Find your Senator and share your views on important issues.
Relates to a notification of a security breach
(D) 6th Senate District
Assembly Actions - Lowercase Senate Actions - UPPERCASE | |
---|---|
Jul 25, 2019 | signed chap.117 |
Jul 22, 2019 | delivered to governor |
Jun 17, 2019 | returned to senate passed assembly ordered to third reading rules cal.135 substituted for a5635b referred to ways and means returned to assembly repassed senate |
Jun 13, 2019 | amended on third reading 5575b |
Jun 13, 2019 | vote reconsidered - restored to third reading returned to senate recalled from assembly |
Jun 05, 2019 | referred to ways and means delivered to assembly passed senate |
Jun 04, 2019 | advanced to third reading |
Jun 03, 2019 | 2nd report cal. |
May 30, 2019 | 1st report cal.1094 |
May 20, 2019 | print number 5575a |
May 20, 2019 | amend and recommit to consumer protection |
May 16, 2019 | committee discharged and committed to consumer protection |
May 07, 2019 | referred to internet and technology |
(D) Senate District
See Assembly Version of this Bill: A5635 Law Section: General Business Law Laws Affected: Amd Art 39-F Art Head, §899-aa, add §899-bb, Gen Bus L; amd §208, St Tech L Versions Introduced in 2017-2018 Legislative Session: S6933
Relates to notification of a security breach; includes credit and debit cards; increases civil penalties.
BILL NUMBER: S5575 SPONSOR: THOMAS TITLE OF BILL: An act to amend the general business law and the state technology law, in relation to notification of a security breach PURPOSE: New York's data breach notification law needs to be updated keep pace with current technology. This bill broadens the scope of information covered under the notification law and updates the notification require- ments when there has been a breach of data. It also broadens the defi- nition of a data breach to include an unauthorized person gaining access to information. It also requires reasonable data security, provides standards tailored to the size of a business, and provides protections from liability for certain entities. SUMMARY OF SPECIFIC PROVISIONS: Section 1 of the bill names the act.
Section 2 of the bill amends the title of article 39-F of the General Business Law. Section 3 of the bill amends section 899-aa of the General Business Law. The amendments would: *update the notifications section of the General Business Law by adding biometric data, email addresses or user names in combination with a password or security question answer, and protected health information held by a "covered entity" to the private information definition; *update the notifications section of the General Business Law by adding unauthorized access to the private information to the definitions of "private information" and "breach of the security of the system"; *update the notification requirement by applying it to any person or entity with private information of a New York resident, not just to those that "conduct business" in New York State; *correct typos and inconsistencies in language to clarify that breaches of private information only (and not personal information) trigger notice obligations and to make consistent all references to compromise by an unauthorized person or a person without valid authorization; *authorize businesses in certain circumstances to notify the consumer via email of the breach and if the consumer's email is believed to have been compromised authorize the business to use other electronic methods to notify the consumer; *outline penalties for businesses that fail to provide notice to consum- ers of a breach and the limitations period for the attorney general to act on any failure; *require certain information to be included in the notice that would direct consumers to federal and state data security prevention entities and require businesses to send a template of their notice to consumers to the attorney general and the Office of Information Technology Services; and, *task the Department of State with receiving and responding to data breach complaints and with informing the public of data security and breach prevention techniques. Section 4 of the bill creates a new section 899-bb of the General Busi- ness Law that would: *require reasonable data security for private information, with a more flexible standard for small businesses, without creating new require- ments for entities subject to existing or future regulations by any federal or other New York State government entity, and while providing safe harbor from enforcement for entities that are compliant with other existing data security regulations or standards; and *deem failure to provide required reasonable data security to be a violation of section 349 of the General Business Law, permitting the attorney general to bring suit but not any private plaintiff. Section 5 of the bill amends the State Technology Law. The amendments would: *include the same terms as above in the definition of private information; *state that should a data breach occur in a State entity the Office of Information Technology Services shall deliver a report on the scope of the breach to the entity affected; *require that an entity shall notify individuals affected by the data breach as quickly as possible; and, *task the office of information technology services to develop and provide regular trainings to all entities on preventing data breaches. Section 6 of the bill sets forth the effective date. JUSTIFICATION: New York's current data breach notification law needs to be updated to keep pace with individuals' use and dissemination of private informa- tion. New York also needs to join the increasing number of states that require reasonable data security protections, without imposing duplicate obligations on those already subject to other federal or New York State data security regulations and without imposing excessive costs on small business, while providing safe harbor from enforcement for entities that take steps to verify their compliance with other existing data security regulations or standards. This bill expands the scope of information subject to the current data breach notification law to include biometric information, email addresses and their corresponding passwords or secu- rity questions and answers, and protected health information as defined under HIPAA. It broadens the definition of a data breach to include unauthorized access to private information. It applies the notification requirement to any person or entity with private information of a New York resident, not just to those that conduct business in New York State. It also updates the notification procedures companies and state entities must follow when there has been a breach of private informa- tion. It also creates reasonable data security requirements tailored to the size of a business and provides protections from liability for certain entities that take steps to verify their safeguarding of private information. PRIOR LEGISLATIVE HISTORY: FISCAL IMPACT ON THE STATE: None. FISCAL IMPACT ON LOCALITIES: None. IMPACT ON THE REGULATION OF BUSINESSES AND INDIVIDUALS: The bill would impose stronger obligations on businesses handling private data of customers, regarding security and proper notification of breaches. IMPACT ON FINES, IMPRISONMENT, FORFEITURE OF RIGHTS, OR OTHER PENAL SANCTIONS: None. EFFECTIVE DATE: Sections I , 2, 3, and S of this act shall take effect on the ninetieth day after is shall have become law, and Section 4 of this act shall take effect on the two hundred fortieth day after it shall become law.
S T A T E O F N E W Y O R K ________________________________________________________________________ 5575 2019-2020 Regular Sessions I N S E N A T E May 7, 2019 ___________ Introduced by Sens. THOMAS, CARLUCCI -- (at request of the Attorney General) -- read twice and ordered printed, and when printed to be committed to the Committee on Internet and Technology AN ACT to amend the general business law and the state technology law, in relation to notification of a security breach THE PEOPLE OF THE STATE OF NEW YORK, REPRESENTED IN SENATE AND ASSEM- BLY, DO ENACT AS FOLLOWS: Section 1. This act shall be known and may be cited as the "Stop Hacks and Improve Electronic Data Security Act (SHIELD Act)". § 2. The article heading of article 39-F of the general business law, as added by chapter 442 of the laws of 2005, is amended to read as follows: NOTIFICATION OF UNAUTHORIZED ACQUISITION OF PRIVATE INFORMATION; DATA SECURITY PROTECTIONS § 3. Subdivisions 1, 2, 3, 5, 6, 7 and 8 of section 899-aa of the general business law, subdivisions 1, 2, 3, 5, 6 and 7 as added by chap- ter 442 of the laws of 2005, paragraph (c) of subdivision 1, paragraph (a) of subdivision 6 and subdivision 8 as amended by chapter 491 of the laws of 2005 and paragraph (a) of subdivision 8 as amended by section 6 of part N of chapter 55 of the laws of 2013, are amended to read as follows: 1. As used in this section, the following terms shall have the follow- ing meanings: (a) "Personal information" shall mean any information concerning a natural person which, because of name, number, personal mark, or other identifier, can be used to identify such natural person; (b) "Private information" shall mean EITHER: (I) personal information consisting of any information in combination with any one or more of the following data elements, when either the DATA ELEMENT OR THE COMBINATION OF personal information [or] PLUS the data element is not encrypted, or EXPLANATION--Matter in ITALICS (underscored) is new; matter in brackets [ ] is old law to be omitted. LBD05343-01-9
S. 5575 2 IS encrypted with an encryption key that has also been ACCESSED OR acquired: (1) social security number; (2) driver's license number or non-driver identification card number; [or] (3) account number, credit or debit card number, in combination with any required security code, access code, [or] password OR OTHER INFORMA- TION that would permit access to an individual's financial account; (4) ACCOUNT NUMBER, CREDIT OR DEBIT CARD NUMBER, IF CIRCUMSTANCES EXIST WHEREIN SUCH NUMBER COULD BE USED TO ACCESS AN INDIVIDUAL'S FINAN- CIAL ACCOUNT WITHOUT ADDITIONAL IDENTIFYING INFORMATION, SECURITY CODE, ACCESS CODE, OR PASSWORD; OR (5) BIOMETRIC INFORMATION, MEANING DATA GENERATED BY ELECTRONIC MEAS- UREMENTS OF AN INDIVIDUAL'S UNIQUE PHYSICAL CHARACTERISTICS, SUCH AS A FINGERPRINT, VOICE PRINT, RETINA OR IRIS IMAGE, OR OTHER UNIQUE PHYSICAL REPRESENTATION OR DIGITAL REPRESENTATION OF BIOMETRIC DATA WHICH ARE USED TO AUTHENTICATE OR ASCERTAIN THE INDIVIDUAL'S IDENTITY; (II) A USER NAME OR E-MAIL ADDRESS IN COMBINATION WITH A PASSWORD OR SECURITY QUESTION AND ANSWER THAT WOULD PERMIT ACCESS TO AN ONLINE ACCOUNT; OR (III) ANY UNSECURED PROTECTED HEALTH INFORMATION HELD BY A "COVERED ENTITY" AS DEFINED IN THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABIL- ITY ACT OF 1996 (45 C.F.R. PTS. 160, 162, 164), AS AMENDED FROM TIME TO TIME. "Private information" does not include publicly available information which is lawfully made available to the general public from federal, state, or local government records. (c) "Breach of the security of the system" shall mean unauthorized ACCESS TO OR acquisition OF, or ACCESS TO OR acquisition without valid authorization, of computerized data that compromises the security, confidentiality, or integrity of [personal] PRIVATE information main- tained by a business. Good faith ACCESS TO, OR acquisition of [personal], PRIVATE information by an employee or agent of the business for the purposes of the business is not a breach of the security of the system, provided that the private information is not used or subject to unauthorized disclosure. IN DETERMINING WHETHER INFORMATION HAS BEEN ACCESSED, OR IS REASONABLY BELIEVED TO HAVE BEEN ACCESSED, BY AN UNAUTHORIZED PERSON OR A PERSON WITHOUT VALID AUTHORIZATION, SUCH BUSINESS MAY CONSIDER, AMONG OTHER FACTORS, INDICATIONS THAT THE INFORMATION WAS VIEWED, COMMUNICATED WITH, USED, OR ALTERED BY A PERSON WITHOUT VALID AUTHORIZATION OR BY AN UNAU- THORIZED PERSON. In determining whether information has been acquired, or is reasonably believed to have been acquired, by an unauthorized person or a person without valid authorization, such business may consider the following factors, among others: (1) indications that the information is in the physical possession and control of an unauthorized person, such as a lost or stolen computer or other device containing information; or (2) indications that the information has been downloaded or copied; or (3) indications that the information was used by an unauthorized person, such as fraudulent accounts opened or instances of identity theft reported. (d) "Consumer reporting agency" shall mean any person which, for mone- tary fees, dues, or on a cooperative nonprofit basis, regularly engages in whole or in part in the practice of assembling or evaluating consumer S. 5575 3 credit information or other information on consumers for the purpose of furnishing consumer reports to third parties, and which uses any means or facility of interstate commerce for the purpose of preparing or furnishing consumer reports. A list of consumer reporting agencies shall be compiled by the state attorney general and furnished upon request to any person or business required to make a notification under subdivision two of this section. 2. Any person or business which [conducts business in New York state, and which] owns or licenses computerized data which includes private information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the system to any resident of New York state whose private information was, or is reasonably believed to have been, ACCESSED OR acquired by a person without valid authorization. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision four of this section, or any measures necessary to determine the scope of the breach and restore the [reasonable] integrity of the system. (A) NOTICE TO AFFECTED PERSONS UNDER THIS SECTION IS NOT REQUIRED IF THE EXPOSURE OF PRIVATE INFORMATION WAS AN INADVERTENT DISCLOSURE BY PERSONS AUTHORIZED TO ACCESS PRIVATE INFORMATION, AND THE PERSON OR BUSINESS REASONABLY DETERMINES SUCH EXPOSURE WILL NOT LIKELY RESULT IN MISUSE OF SUCH INFORMATION, OR FINANCIAL OR EMOTIONAL HARM TO THE AFFECTED PERSONS. SUCH A DETERMINATION MUST BE DOCUMENTED IN WRITING AND MAINTAINED FOR AT LEAST FIVE YEARS. THE PERSON OR BUSINESS SHALL PROVIDE THE WRITTEN DETERMINATION TO THE STATE ATTORNEY GENERAL WITHIN TEN DAYS AFTER THE DETERMINATION. (B) IF NOTICE OF THE BREACH OF THE SECURITY OF THE SYSTEM IS MADE TO AFFECTED PERSONS PURSUANT TO THE BREACH NOTIFICATION REQUIREMENTS UNDER ANY OF THE FOLLOWING LAWS, NOTHING IN THIS SECTION SHALL REQUIRE ANY ADDITIONAL NOTICE TO THOSE AFFECTED PERSONS, BUT NOTICE STILL SHALL BE PROVIDED TO THE STATE ATTORNEY GENERAL, THE DEPARTMENT OF STATE AND THE OFFICE OF INFORMATION TECHNOLOGY SERVICES PURSUANT TO PARAGRAPH (A) OF SUBDIVISION EIGHT OF THIS SECTION AND TO CONSUMER REPORTING AGENCIES PURSUANT TO PARAGRAPH (B) OF SUBDIVISION EIGHT OF THIS SECTION: (I) REGULATIONS PROMULGATED PURSUANT TO TITLE V OF THE FEDERAL GRAMM- LEACH-BLILEY ACT (15 U.S.C. 6801 TO 6809), AS AMENDED FROM TIME TO TIME; (II) REGULATIONS IMPLEMENTING THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (45 C.F.R. PARTS 160 AND 164), AS AMENDED FROM TIME TO TIME, AND THE HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT, AS AMENDED FROM TIME TO TIME; (III) PART FIVE HUNDRED OF TITLE TWENTY-THREE OF THE OFFICIAL COMPILA- TION OF CODES, RULES AND REGULATIONS OF THE STATE OF NEW YORK, AS AMENDED FROM TIME TO TIME; OR (IV) ANY OTHER DATA SECURITY RULES AND REGULATIONS OF, AND THE STAT- UTES ADMINISTERED BY, ANY OFFICIAL DEPARTMENT, DIVISION, COMMISSION OR AGENCY OF THE FEDERAL OR NEW YORK STATE GOVERNMENT AS SUCH RULES, REGU- LATIONS OR STATUTES ARE INTERPRETED BY SUCH DEPARTMENT, DIVISION, COMMISSION OR AGENCY OR BY THE FEDERAL OR NEW YORK STATE COURTS. 3. Any person or business which maintains computerized data which includes private information which such person or business does not own shall notify the owner or licensee of the information of any breach of the security of the system immediately following discovery, if the private information was, or is reasonably believed to have been, acquired by a person without valid authorization. S. 5575 4 5. The notice required by this section shall be directly provided to the affected persons by one of the following methods: (a) written notice; (b) electronic notice, provided that the person to whom notice is required has expressly consented to receiving said notice in electronic form and a log of each such notification is kept by the person or busi- ness who notifies affected persons in such form; provided further, however, that in no case shall any person or business require a person to consent to accepting said notice in said form as a condition of establishing any business relationship or engaging in any transaction. (c) telephone notification provided that a log of each such notifica- tion is kept by the person or business who notifies affected persons; or (d) substitute notice, if a business demonstrates to the state attor- ney general that the cost of providing notice would exceed two hundred fifty thousand dollars, or that the affected class of subject persons to be notified exceeds five hundred thousand, or such business does not have sufficient contact information. Substitute notice shall consist of all of the following: (1) e-mail notice when such business has an e-mail address for the subject persons, EXCEPT IF THE BREACHED INFORMATION INCLUDES AN E-MAIL ADDRESS IN COMBINATION WITH A PASSWORD OR SECURITY QUESTION AND ANSWER THAT WOULD PERMIT ACCESS TO THE ONLINE ACCOUNT, IN WHICH CASE THE PERSON OR BUSINESS SHALL INSTEAD PROVIDE CLEAR AND CONSPICUOUS NOTICE DELIVERED TO THE CONSUMER ONLINE WHEN THE CONSUMER IS CONNECTED TO THE ONLINE ACCOUNT FROM AN INTERNET PROTOCOL ADDRESS OR FROM AN ONLINE LOCATION WHICH THE PERSON OR BUSINESS KNOWS THE CONSUMER CUSTOMARILY USES TO ACCESS THE ONLINE ACCOUNT; (2) conspicuous posting of the notice on such business's web site page, if such business maintains one; and (3) notification to major statewide media. 6. (a) whenever the attorney general shall believe from evidence satisfactory to him OR HER that there is a violation of this article he OR SHE may bring an action in the name and on behalf of the people of the state of New York, in a court of justice having jurisdiction to issue an injunction, to enjoin and restrain the continuation of such violation. In such action, preliminary relief may be granted under article sixty-three of the civil practice law and rules. In such action the court may award damages for actual costs or losses incurred by a person entitled to notice pursuant to this article, if notification was not provided to such person pursuant to this article, including conse- quential financial losses. Whenever the court shall determine in such action that a person or business violated this article knowingly or recklessly, the court may impose a civil penalty of the greater of five thousand dollars or up to [ten] TWENTY dollars per instance of failed notification, provided that the latter amount shall not exceed [one] TWO hundred fifty thousand dollars. (b) the remedies provided by this section shall be in addition to any other lawful remedy available. (c) no action may be brought under the provisions of this section unless such action is commenced within [two] THREE years [immediately] after EITHER the date [of the act complained of or the date of discovery of such act] ON WHICH THE ATTORNEY GENERAL BECAME AWARE OF THE VIOLATION, OR THE DATE OF NOTICE SENT PURSUANT TO PARAGRAPH (A) OF SUBDIVISION EIGHT OF THIS SECTION, WHICHEVER OCCURS FIRST. 7. Regardless of the method by which notice is provided, such notice shall include contact information for the person or business making the S. 5575 5 notification, THE TELEPHONE NUMBERS AND WEBSITES OF THE RELEVANT STATE AND FEDERAL AGENCIES THAT PROVIDE INFORMATION REGARDING SECURITY BREACH RESPONSE AND IDENTITY THEFT PREVENTION AND PROTECTION INFORMATION, and a description of the categories of information that were, or are reason- ably believed to have been, ACCESSED OR acquired by a person without valid authorization, including specification of which of the elements of personal information and private information were, or are reasonably believed to have been, so ACCESSED OR acquired. 8. (a) In the event that any New York residents are to be notified, the person or business shall notify the state attorney general, the department of state and the [division of state police] OFFICE OF INFOR- MATION TECHNOLOGY SERVICES as to the timing, content and distribution of the notices and approximate number of affected persons AND SHALL PROVIDE A COPY OF THE TEMPLATE OF THE NOTICE SENT TO AFFECTED PERSONS. Such notice shall be made without delaying notice to affected New York resi- dents. (b) In the event that more than five thousand New York residents are to be notified at one time, the person or business shall also notify consumer reporting agencies as to the timing, content and distribution of the notices and approximate number of affected persons. Such notice shall be made without delaying notice to affected New York residents. § 4. The general business law is amended by adding a new section 899- bb to read as follows: § 899-BB. DATA SECURITY PROTECTIONS. 1. DEFINITIONS. (A) "COMPLIANT REGULATED ENTITY" SHALL MEAN ANY PERSON OR BUSINESS THAT IS SUBJECT TO, AND IN COMPLIANCE WITH, ANY OF THE FOLLOWING DATA SECURITY REQUIREMENTS: (I) REGULATIONS PROMULGATED PURSUANT TO TITLE V OF THE FEDERAL GRAMM- LEACH-BLILEY ACT (15 U.S.C. 6801 TO 6809), AS AMENDED FROM TIME TO TIME; (II) REGULATIONS IMPLEMENTING THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (45 C.F.R. PARTS 160 AND 164), AS AMENDED FROM TIME TO TIME, AND THE HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT, AS AMENDED FROM TIME TO TIME; (III) PART FIVE HUNDRED OF TITLE TWENTY-THREE OF THE OFFICIAL COMPILA- TION OF CODES, RULES AND REGULATIONS OF THE STATE OF NEW YORK, AS AMENDED FROM TIME TO TIME; OR (IV) ANY OTHER DATA SECURITY RULES AND REGULATIONS OF, AND THE STAT- UTES ADMINISTERED BY, ANY OFFICIAL DEPARTMENT, DIVISION, COMMISSION OR AGENCY OF THE FEDERAL OR NEW YORK STATE GOVERNMENT AS SUCH RULES, REGU- LATIONS OR STATUTES ARE INTERPRETED BY SUCH DEPARTMENT, DIVISION, COMMISSION OR AGENCY OR BY THE FEDERAL OR NEW YORK STATE COURTS. (B) "PRIVATE INFORMATION" SHALL HAVE THE SAME MEANING AS DEFINED IN SECTION EIGHT HUNDRED NINETY-NINE-AA OF THIS ARTICLE. (C) "SMALL BUSINESS" SHALL MEAN ANY PERSON OR BUSINESS WITH (I) FEWER THAN FIFTY EMPLOYEES; (II) LESS THAN THREE MILLION DOLLARS IN GROSS ANNUAL REVENUE IN EACH OF THE LAST THREE FISCAL YEARS; OR (III) LESS THAN FIVE MILLION DOLLARS IN YEAR-END TOTAL ASSETS, CALCULATED IN ACCORDANCE WITH GENERALLY ACCEPTED ACCOUNTING PRINCIPLES. 2. REASONABLE SECURITY REQUIREMENT. (A) ANY PERSON OR BUSINESS THAT OWNS OR LICENSES COMPUTERIZED DATA WHICH INCLUDES PRIVATE INFORMATION OF A RESIDENT OF NEW YORK SHALL DEVELOP, IMPLEMENT AND MAINTAIN REASONABLE SAFEGUARDS TO PROTECT THE SECURITY, CONFIDENTIALITY AND INTEGRITY OF THE PRIVATE INFORMATION INCLUDING, BUT NOT LIMITED TO, DISPOSAL OF DATA. (B) A PERSON OR BUSINESS SHALL BE DEEMED TO BE IN COMPLIANCE WITH PARAGRAPH (A) OF THIS SUBDIVISION IF IT EITHER: (I) IS A COMPLIANT REGULATED ENTITY AS DEFINED IN SUBDIVISION ONE OF THIS SECTION; OR S. 5575 6 (II) IMPLEMENTS A DATA SECURITY PROGRAM THAT INCLUDES THE FOLLOWING: (A) REASONABLE ADMINISTRATIVE SAFEGUARDS SUCH AS THE FOLLOWING, IN WHICH THE PERSON OR BUSINESS: (1) DESIGNATES ONE OR MORE EMPLOYEES TO COORDINATE THE SECURITY PROGRAM; (2) IDENTIFIES REASONABLY FORESEEABLE INTERNAL AND EXTERNAL RISKS; (3) ASSESSES THE SUFFICIENCY OF SAFEGUARDS IN PLACE TO CONTROL THE IDENTIFIED RISKS; (4) TRAINS AND MANAGES EMPLOYEES IN THE SECURITY PROGRAM PRACTICES AND PROCEDURES; (5) SELECTS SERVICE PROVIDERS CAPABLE OF MAINTAINING APPROPRIATE SAFE- GUARDS, AND REQUIRES THOSE SAFEGUARDS BY CONTRACT; AND (6) ADJUSTS THE SECURITY PROGRAM IN LIGHT OF BUSINESS CHANGES OR NEW CIRCUMSTANCES; AND (B) REASONABLE TECHNICAL SAFEGUARDS SUCH AS THE FOLLOWING, IN WHICH THE PERSON OR BUSINESS: (1) ASSESSES RISKS IN NETWORK AND SOFTWARE DESIGN; (2) ASSESSES RISKS IN INFORMATION PROCESSING, TRANSMISSION AND STOR- AGE; (3) DETECTS, PREVENTS AND RESPONDS TO ATTACKS OR SYSTEM FAILURES; AND (4) REGULARLY TESTS AND MONITORS THE EFFECTIVENESS OF KEY CONTROLS, SYSTEMS AND PROCEDURES; AND (C) REASONABLE PHYSICAL SAFEGUARDS SUCH AS THE FOLLOWING, IN WHICH THE PERSON OR BUSINESS: (1) ASSESSES RISKS OF INFORMATION STORAGE AND DISPOSAL; (2) DETECTS, PREVENTS AND RESPONDS TO INTRUSIONS; (3) PROTECTS AGAINST UNAUTHORIZED ACCESS TO OR USE OF PRIVATE INFORMA- TION DURING OR AFTER THE COLLECTION, TRANSPORTATION AND DESTRUCTION OR DISPOSAL OF THE INFORMATION; AND (4) DISPOSES OF PRIVATE INFORMATION WITHIN A REASONABLE AMOUNT OF TIME AFTER IT IS NO LONGER NEEDED FOR BUSINESS PURPOSES BY ERASING ELECTRONIC MEDIA SO THAT THE INFORMATION CANNOT BE READ OR RECONSTRUCTED. (C) A SMALL BUSINESS AS DEFINED IN PARAGRAPH (C) OF SUBDIVISION ONE OF THIS SECTION COMPLIES WITH SUBPARAGRAPH (II) OF PARAGRAPH (B) OF SUBDI- VISION TWO OF THIS SECTION IF THE SMALL BUSINESS'S SECURITY PROGRAM CONTAINS REASONABLE ADMINISTRATIVE, TECHNICAL AND PHYSICAL SAFEGUARDS THAT ARE APPROPRIATE FOR THE SIZE AND COMPLEXITY OF THE SMALL BUSINESS, THE NATURE AND SCOPE OF THE SMALL BUSINESS'S ACTIVITIES, AND THE SENSI- TIVITY OF THE PERSONAL INFORMATION THE SMALL BUSINESS COLLECTS FROM OR ABOUT CONSUMERS. (D) ANY PERSON OR BUSINESS THAT FAILS TO COMPLY WITH THIS SUBDIVISION SHALL BE DEEMED TO HAVE VIOLATED SECTION THREE HUNDRED FORTY-NINE OF THIS CHAPTER, AND THE ATTORNEY GENERAL MAY BRING AN ACTION IN THE NAME AND ON BEHALF OF THE PEOPLE OF THE STATE OF NEW YORK TO ENJOIN SUCH VIOLATIONS AND TO OBTAIN CIVIL PENALTIES UNDER SECTION THREE HUNDRED FIFTY-D OF THIS CHAPTER. (E) NOTHING IN THIS SECTION SHALL CREATE A PRIVATE RIGHT OF ACTION. § 5. Paragraph (a) of subdivision 1 and subdivisions 2, 3, 6, 7 and 8 of section 208 of the state technology law, paragraph (a) of subdivision 1 and subdivisions 3 and 8 as added by chapter 442 of the laws of 2005, subdivision 2 and paragraph (a) of subdivision 7 as amended by section 5 of part N of chapter 55 of the laws of 2013 and subdivisions 6 and 7 as amended by chapter 491 of the laws of 2005, are amended to read as follows: (a) "Private information" shall mean EITHER: (I) personal information CONSISTING OF ANY INFORMATION in combination with any one or more of the S. 5575 7 following data elements, when either the DATA ELEMENT OR THE COMBINATION OF personal information [or] PLUS the data element is not encrypted or encrypted with an encryption key that has also been ACCESSED OR acquired: (1) social security number; (2) driver's license number or non-driver identification card number; [or] (3) account number, OR credit or debit card number, in combination with any required IDENTIFYING INFORMATION, security code, access code, or password which would permit access to an individual's financial account; (4) ACCOUNT NUMBER, OR CREDIT OR DEBIT CARD NUMBER, IF CIRCUMSTANCES EXIST WHEREIN SUCH NUMBER COULD BE USED TO ACCESS TO AN INDIVIDUAL'S FINANCIAL ACCOUNT WITHOUT ADDITIONAL IDENTIFYING INFORMATION, SECURITY CODE, ACCESS CODE, OR PASSWORD; OR (5) BIOMETRIC INFORMATION, MEANING DATA GENERATED BY ELECTRONIC MEAS- UREMENTS OF AN INDIVIDUAL'S UNIQUE PHYSICAL CHARACTERISTICS, SUCH AS FINGERPRINT, VOICE PRINT, OR RETINA OR IRIS IMAGE, OR OTHER UNIQUE PHYS- ICAL REPRESENTATION OR DIGITAL REPRESENTATION WHICH ARE USED TO AUTHEN- TICATE OR ASCERTAIN THE INDIVIDUAL'S IDENTITY; (II) A USER NAME OR E-MAIL ADDRESS IN COMBINATION WITH A PASSWORD OR SECURITY QUESTION AND ANSWER THAT WOULD PERMIT ACCESS TO AN ONLINE ACCOUNT; OR (III) ANY UNSECURED PROTECTED HEALTH INFORMATION HELD BY A "COVERED ENTITY" AS DEFINED IN THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABIL- ITY ACT OF 1996 (45 C.F.R. PTS. 160, 162, 164), AS AMENDED FROM TIME TO TIME. "Private information" does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. 2. Any state entity that owns or licenses computerized data that includes private information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the system to any resident of New York state whose private information was, or is reasonably believed to have been, ACCESSED OR acquired by a person without valid authorization. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision four of this section, or any measures necessary to determine the scope of the breach and restore the [reasonable] integ- rity of the data system. The state entity shall consult with the state office of information technology services to determine the scope of the breach and restoration measures. WITHIN NINETY DAYS OF THE NOTICE OF THE BREACH, THE OFFICE OF INFORMATION TECHNOLOGY SERVICES SHALL DELIVER A REPORT ON THE SCOPE OF THE BREACH AND RECOMMENDATIONS TO RESTORE AND IMPROVE THE SECURITY OF THE SYSTEM TO THE STATE ENTITY. (A) NOTICE TO AFFECTED PERSONS UNDER THIS SECTION IS NOT REQUIRED IF THE EXPOSURE OF PRIVATE INFORMATION WAS AN INADVERTENT DISCLOSURE BY PERSONS AUTHORIZED TO ACCESS PRIVATE INFORMATION, AND THE STATE ENTITY REASONABLY DETERMINES SUCH EXPOSURE WILL NOT LIKELY RESULT IN MISUSE OF SUCH INFORMATION, OR FINANCIAL OR EMOTIONAL HARM TO THE AFFECTED PERSONS. SUCH A DETERMINATION MUST BE DOCUMENTED IN WRITING AND MAIN- TAINED FOR AT LEAST FIVE YEARS. THE STATE ENTITY SHALL PROVIDE THE WRIT- TEN DETERMINATION TO THE STATE ATTORNEY GENERAL WITHIN TEN DAYS AFTER THE DETERMINATION. S. 5575 8 (B) IF NOTICE OF THE BREACH OF THE SECURITY OF THE SYSTEM IS MADE TO AFFECTED PERSONS PURSUANT TO THE BREACH NOTIFICATION REQUIREMENTS UNDER ANY OF THE FOLLOWING LAWS, NOTHING IN THIS SECTION SHALL REQUIRE ANY ADDITIONAL NOTICE TO THOSE AFFECTED PERSONS, BUT NOTICE STILL SHALL BE PROVIDED TO THE STATE ATTORNEY GENERAL, THE DEPARTMENT OF STATE AND THE OFFICE OF INFORMATION TECHNOLOGY SERVICES PURSUANT TO PARAGRAPH (A) OF SUBDIVISION SEVEN OF THIS SECTION AND TO CONSUMER REPORTING AGENCIES PURSUANT TO PARAGRAPH (B) OF SUBDIVISION SEVEN OF THIS SECTION: (I) REGULATIONS PROMULGATED PURSUANT TO TITLE V OF THE FEDERAL GRAMM- LEACH-BLILEY ACT (15 U.S.C. 6801 TO 6809), AS AMENDED FROM TIME TO TIME; (II) REGULATIONS IMPLEMENTING THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (45 C.F.R. PARTS 160 AND 164), AS AMENDED FROM TIME TO TIME, AND THE HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT, AS AMENDED FROM TIME TO TIME; (III) PART FIVE HUNDRED OF TITLE TWENTY-THREE OF THE OFFICIAL COMPILA- TION OF CODES, RULES AND REGULATIONS OF THE STATE OF NEW YORK, AS AMENDED FROM TIME TO TIME; OR (IV) ANY OTHER DATA SECURITY RULES AND REGULATIONS OF, AND THE STAT- UTES ADMINISTERED BY, ANY OFFICIAL DEPARTMENT, DIVISION, COMMISSION OR AGENCY OF THE FEDERAL OR NEW YORK STATE GOVERNMENT AS SUCH RULES, REGU- LATIONS OR STATUTES ARE INTERPRETED BY SUCH DEPARTMENT, DIVISION, COMMISSION OR AGENCY OR BY THE FEDERAL OR NEW YORK STATE COURTS. 3. Any state entity that maintains computerized data that includes private information which such agency does not own shall notify the owner or licensee of the information of any breach of the security of the system immediately following discovery, if the private information was, or is reasonably believed to have been, acquired by a person with- out valid authorization. 6. Regardless of the method by which notice is provided, such notice shall include contact information for the state entity making the notification, THE TELEPHONE NUMBERS AND WEBSITES OF THE RELEVANT STATE AND FEDERAL AGENCIES THAT PROVIDE INFORMATION REGARDING SECURITY BREACH RESPONSE AND IDENTITY THEFT PREVENTION AND PROTECTION INFORMATION and a description of the categories of information that were, or are reason- ably believed to have been, ACCESSED OR acquired by a person without valid authorization, including specification of which of the elements of personal information and private information were, or are reasonably believed to have been, so ACCESSED OR acquired. 7. (a) In the event that any New York residents are to be notified, the state entity shall notify the state attorney general, the department of state and the state office of information technology services as to the timing, content and distribution of the notices and approximate number of affected persons AND PROVIDE A COPY OF THE TEMPLATE OF THE NOTICE SENT TO AFFECTED PERSONS. Such notice shall be made without delaying notice to affected New York residents. (b) In the event that more than five thousand New York residents are to be notified at one time, the state entity shall also notify consumer reporting agencies as to the timing, content and distribution of the notices and approximate number of affected persons. Such notice shall be made without delaying notice to affected New York residents. 8. THE STATE OFFICE OF INFORMATION TECHNOLOGY SERVICES SHALL DEVELOP, UPDATE AND PROVIDE REGULAR TRAINING TO ALL STATE ENTITIES RELATING TO BEST PRACTICES FOR THE PREVENTION OF A BREACH OF THE SECURITY OF THE SYSTEM. 9. Any entity listed in subparagraph two of paragraph (c) of subdivi- sion one of this section shall adopt a notification policy no more than S. 5575 9 one hundred twenty days after the effective date of this section. Such entity may develop a notification policy which is consistent with this section or alternatively shall adopt a local law which is consistent with this section. § 6. This act shall take effect on the ninetieth day after it shall have become a law; provided, however, that section four of this act shall take effect on the two hundred fortieth day after it shall have become a law.
(D) Senate District
(D, WF) Senate District
See Assembly Version of this Bill: A5635 Law Section: General Business Law Laws Affected: Amd Art 39-F Art Head, §899-aa, add §899-bb, Gen Bus L; amd §208, St Tech L Versions Introduced in 2017-2018 Legislative Session: S6933
Relates to notification of a security breach; includes credit and debit cards; increases civil penalties.
BILL NUMBER: S5575A SPONSOR: THOMAS TITLE OF BILL: An act to amend the general business law and the state technology law, in relation to notification of a security breach PURPOSE: New York's data breach notification law needs to be updated keep pace with current technology. This bill broadens the scope of information covered under the notification law and updates the notification require- ments when there has been a breach of data. It also broadens the defi- nition of a data breach to include an unauthorized person gaining access to information. It also requires reasonable data security, provides standards tailored to the size of a business, and provides protections from liability for certain entities. SUMMARY OF SPECIFIC PROVISIONS: Section 1 of the bill names the act.
Section 2 of the bill amends the title of article 39-F of the General Business Law. Section 3 of the bill amends section 899-aa of the General Business Law. The amendments would: *update the notifications section of the General Business Law by adding biometric data, email addresses or user names in combination with a password or security question answer, and protected health information held by a "covered entity" to the private information definition; *update the notifications section of the General Business Law by adding unauthorized access to the private information to the definitions of "private information" and "breach of the security of the system"; *update the notification requirement by applying it to any person or entity with private information of a New York resident, not just to those that "conduct business" in New York State; *correct typos and inconsistencies in language to clarify that breaches of private information only (and not personal information) trigger notice obligations and to make consistent all references to compromise by an unauthorized person or a person without valid authorization; *authorize businesses in certain circumstances to notify the consumer via email of the breach and if the consumer's email is believed to have been compromised authorize the business to use other electronic methods to notify the consumer; *outline penalties for businesses that fail to provide notice to consum- ers of a breach and the limitations period for the attorney general to act on any failure; *require certain information to be included in the notice that would direct consumers to federal and state data security prevention entities and require businesses to send a template of their notice to consumers to the attorney general and the Office of Information Technology Services; and, *task the Department of State with receiving and responding to data breach complaints and with informing the public of data security and breach prevention techniques. Section 4 of the bill creates a new section 899-bb of the General Busi- ness Law that would: *require reasonable data security for private information, with a more flexible standard for small businesses, without creating new require- ments for entities subject to existing or future regulations by any federal or other New York State government entity, and while providing safe harbor from enforcement for entities that are compliant with other existing data security regulations or standards; and *deem failure to provide required reasonable data security to be a violation of section 349 of the General Business Law, permitting the attorney general to bring suit but not any private plaintiff. Section 5 of the bill amends the State Technology Law. The amendments would: *include the same terms as above in the definition of private informa- tion; *state that should a data breach occur in a State entity the Office of Information Technology Services shall deliver a report on the scope of the breach to the entity affected; *require that an entity shall notify individuals affected by the data breach as quickly as possible; and, *task the office of information technology services to develop and provide regular trainings to all entities on preventing data breaches. Section 6 of the bill sets forth the effective date. JUSTIFICATION: New York's current data breach notification law needs to be updated to keep pace with individuals' use and dissemination of private informa- tion. New York also needs to join the increasing number of states that require reasonable data security protections, without imposing duplicate obligations on those already subject to other federal or New York State data security regulations and without imposing excessive costs on small business, while providing safe harbor from enforcement for entities that take steps to verify their compliance with other existing data security regulations or standards. This bill expands the scope of information subject to the current data breach notification law to include biometric information, email addresses and their corresponding passwords or secu- rity questions and answers, and protected health information as defined under HIPAA. It broadens the definition of a data breach to include unauthorized access to private information. It applies the notification requirement to any person or entity with private information of a New York resident, not just to those that conduct business in New York State. It also updates the notification procedures companies and state entities must follow when there has been a breach of private informa- tion. It also creates reasonable data security requirements tailored to the size of a business and provides protections from liability for certain entities that take steps to verify their safeguarding of private information. PRIOR LEGISLATIVE HISTORY: FISCAL IMPACT ON THE STATE: None. FISCAL IMPACT ON LOCALITIES: None. IMPACT ON THE REGULATION OF BUSINESSES AND INDIVIDUALS: The bill would impose stronger obligations on businesses handling private data of customers, regarding security and proper notification of breaches. IMPACT ON FINES, IMPRISONMENT, FORFEITURE OF RIGHTS, OR OTHER PENAL SANCTIONS: None. EFFECTIVE DATE: Sections I , 2, 3, and S of this act shall take effect on the ninetieth day after is shall have become law, and Section 4 of this act shall take effect on the two hundred fortieth day after it shall become law.
S T A T E O F N E W Y O R K ________________________________________________________________________ 5575--A 2019-2020 Regular Sessions I N S E N A T E May 7, 2019 ___________ Introduced by Sens. THOMAS, CARLUCCI -- (at request of the Attorney General) -- read twice and ordered printed, and when printed to be committed to the Committee on Internet and Technology -- committee discharged and said bill committed to the Committee on Consumer Protection -- committee discharged, bill amended, ordered reprinted as amended and recommitted to said committee AN ACT to amend the general business law and the state technology law, in relation to notification of a security breach THE PEOPLE OF THE STATE OF NEW YORK, REPRESENTED IN SENATE AND ASSEM- BLY, DO ENACT AS FOLLOWS: Section 1. This act shall be known and may be cited as the "Stop Hacks and Improve Electronic Data Security Act (SHIELD Act)". § 2. The article heading of article 39-F of the general business law, as added by chapter 442 of the laws of 2005, is amended to read as follows: NOTIFICATION OF UNAUTHORIZED ACQUISITION OF PRIVATE INFORMATION; DATA SECURITY PROTECTIONS § 3. Subdivisions 1, 2, 3, 5, 6, 7 and 8 of section 899-aa of the general business law, subdivisions 1, 2, 3, 5, 6 and 7 as added by chap- ter 442 of the laws of 2005, paragraph (c) of subdivision 1, paragraph (a) of subdivision 6 and subdivision 8 as amended by chapter 491 of the laws of 2005 and paragraph (a) of subdivision 8 as amended by section 6 of part N of chapter 55 of the laws of 2013, are amended to read as follows: 1. As used in this section, the following terms shall have the follow- ing meanings: (a) "Personal information" shall mean any information concerning a natural person which, because of name, number, personal mark, or other identifier, can be used to identify such natural person; (b) "Private information" shall mean EITHER: (I) personal information consisting of any information in combination with any one or more of the EXPLANATION--Matter in ITALICS (underscored) is new; matter in brackets [ ] is old law to be omitted.
LBD05343-03-9 S. 5575--A 2 following data elements, when either the DATA ELEMENT OR THE COMBINATION OF personal information [or] PLUS the data element is not encrypted, or IS encrypted with an encryption key that has also been ACCESSED OR acquired: (1) social security number; (2) driver's license number or non-driver identification card number; [or] (3) account number, credit or debit card number, in combination with any required security code, access code, [or] password OR OTHER INFORMA- TION that would permit access to an individual's financial account; (4) ACCOUNT NUMBER, CREDIT OR DEBIT CARD NUMBER, IF CIRCUMSTANCES EXIST WHEREIN SUCH NUMBER COULD BE USED TO ACCESS AN INDIVIDUAL'S FINAN- CIAL ACCOUNT WITHOUT ADDITIONAL IDENTIFYING INFORMATION, SECURITY CODE, ACCESS CODE, OR PASSWORD; OR (5) BIOMETRIC INFORMATION, MEANING DATA GENERATED BY ELECTRONIC MEAS- UREMENTS OF AN INDIVIDUAL'S UNIQUE PHYSICAL CHARACTERISTICS, SUCH AS A FINGERPRINT, VOICE PRINT, RETINA OR IRIS IMAGE, OR OTHER UNIQUE PHYSICAL REPRESENTATION OR DIGITAL REPRESENTATION OF BIOMETRIC DATA WHICH ARE USED TO AUTHENTICATE OR ASCERTAIN THE INDIVIDUAL'S IDENTITY; (II) A USER NAME OR E-MAIL ADDRESS IN COMBINATION WITH A PASSWORD OR SECURITY QUESTION AND ANSWER THAT WOULD PERMIT ACCESS TO AN ONLINE ACCOUNT; OR (III) ANY UNSECURED PROTECTED HEALTH INFORMATION HELD BY A "COVERED ENTITY" AS DEFINED IN THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABIL- ITY ACT OF 1996 (45 C.F.R. PTS. 160, 162, 164), AS AMENDED FROM TIME TO TIME. "Private information" does not include publicly available information which is lawfully made available to the general public from federal, state, or local government records. (c) "Breach of the security of the system" shall mean unauthorized ACCESS TO OR acquisition OF, or ACCESS TO OR acquisition without valid authorization, of computerized data that compromises the security, confidentiality, or integrity of [personal] PRIVATE information main- tained by a business. Good faith ACCESS TO, OR acquisition of [personal], PRIVATE information by an employee or agent of the business for the purposes of the business is not a breach of the security of the system, provided that the private information is not used or subject to unauthorized disclosure. IN DETERMINING WHETHER INFORMATION HAS BEEN ACCESSED, OR IS REASONABLY BELIEVED TO HAVE BEEN ACCESSED, BY AN UNAUTHORIZED PERSON OR A PERSON WITHOUT VALID AUTHORIZATION, SUCH BUSINESS MAY CONSIDER, AMONG OTHER FACTORS, INDICATIONS THAT THE INFORMATION WAS VIEWED, COMMUNICATED WITH, USED, OR ALTERED BY A PERSON WITHOUT VALID AUTHORIZATION OR BY AN UNAU- THORIZED PERSON. In determining whether information has been acquired, or is reasonably believed to have been acquired, by an unauthorized person or a person without valid authorization, such business may consider the following factors, among others: (1) indications that the information is in the physical possession and control of an unauthorized person, such as a lost or stolen computer or other device containing information; or (2) indications that the information has been downloaded or copied; or (3) indications that the information was used by an unauthorized person, such as fraudulent accounts opened or instances of identity theft reported. S. 5575--A 3 (d) "Consumer reporting agency" shall mean any person which, for mone- tary fees, dues, or on a cooperative nonprofit basis, regularly engages in whole or in part in the practice of assembling or evaluating consumer credit information or other information on consumers for the purpose of furnishing consumer reports to third parties, and which uses any means or facility of interstate commerce for the purpose of preparing or furnishing consumer reports. A list of consumer reporting agencies shall be compiled by the state attorney general and furnished upon request to any person or business required to make a notification under subdivision two of this section. 2. Any person or business which [conducts business in New York state, and which] owns or licenses computerized data which includes private information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the system to any resident of New York state whose private information was, or is reasonably believed to have been, ACCESSED OR acquired by a person without valid authorization. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision four of this section, or any measures necessary to determine the scope of the breach and restore the [reasonable] integrity of the system. (A) NOTICE TO AFFECTED PERSONS UNDER THIS SECTION IS NOT REQUIRED IF THE EXPOSURE OF PRIVATE INFORMATION WAS AN INADVERTENT DISCLOSURE BY PERSONS AUTHORIZED TO ACCESS PRIVATE INFORMATION, AND THE PERSON OR BUSINESS REASONABLY DETERMINES SUCH EXPOSURE WILL NOT LIKELY RESULT IN MISUSE OF SUCH INFORMATION, OR FINANCIAL HARM TO THE AFFECTED PERSONS OR EMOTIONAL HARM IN THE CASE OF UNKNOWN DISCLOSURE OF ONLINE CREDENTIALS AS FOUND IN SUBPARAGRAPH (II) OF PARAGRAPH (B) OF SUBDIVISION ONE OF THIS SECTION. SUCH A DETERMINATION MUST BE DOCUMENTED IN WRITING AND MAINTAINED FOR AT LEAST FIVE YEARS. IF THE INCIDENT AFFECTS OVER FIVE HUNDRED RESIDENTS OF NEW YORK, THE PERSON OR BUSINESS SHALL PROVIDE THE WRITTEN DETERMINATION TO THE STATE ATTORNEY GENERAL WITHIN TEN DAYS AFTER THE DETERMINATION. (B) IF NOTICE OF THE BREACH OF THE SECURITY OF THE SYSTEM IS MADE TO AFFECTED PERSONS PURSUANT TO THE BREACH NOTIFICATION REQUIREMENTS UNDER ANY OF THE FOLLOWING LAWS, NOTHING IN THIS SECTION SHALL REQUIRE ANY ADDITIONAL NOTICE TO THOSE AFFECTED PERSONS, BUT NOTICE STILL SHALL BE PROVIDED TO THE STATE ATTORNEY GENERAL, THE DEPARTMENT OF STATE AND THE DIVISION OF STATE POLICE PURSUANT TO PARAGRAPH (A) OF SUBDIVISION EIGHT OF THIS SECTION AND TO CONSUMER REPORTING AGENCIES PURSUANT TO PARAGRAPH (B) OF SUBDIVISION EIGHT OF THIS SECTION: (I) REGULATIONS PROMULGATED PURSUANT TO TITLE V OF THE FEDERAL GRAMM- LEACH-BLILEY ACT (15 U.S.C. 6801 TO 6809), AS AMENDED FROM TIME TO TIME; (II) REGULATIONS IMPLEMENTING THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (45 C.F.R. PARTS 160 AND 164), AS AMENDED FROM TIME TO TIME, AND THE HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT, AS AMENDED FROM TIME TO TIME; (III) PART FIVE HUNDRED OF TITLE TWENTY-THREE OF THE OFFICIAL COMPILA- TION OF CODES, RULES AND REGULATIONS OF THE STATE OF NEW YORK, AS AMENDED FROM TIME TO TIME; OR (IV) ANY OTHER DATA SECURITY RULES AND REGULATIONS OF, AND THE STAT- UTES ADMINISTERED BY, ANY OFFICIAL DEPARTMENT, DIVISION, COMMISSION OR AGENCY OF THE FEDERAL OR NEW YORK STATE GOVERNMENT AS SUCH RULES, REGU- LATIONS OR STATUTES ARE INTERPRETED BY SUCH DEPARTMENT, DIVISION, COMMISSION OR AGENCY OR BY THE FEDERAL OR NEW YORK STATE COURTS. S. 5575--A 4 3. Any person or business which maintains computerized data which includes private information which such person or business does not own shall notify the owner or licensee of the information of any breach of the security of the system immediately following discovery, if the private information was, or is reasonably believed to have been, ACCESSED OR acquired by a person without valid authorization. 5. The notice required by this section shall be directly provided to the affected persons by one of the following methods: (a) written notice; (b) electronic notice, provided that the person to whom notice is required has expressly consented to receiving said notice in electronic form and a log of each such notification is kept by the person or busi- ness who notifies affected persons in such form; provided further, however, that in no case shall any person or business require a person to consent to accepting said notice in said form as a condition of establishing any business relationship or engaging in any transaction. (c) telephone notification provided that a log of each such notifica- tion is kept by the person or business who notifies affected persons; or (d) substitute notice, if a business demonstrates to the state attor- ney general that the cost of providing notice would exceed two hundred fifty thousand dollars, or that the affected class of subject persons to be notified exceeds five hundred thousand, or such business does not have sufficient contact information. Substitute notice shall consist of all of the following: (1) e-mail notice when such business has an e-mail address for the subject persons, EXCEPT IF THE BREACHED INFORMATION INCLUDES AN E-MAIL ADDRESS IN COMBINATION WITH A PASSWORD OR SECURITY QUESTION AND ANSWER THAT WOULD PERMIT ACCESS TO THE ONLINE ACCOUNT, IN WHICH CASE THE PERSON OR BUSINESS SHALL INSTEAD PROVIDE CLEAR AND CONSPICUOUS NOTICE DELIVERED TO THE CONSUMER ONLINE WHEN THE CONSUMER IS CONNECTED TO THE ONLINE ACCOUNT FROM AN INTERNET PROTOCOL ADDRESS OR FROM AN ONLINE LOCATION WHICH THE PERSON OR BUSINESS KNOWS THE CONSUMER CUSTOMARILY USES TO ACCESS THE ONLINE ACCOUNT; (2) conspicuous posting of the notice on such business's web site page, if such business maintains one; and (3) notification to major statewide media. 6. (a) whenever the attorney general shall believe from evidence satisfactory to him OR HER that there is a violation of this article he OR SHE may bring an action in the name and on behalf of the people of the state of New York, in a court of justice having jurisdiction to issue an injunction, to enjoin and restrain the continuation of such violation. In such action, preliminary relief may be granted under article sixty-three of the civil practice law and rules. In such action the court may award damages for actual costs or losses incurred by a person entitled to notice pursuant to this article, if notification was not provided to such person pursuant to this article, including conse- quential financial losses. Whenever the court shall determine in such action that a person or business violated this article knowingly or recklessly, the court may impose a civil penalty of the greater of five thousand dollars or up to [ten] TWENTY dollars per instance of failed notification, provided that the latter amount shall not exceed [one] TWO hundred fifty thousand dollars. (b) the remedies provided by this section shall be in addition to any other lawful remedy available. (c) no action may be brought under the provisions of this section unless such action is commenced within [two] THREE years [immediately] S. 5575--A 5 after EITHER the date [of the act complained of or the date of discovery of such act] ON WHICH THE ATTORNEY GENERAL BECAME AWARE OF THE VIOLATION, OR THE DATE OF NOTICE SENT PURSUANT TO PARAGRAPH (A) OF SUBDIVISION EIGHT OF THIS SECTION, WHICHEVER OCCURS FIRST. IN NO EVENT SHALL AN ACTION BE BROUGHT AFTER SIX YEARS FROM THE DATE OF DISCOVERY OF THE BREACH OF PRIVATE INFORMATION BY THE COMPANY UNLESS THE COMPANY TOOK STEPS TO HIDE THE BREACH. 7. Regardless of the method by which notice is provided, such notice shall include contact information for the person or business making the notification, THE TELEPHONE NUMBERS AND WEBSITES OF THE RELEVANT STATE AND FEDERAL AGENCIES THAT PROVIDE INFORMATION REGARDING SECURITY BREACH RESPONSE AND IDENTITY THEFT PREVENTION AND PROTECTION INFORMATION, and a description of the categories of information that were, or are reason- ably believed to have been, ACCESSED OR acquired by a person without valid authorization, including specification of which of the elements of personal information and private information were, or are reasonably believed to have been, so ACCESSED OR acquired. 8. (a) In the event that any New York residents are to be notified, the person or business shall notify the state attorney general, the department of state and the division of state police as to the timing, content and distribution of the notices and approximate number of affected persons AND SHALL PROVIDE A COPY OF THE TEMPLATE OF THE NOTICE SENT TO AFFECTED PERSONS. Such notice shall be made without delaying notice to affected New York residents. (b) In the event that more than five thousand New York residents are to be notified at one time, the person or business shall also notify consumer reporting agencies as to the timing, content and distribution of the notices and approximate number of affected persons. Such notice shall be made without delaying notice to affected New York residents. § 4. The general business law is amended by adding a new section 899- bb to read as follows: § 899-BB. DATA SECURITY PROTECTIONS. 1. DEFINITIONS. (A) "COMPLIANT REGULATED ENTITY" SHALL MEAN ANY PERSON OR BUSINESS THAT IS SUBJECT TO, AND IN COMPLIANCE WITH, ANY OF THE FOLLOWING DATA SECURITY REQUIREMENTS: (I) REGULATIONS PROMULGATED PURSUANT TO TITLE V OF THE FEDERAL GRAMM- LEACH-BLILEY ACT (15 U.S.C. 6801 TO 6809), AS AMENDED FROM TIME TO TIME; (II) REGULATIONS IMPLEMENTING THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (45 C.F.R. PARTS 160 AND 164), AS AMENDED FROM TIME TO TIME, AND THE HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT, AS AMENDED FROM TIME TO TIME; (III) PART FIVE HUNDRED OF TITLE TWENTY-THREE OF THE OFFICIAL COMPILA- TION OF CODES, RULES AND REGULATIONS OF THE STATE OF NEW YORK, AS AMENDED FROM TIME TO TIME; OR (IV) ANY OTHER DATA SECURITY RULES AND REGULATIONS OF, AND THE STAT- UTES ADMINISTERED BY, ANY OFFICIAL DEPARTMENT, DIVISION, COMMISSION OR AGENCY OF THE FEDERAL OR NEW YORK STATE GOVERNMENT AS SUCH RULES, REGU- LATIONS OR STATUTES ARE INTERPRETED BY SUCH DEPARTMENT, DIVISION, COMMISSION OR AGENCY OR BY THE FEDERAL OR NEW YORK STATE COURTS. (B) "PRIVATE INFORMATION" SHALL HAVE THE SAME MEANING AS DEFINED IN SECTION EIGHT HUNDRED NINETY-NINE-AA OF THIS ARTICLE. (C) "SMALL BUSINESS" SHALL MEAN ANY PERSON OR BUSINESS WITH (I) FEWER THAN FIFTY EMPLOYEES; (II) LESS THAN THREE MILLION DOLLARS IN GROSS ANNUAL REVENUE IN EACH OF THE LAST THREE FISCAL YEARS; OR (III) LESS THAN FIVE MILLION DOLLARS IN YEAR-END TOTAL ASSETS, CALCULATED IN ACCORDANCE WITH GENERALLY ACCEPTED ACCOUNTING PRINCIPLES. S. 5575--A 6 2. REASONABLE SECURITY REQUIREMENT. (A) ANY PERSON OR BUSINESS THAT OWNS OR LICENSES COMPUTERIZED DATA WHICH INCLUDES PRIVATE INFORMATION OF A RESIDENT OF NEW YORK SHALL DEVELOP, IMPLEMENT AND MAINTAIN REASONABLE SAFEGUARDS TO PROTECT THE SECURITY, CONFIDENTIALITY AND INTEGRITY OF THE PRIVATE INFORMATION INCLUDING, BUT NOT LIMITED TO, DISPOSAL OF DATA. (B) A PERSON OR BUSINESS SHALL BE DEEMED TO BE IN COMPLIANCE WITH PARAGRAPH (A) OF THIS SUBDIVISION IF IT EITHER: (I) IS A COMPLIANT REGULATED ENTITY AS DEFINED IN SUBDIVISION ONE OF THIS SECTION; OR (II) IMPLEMENTS A DATA SECURITY PROGRAM THAT INCLUDES THE FOLLOWING: (A) REASONABLE ADMINISTRATIVE SAFEGUARDS SUCH AS THE FOLLOWING, IN WHICH THE PERSON OR BUSINESS: (1) DESIGNATES ONE OR MORE EMPLOYEES TO COORDINATE THE SECURITY PROGRAM; (2) IDENTIFIES REASONABLY FORESEEABLE INTERNAL AND EXTERNAL RISKS; (3) ASSESSES THE SUFFICIENCY OF SAFEGUARDS IN PLACE TO CONTROL THE IDENTIFIED RISKS; (4) TRAINS AND MANAGES EMPLOYEES IN THE SECURITY PROGRAM PRACTICES AND PROCEDURES; (5) SELECTS SERVICE PROVIDERS CAPABLE OF MAINTAINING APPROPRIATE SAFE- GUARDS, AND REQUIRES THOSE SAFEGUARDS BY CONTRACT; AND (6) ADJUSTS THE SECURITY PROGRAM IN LIGHT OF BUSINESS CHANGES OR NEW CIRCUMSTANCES; AND (B) REASONABLE TECHNICAL SAFEGUARDS SUCH AS THE FOLLOWING, IN WHICH THE PERSON OR BUSINESS: (1) ASSESSES RISKS IN NETWORK AND SOFTWARE DESIGN; (2) ASSESSES RISKS IN INFORMATION PROCESSING, TRANSMISSION AND STOR- AGE; (3) DETECTS, PREVENTS AND RESPONDS TO ATTACKS OR SYSTEM FAILURES; AND (4) REGULARLY TESTS AND MONITORS THE EFFECTIVENESS OF KEY CONTROLS, SYSTEMS AND PROCEDURES; AND (C) REASONABLE PHYSICAL SAFEGUARDS SUCH AS THE FOLLOWING, IN WHICH THE PERSON OR BUSINESS: (1) ASSESSES RISKS OF INFORMATION STORAGE AND DISPOSAL; (2) DETECTS, PREVENTS AND RESPONDS TO INTRUSIONS; (3) PROTECTS AGAINST UNAUTHORIZED ACCESS TO OR USE OF PRIVATE INFORMA- TION DURING OR AFTER THE COLLECTION, TRANSPORTATION AND DESTRUCTION OR DISPOSAL OF THE INFORMATION; AND (4) DISPOSES OF PRIVATE INFORMATION WITHIN A REASONABLE AMOUNT OF TIME AFTER IT IS NO LONGER NEEDED FOR BUSINESS PURPOSES BY ERASING ELECTRONIC MEDIA SO THAT THE INFORMATION CANNOT BE READ OR RECONSTRUCTED. (C) A SMALL BUSINESS AS DEFINED IN PARAGRAPH (C) OF SUBDIVISION ONE OF THIS SECTION COMPLIES WITH SUBPARAGRAPH (II) OF PARAGRAPH (B) OF SUBDI- VISION TWO OF THIS SECTION IF THE SMALL BUSINESS'S SECURITY PROGRAM CONTAINS REASONABLE ADMINISTRATIVE, TECHNICAL AND PHYSICAL SAFEGUARDS THAT ARE APPROPRIATE FOR THE SIZE AND COMPLEXITY OF THE SMALL BUSINESS, THE NATURE AND SCOPE OF THE SMALL BUSINESS'S ACTIVITIES, AND THE SENSI- TIVITY OF THE PERSONAL INFORMATION THE SMALL BUSINESS COLLECTS FROM OR ABOUT CONSUMERS. (D) ANY PERSON OR BUSINESS THAT FAILS TO COMPLY WITH THIS SUBDIVISION SHALL BE DEEMED TO HAVE VIOLATED SECTION THREE HUNDRED FORTY-NINE OF THIS CHAPTER, AND THE ATTORNEY GENERAL MAY BRING AN ACTION IN THE NAME AND ON BEHALF OF THE PEOPLE OF THE STATE OF NEW YORK TO ENJOIN SUCH VIOLATIONS AND TO OBTAIN CIVIL PENALTIES UNDER SECTION THREE HUNDRED FIFTY-D OF THIS CHAPTER. (E) NOTHING IN THIS SECTION SHALL CREATE A PRIVATE RIGHT OF ACTION. S. 5575--A 7 § 5. Paragraph (a) of subdivision 1 and subdivisions 2, 3, 6, 7 and 8 of section 208 of the state technology law, paragraph (a) of subdivision 1 and subdivisions 3 and 8 as added by chapter 442 of the laws of 2005, subdivision 2 and paragraph (a) of subdivision 7 as amended by section 5 of part N of chapter 55 of the laws of 2013 and subdivisions 6 and 7 as amended by chapter 491 of the laws of 2005, are amended to read as follows: (a) "Private information" shall mean EITHER: (I) personal information CONSISTING OF ANY INFORMATION in combination with any one or more of the following data elements, when either the DATA ELEMENT OR THE COMBINATION OF personal information [or] PLUS the data element is not encrypted or encrypted with an encryption key that has also been ACCESSED OR acquired: (1) social security number; (2) driver's license number or non-driver identification card number; [or] (3) account number, credit or debit card number, in combination with any required security code, access code, [or] password OR OTHER INFORMA- TION which would permit access to an individual's financial account; (4) ACCOUNT NUMBER, OR CREDIT OR DEBIT CARD NUMBER, IF CIRCUMSTANCES EXIST WHEREIN SUCH NUMBER COULD BE USED TO ACCESS TO AN INDIVIDUAL'S FINANCIAL ACCOUNT WITHOUT ADDITIONAL IDENTIFYING INFORMATION, SECURITY CODE, ACCESS CODE, OR PASSWORD; OR (5) BIOMETRIC INFORMATION, MEANING DATA GENERATED BY ELECTRONIC MEAS- UREMENTS OF AN INDIVIDUAL'S UNIQUE PHYSICAL CHARACTERISTICS, SUCH AS FINGERPRINT, VOICE PRINT, OR RETINA OR IRIS IMAGE, OR OTHER UNIQUE PHYS- ICAL REPRESENTATION OR DIGITAL REPRESENTATION WHICH ARE USED TO AUTHEN- TICATE OR ASCERTAIN THE INDIVIDUAL'S IDENTITY; (II) A USER NAME OR E-MAIL ADDRESS IN COMBINATION WITH A PASSWORD OR SECURITY QUESTION AND ANSWER THAT WOULD PERMIT ACCESS TO AN ONLINE ACCOUNT; OR (III) ANY UNSECURED PROTECTED HEALTH INFORMATION HELD BY A "COVERED ENTITY" AS DEFINED IN THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABIL- ITY ACT OF 1996 (45 C.F.R. PTS. 160, 162, 164), AS AMENDED FROM TIME TO TIME. "Private information" does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. 2. Any state entity that owns or licenses computerized data that includes private information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the system to any resident of New York state whose private information was, or is reasonably believed to have been, ACCESSED OR acquired by a person without valid authorization. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision four of this section, or any measures necessary to determine the scope of the breach and restore the [reasonable] integ- rity of the data system. The state entity shall consult with the state office of information technology services to determine the scope of the breach and restoration measures. WITHIN NINETY DAYS OF THE NOTICE OF THE BREACH, THE OFFICE OF INFORMATION TECHNOLOGY SERVICES SHALL DELIVER A REPORT ON THE SCOPE OF THE BREACH AND RECOMMENDATIONS TO RESTORE AND IMPROVE THE SECURITY OF THE SYSTEM TO THE STATE ENTITY. (A) NOTICE TO AFFECTED PERSONS UNDER THIS SECTION IS NOT REQUIRED IF THE EXPOSURE OF PRIVATE INFORMATION WAS AN INADVERTENT DISCLOSURE BY S. 5575--A 8 PERSONS AUTHORIZED TO ACCESS PRIVATE INFORMATION, AND THE STATE ENTITY REASONABLY DETERMINES SUCH EXPOSURE WILL NOT LIKELY RESULT IN MISUSE OF SUCH INFORMATION, OR FINANCIAL OR EMOTIONAL HARM TO THE AFFECTED PERSONS. SUCH A DETERMINATION MUST BE DOCUMENTED IN WRITING AND MAIN- TAINED FOR AT LEAST FIVE YEARS. IF THE INCIDENT AFFECTED OVER FIVE HUNDRED RESIDENTS OF NEW YORK, THE STATE ENTITY SHALL PROVIDE THE WRIT- TEN DETERMINATION TO THE STATE ATTORNEY GENERAL WITHIN TEN DAYS AFTER THE DETERMINATION. (B) IF NOTICE OF THE BREACH OF THE SECURITY OF THE SYSTEM IS MADE TO AFFECTED PERSONS PURSUANT TO THE BREACH NOTIFICATION REQUIREMENTS UNDER ANY OF THE FOLLOWING LAWS, NOTHING IN THIS SECTION SHALL REQUIRE ANY ADDITIONAL NOTICE TO THOSE AFFECTED PERSONS, BUT NOTICE STILL SHALL BE PROVIDED TO THE STATE ATTORNEY GENERAL, THE DEPARTMENT OF STATE AND THE OFFICE OF INFORMATION TECHNOLOGY SERVICES PURSUANT TO PARAGRAPH (A) OF SUBDIVISION SEVEN OF THIS SECTION AND TO CONSUMER REPORTING AGENCIES PURSUANT TO PARAGRAPH (B) OF SUBDIVISION SEVEN OF THIS SECTION: (I) REGULATIONS PROMULGATED PURSUANT TO TITLE V OF THE FEDERAL GRAMM- LEACH-BLILEY ACT (15 U.S.C. 6801 TO 6809), AS AMENDED FROM TIME TO TIME; (II) REGULATIONS IMPLEMENTING THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (45 C.F.R. PARTS 160 AND 164), AS AMENDED FROM TIME TO TIME, AND THE HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT, AS AMENDED FROM TIME TO TIME; (III) PART FIVE HUNDRED OF TITLE TWENTY-THREE OF THE OFFICIAL COMPILA- TION OF CODES, RULES AND REGULATIONS OF THE STATE OF NEW YORK, AS AMENDED FROM TIME TO TIME; OR (IV) ANY OTHER DATA SECURITY RULES AND REGULATIONS OF, AND THE STAT- UTES ADMINISTERED BY, ANY OFFICIAL DEPARTMENT, DIVISION, COMMISSION OR AGENCY OF THE FEDERAL OR NEW YORK STATE GOVERNMENT AS SUCH RULES, REGU- LATIONS OR STATUTES ARE INTERPRETED BY SUCH DEPARTMENT, DIVISION, COMMISSION OR AGENCY OR BY THE FEDERAL OR NEW YORK STATE COURTS. 3. Any state entity that maintains computerized data that includes private information which such agency does not own shall notify the owner or licensee of the information of any breach of the security of the system immediately following discovery, if the private information was, or is reasonably believed to have been, acquired by a person with- out valid authorization. 6. Regardless of the method by which notice is provided, such notice shall include contact information for the state entity making the notification, THE TELEPHONE NUMBERS AND WEBSITES OF THE RELEVANT STATE AND FEDERAL AGENCIES THAT PROVIDE INFORMATION REGARDING SECURITY BREACH RESPONSE AND IDENTITY THEFT PREVENTION AND PROTECTION INFORMATION and a description of the categories of information that were, or are reason- ably believed to have been, ACCESSED OR acquired by a person without valid authorization, including specification of which of the elements of personal information and private information were, or are reasonably believed to have been, so ACCESSED OR acquired. 7. (a) In the event that any New York residents are to be notified, the state entity shall notify the state attorney general, the department of state and the state office of information technology services as to the timing, content and distribution of the notices and approximate number of affected persons AND PROVIDE A COPY OF THE TEMPLATE OF THE NOTICE SENT TO AFFECTED PERSONS. Such notice shall be made without delaying notice to affected New York residents. (b) In the event that more than five thousand New York residents are to be notified at one time, the state entity shall also notify consumer reporting agencies as to the timing, content and distribution of the S. 5575--A 9 notices and approximate number of affected persons. Such notice shall be made without delaying notice to affected New York residents. 8. THE STATE OFFICE OF INFORMATION TECHNOLOGY SERVICES SHALL DEVELOP, UPDATE AND PROVIDE REGULAR TRAINING TO ALL STATE ENTITIES RELATING TO BEST PRACTICES FOR THE PREVENTION OF A BREACH OF THE SECURITY OF THE SYSTEM. 9. Any entity listed in subparagraph two of paragraph (c) of subdivi- sion one of this section shall adopt a notification policy no more than one hundred twenty days after the effective date of this section. Such entity may develop a notification policy which is consistent with this section or alternatively shall adopt a local law which is consistent with this section. § 6. This act shall take effect on the ninetieth day after it shall have become a law; provided, however, that section four of this act shall take effect on the two hundred fortieth day after it shall have become a law.
(D) Senate District
(D, WF) Senate District
See Assembly Version of this Bill: A5635 Law Section: General Business Law Laws Affected: Amd Art 39-F Art Head, §899-aa, add §899-bb, Gen Bus L; amd §208, St Tech L Versions Introduced in 2017-2018 Legislative Session: S6933
Relates to notification of a security breach; includes credit and debit cards; increases civil penalties.
BILL NUMBER: S5575B SPONSOR: THOMAS TITLE OF BILL: An act to amend the general business law and the state technology law, in relation to notification of a security breach PURPOSE: New York's data breach notification law needs to be updated keep pace with current technology. This bill broadens the scope of information covered under the notification law and updates the notification require- ments when there has been a breach of data. It also broadens the defi- nition of a data breach to include an unauthorized person gaining access to information. It also requires reasonable data security, provides standards tailored to the size of a business, and provides protections from liability for certain entities. SUMMARY OF SPECIFIC PROVISIONS: Section 1 of the bill names the act.
Section 2 of the bill amends the title of article 39-F of the General Business Law. Section 3 of the bill amends section 899-aa of the General Business Law. The amendments would: *update the notifications section of the General Business Law by adding biometric data, and email addresses or user names in combination with a password or security question answer; *update the notifications section of the General Business Law by adding unauthorized access to the private information to the definitions of "private information" and "breach of the security of the system"; *update the notification requirement by applying it to any person or entity with private information of a New York resident, not just to those that "conduct business" in New York State; *correct typos and inconsistencies in language to clarify that breaches of private information only (and not personal information) trigger notice obligations and to make consistent all references to compromise by an unauthorized person or a person without valid authorization; *authorize businesses in certain circumstances to notify the consumer via email of the breach and if the consumer's email is believed to have been compromised authorize the business to use other electronic methods to notify the consumer; *outline penalties for businesses that fail to provide notice to consum- ers of a breach and the limitations period for the attorney general to act on any failure; *require certain information to be included in the notice that would direct consumers to federal and state data security prevention entities and require businesses to send a template of their notice to consumers to the attorney general and the Office of Information Technology Services; and, *require any covered entity that must provide notice of a breach to the Secretary of Health and Human Services pursuant to the Health Insurance Portability and Accountability Act of 1996 and the Health Information Technology for Economic and Clinical Health Act, as amended from time to time, to provide notification to the state attorney general within five business days of notifying the Secretary Section 4 of the bill creates a new section 899-bb of the General Busi- ness Law that would: *require reasonable data security for private information, with a more flexible standard for small businesses, without creating new require- ments for entities subject to existing or future regulations by any federal or other New York State government entity; and *deem failure to provide required reasonable data security to be a violation of section 349 of the General Business Law, permitting the attorney general to bring suit but not any private plaintiff. Section 5 of the bill amends the State Technology Law. The amendments would: *include the same terms as above in the definition of private informa- tion; *state that should a data breach occur in a State entity the Office of Information Technology Services shall deliver a report on the scope of the breach to the entity affected; and *task the office of information technology services to develop and provide regular trainings to all entities on preventing data breaches. Section 6 of the bill sets forth the effective date. JUSTIFICATION: New York's current data breach notification law needs to be updated to keep pace with individuals' use and dissemination of private informa- tion. New York also needs to join the increasing number of states that require reasonable data security protections, without imposing duplicate obligations on those already subject to other federal or New York State data security regulations and without imposing excessive costs on small business. This bill expands the scope of information subject to the current data breach notification law to include biometric information, and email addresses and their corresponding passwords or security ques- tions and answers. It broadens the definition of a data breach to include unauthorized access to private information. It applies the notification requirement to any person or entity with private informa- tion of a New York resident, not just to those that conduct business in New York State. It also updates the notification procedures companies and state entities must follow when there has been a breach of private information. It also creates reasonable data security requirements tailored to the size of a business. PRIOR LEGISLATIVE HISTORY: FISCAL IMPACT ON THE STATE: None. FISCAL IMPACT ON LOCALITIES: None. IMPACT ON THE REGULATION OF BUSINESSES AND INDIVIDUALS: The bill would impose stronger obligations on businesses handling private data of customers, regarding security and proper notification of breaches. IMPACT ON FINES, IMPRISONMENT, FORFEITURE OF RIGHTS, OR OTHER PENAL SANCTIONS: None. EFFECTIVE DATE: Sections 1, 2, 3, and 5 of this act shall take effect on the ninetieth day after is shall have become law, and Section 4 of this act shall take effect on the two hundred fortieth day after it shall become law.
S T A T E O F N E W Y O R K ________________________________________________________________________ 5575--B Cal. No. 1094 2019-2020 Regular Sessions I N S E N A T E May 7, 2019 ___________ Introduced by Sens. THOMAS, CARLUCCI, BIAGGI -- (at request of the Attorney General) -- read twice and ordered printed, and when printed to be committed to the Committee on Internet and Technology -- commit- tee discharged and said bill committed to the Committee on Consumer Protection -- committee discharged, bill amended, ordered reprinted as amended and recommitted to said committee -- reported favorably from said committee, ordered to first and second report, ordered to a third reading, passed by Senate and delivered to the Assembly, recalled, vote reconsidered, restored to third reading, amended and ordered reprinted, retaining its place in the order of third reading AN ACT to amend the general business law and the state technology law, in relation to notification of a security breach THE PEOPLE OF THE STATE OF NEW YORK, REPRESENTED IN SENATE AND ASSEM- BLY, DO ENACT AS FOLLOWS: Section 1. This act shall be known and may be cited as the "Stop Hacks and Improve Electronic Data Security Act (SHIELD Act)". § 2. The article heading of article 39-F of the general business law, as added by chapter 442 of the laws of 2005, is amended to read as follows: NOTIFICATION OF UNAUTHORIZED ACQUISITION OF PRIVATE INFORMATION; DATA SECURITY PROTECTIONS § 3. Subdivisions 1, 2, 3, 5, 6, 7 and 8 of section 899-aa of the general business law, subdivisions 1, 2, 3, 5, 6 and 7 as added by chap- ter 442 of the laws of 2005, paragraph (c) of subdivision 1, paragraph (a) of subdivision 6 and subdivision 8 as amended by chapter 491 of the laws of 2005 and paragraph (a) of subdivision 8 as amended by section 6 of part N of chapter 55 of the laws of 2013, are amended, subdivision 9 is renumbered subdivision 10 and a new subdivision 9 is added to read as follows: 1. As used in this section, the following terms shall have the follow- ing meanings: EXPLANATION--Matter in ITALICS (underscored) is new; matter in brackets
[ ] is old law to be omitted. LBD05343-07-9 S. 5575--B 2 (a) "Personal information" shall mean any information concerning a natural person which, because of name, number, personal mark, or other identifier, can be used to identify such natural person; (b) "Private information" shall mean EITHER: (I) personal information consisting of any information in combination with any one or more of the following data elements, when either the DATA ELEMENT OR THE COMBINATION OF personal information [or] PLUS the data element is not encrypted, or IS encrypted with an encryption key that has also been ACCESSED OR acquired: (1) social security number; (2) driver's license number or non-driver identification card number; [or] (3) account number, credit or debit card number, in combination with any required security code, access code, [or] password OR OTHER INFORMA- TION that would permit access to an individual's financial account; (4) ACCOUNT NUMBER, CREDIT OR DEBIT CARD NUMBER, IF CIRCUMSTANCES EXIST WHEREIN SUCH NUMBER COULD BE USED TO ACCESS AN INDIVIDUAL'S FINAN- CIAL ACCOUNT WITHOUT ADDITIONAL IDENTIFYING INFORMATION, SECURITY CODE, ACCESS CODE, OR PASSWORD; OR (5) BIOMETRIC INFORMATION, MEANING DATA GENERATED BY ELECTRONIC MEAS- UREMENTS OF AN INDIVIDUAL'S UNIQUE PHYSICAL CHARACTERISTICS, SUCH AS A FINGERPRINT, VOICE PRINT, RETINA OR IRIS IMAGE, OR OTHER UNIQUE PHYSICAL REPRESENTATION OR DIGITAL REPRESENTATION OF BIOMETRIC DATA WHICH ARE USED TO AUTHENTICATE OR ASCERTAIN THE INDIVIDUAL'S IDENTITY; OR (II) A USER NAME OR E-MAIL ADDRESS IN COMBINATION WITH A PASSWORD OR SECURITY QUESTION AND ANSWER THAT WOULD PERMIT ACCESS TO AN ONLINE ACCOUNT. "Private information" does not include publicly available information which is lawfully made available to the general public from federal, state, or local government records. (c) "Breach of the security of the system" shall mean unauthorized ACCESS TO OR acquisition OF, or ACCESS TO OR acquisition without valid authorization, of computerized data that compromises the security, confidentiality, or integrity of [personal] PRIVATE information main- tained by a business. Good faith ACCESS TO, OR acquisition of [personal], PRIVATE information by an employee or agent of the business for the purposes of the business is not a breach of the security of the system, provided that the private information is not used or subject to unauthorized disclosure. IN DETERMINING WHETHER INFORMATION HAS BEEN ACCESSED, OR IS REASONABLY BELIEVED TO HAVE BEEN ACCESSED, BY AN UNAUTHORIZED PERSON OR A PERSON WITHOUT VALID AUTHORIZATION, SUCH BUSINESS MAY CONSIDER, AMONG OTHER FACTORS, INDICATIONS THAT THE INFORMATION WAS VIEWED, COMMUNICATED WITH, USED, OR ALTERED BY A PERSON WITHOUT VALID AUTHORIZATION OR BY AN UNAU- THORIZED PERSON. In determining whether information has been acquired, or is reasonably believed to have been acquired, by an unauthorized person or a person without valid authorization, such business may consider the following factors, among others: (1) indications that the information is in the physical possession and control of an unauthorized person, such as a lost or stolen computer or other device containing information; or (2) indications that the information has been downloaded or copied; or (3) indications that the information was used by an unauthorized person, such as fraudulent accounts opened or instances of identity theft reported. S. 5575--B 3 (d) "Consumer reporting agency" shall mean any person which, for mone- tary fees, dues, or on a cooperative nonprofit basis, regularly engages in whole or in part in the practice of assembling or evaluating consumer credit information or other information on consumers for the purpose of furnishing consumer reports to third parties, and which uses any means or facility of interstate commerce for the purpose of preparing or furnishing consumer reports. A list of consumer reporting agencies shall be compiled by the state attorney general and furnished upon request to any person or business required to make a notification under subdivision two of this section. 2. Any person or business which [conducts business in New York state, and which] owns or licenses computerized data which includes private information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the system to any resident of New York state whose private information was, or is reasonably believed to have been, ACCESSED OR acquired by a person without valid authorization. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision four of this section, or any measures necessary to determine the scope of the breach and restore the [reasonable] integrity of the system. (A) NOTICE TO AFFECTED PERSONS UNDER THIS SECTION IS NOT REQUIRED IF THE EXPOSURE OF PRIVATE INFORMATION WAS AN INADVERTENT DISCLOSURE BY PERSONS AUTHORIZED TO ACCESS PRIVATE INFORMATION, AND THE PERSON OR BUSINESS REASONABLY DETERMINES SUCH EXPOSURE WILL NOT LIKELY RESULT IN MISUSE OF SUCH INFORMATION, OR FINANCIAL HARM TO THE AFFECTED PERSONS OR EMOTIONAL HARM IN THE CASE OF UNKNOWN DISCLOSURE OF ONLINE CREDENTIALS AS FOUND IN SUBPARAGRAPH (II) OF PARAGRAPH (B) OF SUBDIVISION ONE OF THIS SECTION. SUCH A DETERMINATION MUST BE DOCUMENTED IN WRITING AND MAINTAINED FOR AT LEAST FIVE YEARS. IF THE INCIDENT AFFECTS OVER FIVE HUNDRED RESIDENTS OF NEW YORK, THE PERSON OR BUSINESS SHALL PROVIDE THE WRITTEN DETERMINATION TO THE STATE ATTORNEY GENERAL WITHIN TEN DAYS AFTER THE DETERMINATION. (B) IF NOTICE OF THE BREACH OF THE SECURITY OF THE SYSTEM IS MADE TO AFFECTED PERSONS PURSUANT TO THE BREACH NOTIFICATION REQUIREMENTS UNDER ANY OF THE FOLLOWING LAWS, NOTHING IN THIS SECTION SHALL REQUIRE ANY ADDITIONAL NOTICE TO THOSE AFFECTED PERSONS, BUT NOTICE STILL SHALL BE PROVIDED TO THE STATE ATTORNEY GENERAL, THE DEPARTMENT OF STATE AND THE DIVISION OF STATE POLICE PURSUANT TO PARAGRAPH (A) OF SUBDIVISION EIGHT OF THIS SECTION AND TO CONSUMER REPORTING AGENCIES PURSUANT TO PARAGRAPH (B) OF SUBDIVISION EIGHT OF THIS SECTION: (I) REGULATIONS PROMULGATED PURSUANT TO TITLE V OF THE FEDERAL GRAMM- LEACH-BLILEY ACT (15 U.S.C. 6801 TO 6809), AS AMENDED FROM TIME TO TIME; (II) REGULATIONS IMPLEMENTING THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (45 C.F.R. PARTS 160 AND 164), AS AMENDED FROM TIME TO TIME, AND THE HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT, AS AMENDED FROM TIME TO TIME; (III) PART FIVE HUNDRED OF TITLE TWENTY-THREE OF THE OFFICIAL COMPILA- TION OF CODES, RULES AND REGULATIONS OF THE STATE OF NEW YORK, AS AMENDED FROM TIME TO TIME; OR (IV) ANY OTHER DATA SECURITY RULES AND REGULATIONS OF, AND THE STAT- UTES ADMINISTERED BY, ANY OFFICIAL DEPARTMENT, DIVISION, COMMISSION OR AGENCY OF THE FEDERAL OR NEW YORK STATE GOVERNMENT AS SUCH RULES, REGU- LATIONS OR STATUTES ARE INTERPRETED BY SUCH DEPARTMENT, DIVISION, COMMISSION OR AGENCY OR BY THE FEDERAL OR NEW YORK STATE COURTS. S. 5575--B 4 3. Any person or business which maintains computerized data which includes private information which such person or business does not own shall notify the owner or licensee of the information of any breach of the security of the system immediately following discovery, if the private information was, or is reasonably believed to have been, ACCESSED OR acquired by a person without valid authorization. 5. The notice required by this section shall be directly provided to the affected persons by one of the following methods: (a) written notice; (b) electronic notice, provided that the person to whom notice is required has expressly consented to receiving said notice in electronic form and a log of each such notification is kept by the person or busi- ness who notifies affected persons in such form; provided further, however, that in no case shall any person or business require a person to consent to accepting said notice in said form as a condition of establishing any business relationship or engaging in any transaction. (c) telephone notification provided that a log of each such notifica- tion is kept by the person or business who notifies affected persons; or (d) substitute notice, if a business demonstrates to the state attor- ney general that the cost of providing notice would exceed two hundred fifty thousand dollars, or that the affected class of subject persons to be notified exceeds five hundred thousand, or such business does not have sufficient contact information. Substitute notice shall consist of all of the following: (1) e-mail notice when such business has an e-mail address for the subject persons, EXCEPT IF THE BREACHED INFORMATION INCLUDES AN E-MAIL ADDRESS IN COMBINATION WITH A PASSWORD OR SECURITY QUESTION AND ANSWER THAT WOULD PERMIT ACCESS TO THE ONLINE ACCOUNT, IN WHICH CASE THE PERSON OR BUSINESS SHALL INSTEAD PROVIDE CLEAR AND CONSPICUOUS NOTICE DELIVERED TO THE CONSUMER ONLINE WHEN THE CONSUMER IS CONNECTED TO THE ONLINE ACCOUNT FROM AN INTERNET PROTOCOL ADDRESS OR FROM AN ONLINE LOCATION WHICH THE PERSON OR BUSINESS KNOWS THE CONSUMER CUSTOMARILY USES TO ACCESS THE ONLINE ACCOUNT; (2) conspicuous posting of the notice on such business's web site page, if such business maintains one; and (3) notification to major statewide media. 6. (a) whenever the attorney general shall believe from evidence satisfactory to him OR HER that there is a violation of this article he OR SHE may bring an action in the name and on behalf of the people of the state of New York, in a court of justice having jurisdiction to issue an injunction, to enjoin and restrain the continuation of such violation. In such action, preliminary relief may be granted under article sixty-three of the civil practice law and rules. In such action the court may award damages for actual costs or losses incurred by a person entitled to notice pursuant to this article, if notification was not provided to such person pursuant to this article, including conse- quential financial losses. Whenever the court shall determine in such action that a person or business violated this article knowingly or recklessly, the court may impose a civil penalty of the greater of five thousand dollars or up to [ten] TWENTY dollars per instance of failed notification, provided that the latter amount shall not exceed [one] TWO hundred fifty thousand dollars. (b) the remedies provided by this section shall be in addition to any other lawful remedy available. (c) no action may be brought under the provisions of this section unless such action is commenced within [two] THREE years [immediately] S. 5575--B 5 after EITHER the date [of the act complained of or the date of discovery of such act] ON WHICH THE ATTORNEY GENERAL BECAME AWARE OF THE VIOLATION, OR THE DATE OF NOTICE SENT PURSUANT TO PARAGRAPH (A) OF SUBDIVISION EIGHT OF THIS SECTION, WHICHEVER OCCURS FIRST. IN NO EVENT SHALL AN ACTION BE BROUGHT AFTER SIX YEARS FROM THE DATE OF DISCOVERY OF THE BREACH OF PRIVATE INFORMATION BY THE COMPANY UNLESS THE COMPANY TOOK STEPS TO HIDE THE BREACH. 7. Regardless of the method by which notice is provided, such notice shall include contact information for the person or business making the notification, THE TELEPHONE NUMBERS AND WEBSITES OF THE RELEVANT STATE AND FEDERAL AGENCIES THAT PROVIDE INFORMATION REGARDING SECURITY BREACH RESPONSE AND IDENTITY THEFT PREVENTION AND PROTECTION INFORMATION, and a description of the categories of information that were, or are reason- ably believed to have been, ACCESSED OR acquired by a person without valid authorization, including specification of which of the elements of personal information and private information were, or are reasonably believed to have been, so ACCESSED OR acquired. 8. (a) In the event that any New York residents are to be notified, the person or business shall notify the state attorney general, the department of state and the division of state police as to the timing, content and distribution of the notices and approximate number of affected persons AND SHALL PROVIDE A COPY OF THE TEMPLATE OF THE NOTICE SENT TO AFFECTED PERSONS. Such notice shall be made without delaying notice to affected New York residents. (b) In the event that more than five thousand New York residents are to be notified at one time, the person or business shall also notify consumer reporting agencies as to the timing, content and distribution of the notices and approximate number of affected persons. Such notice shall be made without delaying notice to affected New York residents. 9. ANY COVERED ENTITY REQUIRED TO PROVIDE NOTIFICATION OF A BREACH, INCLUDING BREACH OF INFORMATION THAT IS NOT "PRIVATE INFORMATION" AS DEFINED IN PARAGRAPH (B) OF SUBDIVISION ONE OF THIS SECTION, TO THE SECRETARY OF HEALTH AND HUMAN SERVICES PURSUANT TO THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 OR THE HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT, AS AMENDED FROM TIME TO TIME, SHALL PROVIDE SUCH NOTIFICATION TO THE STATE ATTORNEY GENERAL WITHIN FIVE BUSINESS DAYS OF NOTIFYING THE SECRETARY. § 4. The general business law is amended by adding a new section 899- bb to read as follows: § 899-BB. DATA SECURITY PROTECTIONS. 1. DEFINITIONS. (A) "COMPLIANT REGULATED ENTITY" SHALL MEAN ANY PERSON OR BUSINESS THAT IS SUBJECT TO, AND IN COMPLIANCE WITH, ANY OF THE FOLLOWING DATA SECURITY REQUIREMENTS: (I) REGULATIONS PROMULGATED PURSUANT TO TITLE V OF THE FEDERAL GRAMM- LEACH-BLILEY ACT (15 U.S.C. 6801 TO 6809), AS AMENDED FROM TIME TO TIME; (II) REGULATIONS IMPLEMENTING THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (45 C.F.R. PARTS 160 AND 164), AS AMENDED FROM TIME TO TIME, AND THE HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT, AS AMENDED FROM TIME TO TIME; (III) PART FIVE HUNDRED OF TITLE TWENTY-THREE OF THE OFFICIAL COMPILA- TION OF CODES, RULES AND REGULATIONS OF THE STATE OF NEW YORK, AS AMENDED FROM TIME TO TIME; OR (IV) ANY OTHER DATA SECURITY RULES AND REGULATIONS OF, AND THE STAT- UTES ADMINISTERED BY, ANY OFFICIAL DEPARTMENT, DIVISION, COMMISSION OR AGENCY OF THE FEDERAL OR NEW YORK STATE GOVERNMENT AS SUCH RULES, REGU- LATIONS OR STATUTES ARE INTERPRETED BY SUCH DEPARTMENT, DIVISION, COMMISSION OR AGENCY OR BY THE FEDERAL OR NEW YORK STATE COURTS. S. 5575--B 6 (B) "PRIVATE INFORMATION" SHALL HAVE THE SAME MEANING AS DEFINED IN SECTION EIGHT HUNDRED NINETY-NINE-AA OF THIS ARTICLE. (C) "SMALL BUSINESS" SHALL MEAN ANY PERSON OR BUSINESS WITH (I) FEWER THAN FIFTY EMPLOYEES; (II) LESS THAN THREE MILLION DOLLARS IN GROSS ANNUAL REVENUE IN EACH OF THE LAST THREE FISCAL YEARS; OR (III) LESS THAN FIVE MILLION DOLLARS IN YEAR-END TOTAL ASSETS, CALCULATED IN ACCORDANCE WITH GENERALLY ACCEPTED ACCOUNTING PRINCIPLES. 2. REASONABLE SECURITY REQUIREMENT. (A) ANY PERSON OR BUSINESS THAT OWNS OR LICENSES COMPUTERIZED DATA WHICH INCLUDES PRIVATE INFORMATION OF A RESIDENT OF NEW YORK SHALL DEVELOP, IMPLEMENT AND MAINTAIN REASONABLE SAFEGUARDS TO PROTECT THE SECURITY, CONFIDENTIALITY AND INTEGRITY OF THE PRIVATE INFORMATION INCLUDING, BUT NOT LIMITED TO, DISPOSAL OF DATA. (B) A PERSON OR BUSINESS SHALL BE DEEMED TO BE IN COMPLIANCE WITH PARAGRAPH (A) OF THIS SUBDIVISION IF IT EITHER: (I) IS A COMPLIANT REGULATED ENTITY AS DEFINED IN SUBDIVISION ONE OF THIS SECTION; OR (II) IMPLEMENTS A DATA SECURITY PROGRAM THAT INCLUDES THE FOLLOWING: (A) REASONABLE ADMINISTRATIVE SAFEGUARDS SUCH AS THE FOLLOWING, IN WHICH THE PERSON OR BUSINESS: (1) DESIGNATES ONE OR MORE EMPLOYEES TO COORDINATE THE SECURITY PROGRAM; (2) IDENTIFIES REASONABLY FORESEEABLE INTERNAL AND EXTERNAL RISKS; (3) ASSESSES THE SUFFICIENCY OF SAFEGUARDS IN PLACE TO CONTROL THE IDENTIFIED RISKS; (4) TRAINS AND MANAGES EMPLOYEES IN THE SECURITY PROGRAM PRACTICES AND PROCEDURES; (5) SELECTS SERVICE PROVIDERS CAPABLE OF MAINTAINING APPROPRIATE SAFE- GUARDS, AND REQUIRES THOSE SAFEGUARDS BY CONTRACT; AND (6) ADJUSTS THE SECURITY PROGRAM IN LIGHT OF BUSINESS CHANGES OR NEW CIRCUMSTANCES; AND (B) REASONABLE TECHNICAL SAFEGUARDS SUCH AS THE FOLLOWING, IN WHICH THE PERSON OR BUSINESS: (1) ASSESSES RISKS IN NETWORK AND SOFTWARE DESIGN; (2) ASSESSES RISKS IN INFORMATION PROCESSING, TRANSMISSION AND STOR- AGE; (3) DETECTS, PREVENTS AND RESPONDS TO ATTACKS OR SYSTEM FAILURES; AND (4) REGULARLY TESTS AND MONITORS THE EFFECTIVENESS OF KEY CONTROLS, SYSTEMS AND PROCEDURES; AND (C) REASONABLE PHYSICAL SAFEGUARDS SUCH AS THE FOLLOWING, IN WHICH THE PERSON OR BUSINESS: (1) ASSESSES RISKS OF INFORMATION STORAGE AND DISPOSAL; (2) DETECTS, PREVENTS AND RESPONDS TO INTRUSIONS; (3) PROTECTS AGAINST UNAUTHORIZED ACCESS TO OR USE OF PRIVATE INFORMA- TION DURING OR AFTER THE COLLECTION, TRANSPORTATION AND DESTRUCTION OR DISPOSAL OF THE INFORMATION; AND (4) DISPOSES OF PRIVATE INFORMATION WITHIN A REASONABLE AMOUNT OF TIME AFTER IT IS NO LONGER NEEDED FOR BUSINESS PURPOSES BY ERASING ELECTRONIC MEDIA SO THAT THE INFORMATION CANNOT BE READ OR RECONSTRUCTED. (C) A SMALL BUSINESS AS DEFINED IN PARAGRAPH (C) OF SUBDIVISION ONE OF THIS SECTION COMPLIES WITH SUBPARAGRAPH (II) OF PARAGRAPH (B) OF SUBDI- VISION TWO OF THIS SECTION IF THE SMALL BUSINESS'S SECURITY PROGRAM CONTAINS REASONABLE ADMINISTRATIVE, TECHNICAL AND PHYSICAL SAFEGUARDS THAT ARE APPROPRIATE FOR THE SIZE AND COMPLEXITY OF THE SMALL BUSINESS, THE NATURE AND SCOPE OF THE SMALL BUSINESS'S ACTIVITIES, AND THE SENSI- TIVITY OF THE PERSONAL INFORMATION THE SMALL BUSINESS COLLECTS FROM OR ABOUT CONSUMERS. S. 5575--B 7 (D) ANY PERSON OR BUSINESS THAT FAILS TO COMPLY WITH THIS SUBDIVISION SHALL BE DEEMED TO HAVE VIOLATED SECTION THREE HUNDRED FORTY-NINE OF THIS CHAPTER, AND THE ATTORNEY GENERAL MAY BRING AN ACTION IN THE NAME AND ON BEHALF OF THE PEOPLE OF THE STATE OF NEW YORK TO ENJOIN SUCH VIOLATIONS AND TO OBTAIN CIVIL PENALTIES UNDER SECTION THREE HUNDRED FIFTY-D OF THIS CHAPTER. (E) NOTHING IN THIS SECTION SHALL CREATE A PRIVATE RIGHT OF ACTION. § 5. Paragraph (a) of subdivision 1 and subdivisions 2, 3, 6, 7 and 8 of section 208 of the state technology law, paragraph (a) of subdivision 1 and subdivisions 3 and 8 as added by chapter 442 of the laws of 2005, subdivision 2 and paragraph (a) of subdivision 7 as amended by section 5 of part N of chapter 55 of the laws of 2013 and subdivisions 6 and 7 as amended by chapter 491 of the laws of 2005, are amended and a new subdi- vision 9 is added to read as follows: (a) "Private information" shall mean EITHER: (I) personal information CONSISTING OF ANY INFORMATION in combination with any one or more of the following data elements, when either the DATA ELEMENT OR THE COMBINATION OF personal information [or] PLUS the data element is not encrypted or encrypted with an encryption key that has also been ACCESSED OR acquired: (1) social security number; (2) driver's license number or non-driver identification card number; [or] (3) account number, credit or debit card number, in combination with any required security code, access code, [or] password OR OTHER INFORMA- TION which would permit access to an individual's financial account; (4) ACCOUNT NUMBER, OR CREDIT OR DEBIT CARD NUMBER, IF CIRCUMSTANCES EXIST WHEREIN SUCH NUMBER COULD BE USED TO ACCESS TO AN INDIVIDUAL'S FINANCIAL ACCOUNT WITHOUT ADDITIONAL IDENTIFYING INFORMATION, SECURITY CODE, ACCESS CODE, OR PASSWORD; OR (5) BIOMETRIC INFORMATION, MEANING DATA GENERATED BY ELECTRONIC MEAS- UREMENTS OF AN INDIVIDUAL'S UNIQUE PHYSICAL CHARACTERISTICS, SUCH AS FINGERPRINT, VOICE PRINT, OR RETINA OR IRIS IMAGE, OR OTHER UNIQUE PHYS- ICAL REPRESENTATION OR DIGITAL REPRESENTATION WHICH ARE USED TO AUTHEN- TICATE OR ASCERTAIN THE INDIVIDUAL'S IDENTITY; OR (II) A USER NAME OR E-MAIL ADDRESS IN COMBINATION WITH A PASSWORD OR SECURITY QUESTION AND ANSWER THAT WOULD PERMIT ACCESS TO AN ONLINE ACCOUNT. "Private information" does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. 2. Any state entity that owns or licenses computerized data that includes private information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the system to any resident of New York state whose private information was, or is reasonably believed to have been, ACCESSED OR acquired by a person without valid authorization. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision four of this section, or any measures necessary to determine the scope of the breach and restore the [reasonable] integ- rity of the data system. The state entity shall consult with the state office of information technology services to determine the scope of the breach and restoration measures. WITHIN NINETY DAYS OF THE NOTICE OF THE BREACH, THE OFFICE OF INFORMATION TECHNOLOGY SERVICES SHALL DELIVER A S. 5575--B 8 REPORT ON THE SCOPE OF THE BREACH AND RECOMMENDATIONS TO RESTORE AND IMPROVE THE SECURITY OF THE SYSTEM TO THE STATE ENTITY. (A) NOTICE TO AFFECTED PERSONS UNDER THIS SECTION IS NOT REQUIRED IF THE EXPOSURE OF PRIVATE INFORMATION WAS AN INADVERTENT DISCLOSURE BY PERSONS AUTHORIZED TO ACCESS PRIVATE INFORMATION, AND THE STATE ENTITY REASONABLY DETERMINES SUCH EXPOSURE WILL NOT LIKELY RESULT IN MISUSE OF SUCH INFORMATION, OR FINANCIAL OR EMOTIONAL HARM TO THE AFFECTED PERSONS. SUCH A DETERMINATION MUST BE DOCUMENTED IN WRITING AND MAIN- TAINED FOR AT LEAST FIVE YEARS. IF THE INCIDENT AFFECTED OVER FIVE HUNDRED RESIDENTS OF NEW YORK, THE STATE ENTITY SHALL PROVIDE THE WRIT- TEN DETERMINATION TO THE STATE ATTORNEY GENERAL WITHIN TEN DAYS AFTER THE DETERMINATION. (B) IF NOTICE OF THE BREACH OF THE SECURITY OF THE SYSTEM IS MADE TO AFFECTED PERSONS PURSUANT TO THE BREACH NOTIFICATION REQUIREMENTS UNDER ANY OF THE FOLLOWING LAWS, NOTHING IN THIS SECTION SHALL REQUIRE ANY ADDITIONAL NOTICE TO THOSE AFFECTED PERSONS, BUT NOTICE STILL SHALL BE PROVIDED TO THE STATE ATTORNEY GENERAL, THE DEPARTMENT OF STATE AND THE OFFICE OF INFORMATION TECHNOLOGY SERVICES PURSUANT TO PARAGRAPH (A) OF SUBDIVISION SEVEN OF THIS SECTION AND TO CONSUMER REPORTING AGENCIES PURSUANT TO PARAGRAPH (B) OF SUBDIVISION SEVEN OF THIS SECTION: (I) REGULATIONS PROMULGATED PURSUANT TO TITLE V OF THE FEDERAL GRAMM- LEACH-BLILEY ACT (15 U.S.C. 6801 TO 6809), AS AMENDED FROM TIME TO TIME; (II) REGULATIONS IMPLEMENTING THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (45 C.F.R. PARTS 160 AND 164), AS AMENDED FROM TIME TO TIME, AND THE HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT, AS AMENDED FROM TIME TO TIME; (III) PART FIVE HUNDRED OF TITLE TWENTY-THREE OF THE OFFICIAL COMPILA- TION OF CODES, RULES AND REGULATIONS OF THE STATE OF NEW YORK, AS AMENDED FROM TIME TO TIME; OR (IV) ANY OTHER DATA SECURITY RULES AND REGULATIONS OF, AND THE STAT- UTES ADMINISTERED BY, ANY OFFICIAL DEPARTMENT, DIVISION, COMMISSION OR AGENCY OF THE FEDERAL OR NEW YORK STATE GOVERNMENT AS SUCH RULES, REGU- LATIONS OR STATUTES ARE INTERPRETED BY SUCH DEPARTMENT, DIVISION, COMMISSION OR AGENCY OR BY THE FEDERAL OR NEW YORK STATE COURTS. 3. Any state entity that maintains computerized data that includes private information which such agency does not own shall notify the owner or licensee of the information of any breach of the security of the system immediately following discovery, if the private information was, or is reasonably believed to have been, ACCESSED OR acquired by a person without valid authorization. 6. Regardless of the method by which notice is provided, such notice shall include contact information for the state entity making the notification, THE TELEPHONE NUMBERS AND WEBSITES OF THE RELEVANT STATE AND FEDERAL AGENCIES THAT PROVIDE INFORMATION REGARDING SECURITY BREACH RESPONSE AND IDENTITY THEFT PREVENTION AND PROTECTION INFORMATION and a description of the categories of information that were, or are reason- ably believed to have been, ACCESSED OR acquired by a person without valid authorization, including specification of which of the elements of personal information and private information were, or are reasonably believed to have been, so ACCESSED OR acquired. 7. (a) In the event that any New York residents are to be notified, the state entity shall notify the state attorney general, the department of state and the state office of information technology services as to the timing, content and distribution of the notices and approximate number of affected persons AND PROVIDE A COPY OF THE TEMPLATE OF THE S. 5575--B 9 NOTICE SENT TO AFFECTED PERSONS. Such notice shall be made without delaying notice to affected New York residents. (b) In the event that more than five thousand New York residents are to be notified at one time, the state entity shall also notify consumer reporting agencies as to the timing, content and distribution of the notices and approximate number of affected persons. Such notice shall be made without delaying notice to affected New York residents. 8. THE STATE OFFICE OF INFORMATION TECHNOLOGY SERVICES SHALL DEVELOP, UPDATE AND PROVIDE REGULAR TRAINING TO ALL STATE ENTITIES RELATING TO BEST PRACTICES FOR THE PREVENTION OF A BREACH OF THE SECURITY OF THE SYSTEM. 9. ANY COVERED ENTITY REQUIRED TO PROVIDE NOTIFICATION OF A BREACH, INCLUDING BREACH OF INFORMATION THAT IS NOT "PRIVATE INFORMATION" AS DEFINED IN PARAGRAPH (A) OF SUBDIVISION ONE OF THIS SECTION, TO THE SECRETARY OF HEALTH AND HUMAN SERVICES PURSUANT TO THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 OR THE HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT, AS AMENDED FROM TIME TO TIME, SHALL PROVIDE SUCH NOTIFICATION TO THE STATE ATTORNEY GENERAL WITHIN FIVE BUSINESS DAYS OF NOTIFYING THE SECRETARY. 10. Any entity listed in subparagraph two of paragraph (c) of subdi- vision one of this section shall adopt a notification policy no more than one hundred twenty days after the effective date of this section. Such entity may develop a notification policy which is consistent with this section or alternatively shall adopt a local law which is consist- ent with this section. § 6. This act shall take effect on the ninetieth day after it shall have become a law; provided, however, that section four of this act shall take effect on the two hundred fortieth day after it shall have become a law.