Security breach notification laws

Security breach notification laws or data breach notification laws are laws that require an individuals or entities affected by a data breach, to notify their customers and other parties about the breach and take specific steps remedy the situation based on state legislature. Such laws have been irregularly enacted in all 50 U.S. states since 2002, with the last 3 states having no privacy laws protecting citizens as late as 2016. New Mexico only passed their privacy law in 2017 and South Dakota and Alabama in 2018 . These laws were enacted in response to an escalating number of breaches of consumer databases containing personally identifiable information.[1]

The first such law, the California data security breach notification law,[2] was enacted in 2002 and became effective on July 1, 2003.[3] As related in the bill statement, law requires "a state agency, or a person or business that conducts business in California, that owns or licenses computerized data that includes personal information, as defined, to disclose in specified ways, any breach of the security of the data, as defined, to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person." In addition, the law permits delayed notification "if a law enforcement agency determines that it would impede a criminal investigation." The law also requires any entity that licenses such information to notify the owner or licensee of the information of any breach of the security of the data.

In general, most state laws follow the basic tenets of California's original law: Companies must immediately disclose a data breach to customers, usually in writing.[4] California has since broadened its law to include compromised medical and health insurance information.[5] Where bills differ most is at what level the breach must be reported to the state Attorney General (usually when it affects 500 or 1000 individuals or more). Some states like California publish these data breach notifications on their oag.gov websites. Breaches must be reported if "sensitive personally identifying information has been acquired or is reasonably believed to have been acquired by an unauthorized person, and is reasonably likely to cause substantial harm to the individuals to whom the information relates."[6] This leaves room for some interpretation (will it cause substantial harm?); but breaches of encrypted data need not be reported. Nor must it be reported if data has been obtained or viewed by unauthorized individuals as long as there is no reason to believe they will use the data in harmful ways.

The National Conference of State Legislatures maintains a list of enacted and proposed security breach notification laws.[1]

A number of bills that would establish a national standard for data security breach notification have been introduced in the U.S. Congress, but none passed in the 109th Congress.[7] In his 2015 State of the Union speech, President Obama proposed new legislation to create a national data breach standard that would establish a 30-day notification requirement from the discovery of a breach.[8]

The European Union implemented a breach notification law in the Directive on Privacy and Electronic Communications (E-Privacy Directive) in 2009, specific to personal data held by telecoms and Internet service providers.[9][10] This directive has to be implemented by national law until 25 May 2011.

Furthermore, the traffic data of the subscribers, who use voice and data via a network company, is saved from the company only for operational reasons. However, the traffic data must be deleted when they aren’t necessary anymore, in order to avoid the breaches. On the other hand, the traffic data are necessary for the creation and treatment of subscriber billing. The use of these data is available only up to the end of the period that the bill can be repaid based on the law of European Union (Article 6 - paragraphs 1-6 [11]). Regarding the marketing usage of the traffic data for the sale of additional chargeable services, they can be used from the company only if the subscriber gives his/her consent (but, the consent can be withdrawn at every time). Also, the service provider must inform the subscriber or user of the types of traffic data which are processed and of the duration of that based on the above assumptions. Processing of traffic data, in accordance with the above details, must be restricted to persons acting under the authority of providers of the public communications networks and publicly available electronic communications services handling billing or traffic management, customer enquiries, fraud detection, marketing electronic communications services or providing a value added service, and must be restricted to what is necessary for the purposes of such activities.

References

  1. "Security Breach Notification Laws". www.ncsl.org. Retrieved 27 January 2019.
  2. SB 1386, Cal. Civ. Code 1798.82 and 1798.29.
  3. SB 1386 Senate Bill Archived 2007-06-13 at the Wayback Machine
  4. Scott Berinato (12 February 2008). "CSO Disclosure Series - Data Breach Notification Laws, State By State". CSO Online. Retrieved 11 May 2016.
  5. "AB 1298 Assembly Bill - CHAPTERED". Retrieved 11 May 2016.
  6. https://www.bakerlaw.com/files/uploads/documents/data%20breach%20documents/state_data_breach_statute_form.pdf
  7. "RSA Blogs". RSA.com. Retrieved 27 January 2019.
  8. "The Personal Data Notification & Protection Act" (PDF). Obamawhitehouse.archives.gov. Retrieved 4 May 2018.
  9. "Amendment of Article 4 lit 3-5 of Directive 2002/58/EC (E-Privacy Directive) by Article 2 lit 4 c) of Directive 2009/136/EC". Retrieved 27 January 2019.
  10. "New specific rules for consumers when telecoms personal data is lost or stolen in EU". Digital Single Market. 5 November 2016. Retrieved 11 May 2016.
  11. "EUR-Lex - 32002L0058 - EN - EUR-Lex". eur-lex.europa.eu. Retrieved 27 January 2019.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.