in the security breach. Exception: Compliance with Other Laws. • Certain Financial Institutions. Any financial institution as defined in 15 U.S.C. § 6809 or federal credit union as defined by 12 U.S.C. § 1752 that maintains notification procedures subject to the requirements of 15 U.S.C. § 6801(b)(3) and 12 C.F.R. pt. 364 App. B or pt. 748 App. B, is deemed to be in compliance with the statute if the financial institution notifies affected WY customers in compliance with the requirements of 15 U.S.C. § 6801 through 6809 and 12 C.F.R. pt. 364 App. B or pt. 748 App. B. Other Key Provisions: • Delay for Law Enforcement. The notification required by the statute - 146 - This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24
  • 148. Revised October 2013 may be delayed if a law enforcement agency determines in writing that the notification may seriously impede a criminal investigation. • AG Enforcement. The state AG may bring an action in law or equity to address any violation of this section and for other relief that may be appropriate to ensure proper compliance with this section, to recover damages, or both. - 147 This chart is for informational purposes only. It provides general information and not legal advice or opinions regarding specific facts. The most current copy of this chart and additional information on Perkins Coie's Privacy and Security Group can be found at http://www.perkinscoie.com/privacy_security. LEGAL13997061.24