Recent years have seen significant amounts of legislative activity related to state data breach notification laws, and 2018 was no exception.  Not only did South Dakota and Alabama enact new data breach notification laws in 2018, becoming the last of 50 U.S. states to enact such laws, but other states also enacted changes to existing data breach notification laws during 2018 to expand their scope and implement additional notification requirements.  Following up on our global year-end review of major privacy and cybersecurity developments, we’ve summarized the major developments and trends observed with regards to state data breach notification laws over the past year.

  • Data Breach Notification Laws in All 50 States.  With the enactment of new data breach notification laws in South Dakota and Alabama, all fifty states and the District of Columbia have implemented data breach notification laws.  The new laws in South Dakota and Alabama, which went into effect in mid-2018, included many features commonly seen in recent amendments to other states’ existing data breach notification laws, such as expanded PII definitions, explicit notification deadlines, and state regulator notification requirements.
  • Explicit Notification Deadlines.  While most states require entities to provide breach notifications in the most expedient time possible and without unreasonable delay following the discovery of a breach, certain states’ breach notification laws include explicit deadlines for providing such notifications.  During 2018, several states joined a growing trend by revising their data breach notification laws to include explicit deadlines for notifying affected individuals.  Notably, Colorado enacted a 30-day deadline from the discovery of the breach for notifying affected individuals, which matches Florida’s 30-day deadline for the shortest notification deadline in the U.S.  Alabama, Arizona, and Oregon all passed legislation in 2018 requiring notification of affected individuals within 45 days of discovery of a breach, while Louisiana and South Dakota passed legislation requiring notification of affected individuals within 60 days of discovery.
  • Regulator Notification Requirements.  Several states passed legislation in 2018 to require notification of a breach to the state Attorney General or other state regulators.  However, most of these states will only require such notifications if a certain number of state residents have been affected by the breach.  For instance, while Colorado will now require notification to the state Attorney General within 30 days, such notification will only be required if more than 500 residents are notified of the breach.  Similarly, while Arizona passed legislation to require notification of the state Attorney General within 45 days, this requirement only applies if more than 1,000 state residents are notified of the breach.
  • Expanded PII Definitions.  Several states also passed legislation expanding the types of PII covered under data breach notification laws.  For instance, several states expanded their breach notification laws’ PII definitions to include an individual’s name in combination with biometric data, medical or health information, student or military ID numbers, online account credentials, or passport numbers.
  • Credit Monitoring Requirements.  As part of a small but growing trend, several states also implemented, or enhanced, requirements to provide free credit monitoring or identity theft protection services following certain breaches.  In the spring of 2018, amendments to Delaware’s data breach notification law entered into force that required entities to offer individuals whose Social Security numbers have been breached one year of free credit monitoring services.  In mid-2018, Connecticut passed an amendment to its data breach notification law to require entities to offer two years of free identity theft prevention and, if appropriate, identity theft mitigation services to individuals whose Social Security numbers have been breached.  Although Connecticut and Delaware, along with California, are the only states whose laws require the provision of credit monitoring or identity theft protection services after certain breaches, it will bear watching to see if other states implement similar requirements in 2019.
  • Sector-Specific Notification Requirements.  While each U.S. state now has a generally applicable data breach notification law, several states have also begun to implement additional sector-specific data breach notification requirements.  Following the implementation of the New York Department of Financial Services’ cybersecurity regulation in 2017, which included a 72-hour deadline for regulator notifications, South Carolina, Vermont, and Virginia also passed sector-specific data breach notification requirements in 2018.  South Carolina’s law, similar to the NYDFS regulations, will require regulator notifications within 72 hours for certain licensed insurers.  Vermont, meanwhile, passed a law implementing additional information security requirements for “data brokers” that will require such entities to disclose security breaches to state regulators as part of an annual required registration process.  Finally, Virginia also passed new legislation during 2018 that will require income tax preparers to notify regulators of a breach of tax “return information.”
  • Private Rights of Action and Safe Harbors.  Part of the California Consumer Privacy Act, passed by the California legislature earlier this year, will create a private right of action for certain data breach-related harms.  As subsequently amended by the legislature, the CCPA will provide a private right of action following a breach of an individual’s PII caused by an entity’s failure to implement and maintain reasonable security measures.  However, the individual must provide the entity with written notice of the alleged violations of the CCPA, and there is no private right of action if the entity cures the alleged violations within thirty days after receiving notice and provides the consumer an express written statement that the violations have been cured.  In addition, the Ohio legislature passed a bill earlier this year that provides entities with a safe harbor from certain types of tort-based liability related to data breaches if the entity implements a cybersecurity program that satisfies certain requirements set forth in the bill.

 

Print:
Email this postTweet this postLike this postShare this post on LinkedIn
Photo of Caleb Skeath Caleb Skeath

Caleb Skeath advises clients on a broad range of cybersecurity and privacy issues, including cybersecurity incident response, cybersecurity and privacy compliance obligations, internal investigations, regulatory inquiries, and defending against class-action litigation. Caleb holds a Certified Information Systems Security Professional (CISSP) certification.

Caleb specializes in assisting…

Caleb Skeath advises clients on a broad range of cybersecurity and privacy issues, including cybersecurity incident response, cybersecurity and privacy compliance obligations, internal investigations, regulatory inquiries, and defending against class-action litigation. Caleb holds a Certified Information Systems Security Professional (CISSP) certification.

Caleb specializes in assisting clients in responding to a wide variety of cybersecurity incidents, ranging from advanced persistent threats to theft or misuse of personal information or attacks utilizing destructive malware. Such assistance may include protecting the response to, and investigation of an incident under the attorney-client privilege, supervising response or investigation activities and interfacing with IT or information security personnel, and advising on engagement with internal stakeholders, vendors, and other third parties to maximize privilege protections, including the negotiation of appropriate contractual terms. Caleb has also advised numerous clients on assessing post-incident notification obligations under applicable state and federal law, developing communications strategies for internal and external stakeholders, and assessing and protecting against potential litigation or regulatory risk following an incident. In addition, he has advised several clients on responding to post-incident regulatory inquiries, including inquiries from the Federal Trade Commission and state Attorneys General.

In addition to advising clients following cybersecurity incidents, Caleb also assists clients with pre-incident cybersecurity compliance and preparation activities. He reviews and drafts cybersecurity policies and procedures on behalf of clients, including drafting incident response plans and advising on training and tabletop exercises for such plans. Caleb also routinely advises clients on compliance with cybersecurity guidance and best practices, including “reasonable” security practices.

Caleb also maintains an active privacy practice, focusing on advising technology, education, financial, and other clients on compliance with generally applicable and sector-specific federal and state privacy laws, including FERPA, FCRA, GLBA, TCPA, and COPPA. He has assisted clients in drafting and reviewing privacy policies and terms of service, designing products and services to comply with applicable privacy laws while maximizing utility and user experience, and drafting and reviewing contracts or other agreements for potential privacy issues.