Alabama 2024 Regular Session

Alabama Senate Bill SB213 Latest Draft

Bill / Introduced Version Filed 03/06/2024

                            SB213INTRODUCED
Page 0
SB213
RRIDNMM-1
By Senators Orr, Allen
RFD: Fiscal Responsibility and Economic Development
First Read: 06-Mar-24
1
2
3
4
5 RRIDNMM-1 03/06/2024 ZAK (L)cr 2024-402
Page 1
First Read: 06-Mar-24
SYNOPSIS:
Existing law provides for the confidentiality of
certain personal information in certain contexts.
This bill would provide that brokers of
individual consumers' data must notify consumers of
certain information on their website.
This bill would provide that data brokers must
register with the Secretary of State. 
This bill would provide that data brokers must
protect consumers' data through specified security
measures.
This bill would require the Secretary of State
to adopt rules and procedures to implement and
administer the requirements of this bill.
This bill would provide civil penalties for data
brokers that violate these notification or registration
requirements.
This bill would provide that violations of the
duty to protect consumers' data through specified
security measures by data brokers constitute violations
of the Deceptive Trade Practices Act.
This bill would provide certain persons and
information to which the requirements of this bill do
not apply.
Section 111.05 of the Constitution of Alabama of
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28 SB213 INTRODUCED
Page 2
Section 111.05 of the Constitution of Alabama of
2022, prohibits a general law whose purpose or effect
would be to require a new or increased expenditure of
local funds from becoming effective with regard to a
local governmental entity without enactment by a 2/3
vote unless: it comes within one of a number of
specified exceptions; it is approved by the affected
entity; or the Legislature appropriates funds, or
provides a local source of revenue, to the entity for
the purpose. 
The purpose or effect of this bill would be to
require a new or increased expenditure of local funds
within the meaning of the section. However, the bill
does not require approval of a local governmental
entity or enactment by a 2/3 vote to become effective
because it comes within one of the specified exceptions
contained in the section.
A BILL
TO BE ENTITLED
AN ACT
Relating to data privacy; to require consumer data
brokers to publicly state certain information; to require data
brokers to register with the Secretary of State; to require
that data brokers protect data using specified security
measures; to provide civil and criminal penalties for
violations; to provide persons and information to which these
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56 SB213 INTRODUCED
Page 3
violations; to provide persons and information to which these
requirements do not apply; and in connection therewith would
have as its purpose or effect the requirement of a new or
increased expenditure of local funds within the meaning of
Section 111.05 of the Constitution of Alabama of 2022.
BE IT ENACTED BY THE LEGISLATURE OF ALABAMA:
Section 1. For the purposes of this act, the following
terms have the following meanings: 
(1) BIOMETRIC DATA. Data generated by automatic
measurements of an individual's biological patterns or
characteristics, including fingerprint, voiceprint, retina or
iris scan, information pertaining to an individual's DNA, or
another unique biological pattern or characteristic that is
used to identify a specific individual.
(2) CHILD. An individual younger than 13 years of age.
(3) COLLECT. In the context of data, means to obtain,
receive, access, or otherwise acquire data by any means,
including by purchasing or renting the data.
(4) DATA BROKER. A business entity whose principal
source of revenue is derived from the collecting, 
processing, or transferring of personal data that the entity
did not collect directly from the individual linked or
linkable to the data.
(5) DE-IDENTIFIED DATA. Data that cannot reasonably be
linked to an identified or identifiable individual or to a
device linked to that individual.
(6) EMPLOYEE. An individual who is a director, officer,
staff member, trainee, volunteer, or intern of an employer or
an individual working as an independent contractor for an
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84 SB213 INTRODUCED
Page 4
an individual working as an independent contractor for an
employer, regardless of whether the individual is paid,
unpaid, or employed on a temporary basis. The term does not
include an individual contractor who is a service provider.
(7) EMPLOYEE DATA. Information collected, processed, or
transferred by an employer if the information satisfies both
of the following:
a. Is related to any of the following:
1. A job applicant and was collected during the course
of the hiring and application process.
2. An employee who is acting in a professional capacity
for the employer, including the employee's business contact
information such as the employee's name, position, title,
business telephone number, business address, or business
e-mail address.
3. An employee's emergency contact information.
4. An employee or the employee's spouse, dependent,
covered family member, or beneficiary.
b. Was collected, processed, or transferred solely for
any of the following:
1. A purpose relating to the status of an individual
described by subparagraph a.1. as a current or former job
applicant of the employer.
2. A purpose relating to the professional 
activities of an employee described by subparagraph a.2. on
behalf of the employer.
3. The purpose of having an emergency contact on file
for an employee described by subparagraph a.3. and for
transferring the information in case of an emergency.
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112 SB213 INTRODUCED
Page 5
transferring the information in case of an emergency.
4. The purpose of administering benefits 
to which an employee described by subparagraph a.4. is
entitled or to which another individual described by that
paragraph is entitled on the basis of the employee's position
with the employer.
(8) GENETIC DATA. Any data, regardless of
format, concerning an individual's genetic characteristics.
The term includes raw sequence data derived from sequencing
all or a portion of an individual's extracted DNA and
genotypic and phenotypic information obtained from analyzing
an individual's raw sequence data.
(9) KNOWN CHILD. A child under circumstances where a
data broker has actual knowledge of, or willfully disregards
obtaining actual knowledge of, the child's age.
(10) PERSONAL DATA. Any information, including
sensitive data, that is linked or reasonably linkable to a
identified or identifiable individual. The term includes
pseudonymous data when the information is used by a controller
or processor in conjunction with additional information that 
reasonably links the information to an identified or
identifiable individual. The term does not include
de-identified data, employee data, or publicly available
information.
(11) PRECISE GEOLOCATION DATA. Information
accessed on a device or technology that shows the past or
present physical location of an individual or the individual's
device with sufficient precision to identify street-level
location information of the individual or device in a range of
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140 SB213 INTRODUCED
Page 6
location information of the individual or device in a range of
not more than 1,850 feet. The term does not include location
information regarding an individual or device identifiable or
derived solely from the visual content of a legally obtained
image, including the location of a device that captured the
image.
(12) PROCESS. In the context of data, an
operation or set of operations performed, whether by manual or
automated means, on personal data or on sets of personal data,
such as the collection, use, storage, disclosure, analysis,
deletion, or modification of personal data.
 (13) PUBLICLY AVAILABLE INFORMATION. Information to
which any of the following apply:
a. Is lawfully made available through governmental
records.
b. A business has a reasonable basis to believe
is lawfully available to the general public through widely 
distributed media.
c. Is lawfully made available by a consumer, or
by an individual to whom a consumer has disclosed the
information, unless the consumer has restricted access to the
information to a specific audience.
(14) SENSITIVE DATA.
a. A government-issued identifier not required by law
to be publicly available, including any of the following:
1. A Social Security number.
2. A passport number.
3. A driver license number.
b. Information that describes or reveals an
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168 SB213 INTRODUCED
Page 7
b. Information that describes or reveals an
individual's mental or physical health diagnosis, condition,
or treatment.
c. An individual's financial information, except the
last four digits of a debit or credit card number, including
any of the following:
1. A financial account number.
2. A credit or debit card number.
3. Information that describes or reveals the income
level or bank account balances of the individual.
d. Biometric data.
e. Genetic data.
f. Precise geolocation data.
g. An individual's private communication, and that if
made using a device, is not made using a device provided by
the individual's employer that provides conspicuous notice to
the individual that the employer may access communication made
using the device. These communications include, unless the
data broker is the sender or an intended recipient of the
communication, all of the following:
1. The individual's voicemails, e-mails, texts, direct
messages, or mail.
2. Information that identifies the parties involved in
the communications.
3. Information that relates to the transmission of the
communications, including telephone numbers called, telephone
numbers from which calls were placed, the time calls were
made, call duration, and location information of the parties
to the call.
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196 SB213 INTRODUCED
Page 8
to the call.
h. A log-in credential, security code, or access code
for an account or device.
i. Information identifying the sexual behavior of the
individual in a manner inconsistent with the individual's 
reasonable expectation regarding the collection, processing,
or transfer of the information.
j. Calendar information, address book information,
phone or text logs, photos, audio recordings, or videos that
are both:
1. Maintained for private use by an individual and
stored on the individual's device or in another location.
2. Not communicated using a device provided by the
individual's employer unless the employee was provided
conspicuous notice that the employer may access communication
made using the device.
k. A photograph, film, video recording, or other
similar medium that shows the individual or a part of the
individual nude or wearing undergarments.
l. Information revealing the video content requested or
selected by an individual that is neither of the following: 
1. Collected by a provider of broadcast television
service, cable service, satellite service, streaming media
service, or other video programming, as that term is defined
by 47 U.S.C. § 613. 
2. Used solely for transfers for independent video
measurement.
m. Information regarding a known child.
n. Information revealing an individual's racial or
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224 SB213 INTRODUCED
Page 9
n. Information revealing an individual's racial or
ethnic origin, color, religious beliefs, or union membership.
o. Information identifying an individual's online
activities over time accessing multiple Internet websites or
online services.
p. Information collected, processed, or 
transferred for the purpose of identifying information
described by this subdivision.
(15) SERVICE PROVIDER. A person that receives,
collects, processes, or transfers personal data on behalf of,
and at the direction of, a business or governmental entity,
including a business or governmental entity that is another
service provider, in order for the person to perform a service
or function with or on behalf of the business or governmental
entity.
(16) TRANSFER. In the context of data, to disclose,
release, share, disseminate, make available, sell, or license
the data by any means or medium.
Section 2. (a) Except as provided by subsection (b),
this act applies to personal data from an individual that is
collected, transferred, or processed by a data broker.
(b) This chapter does not apply to any of the following
data:
(1) De-identified data, if the data broker does all of
the following:
a. Takes reasonable technical measures to ensure that
the data is not able to be used to identify an individual with
whom the data is associated.
b. Publicly commits to both of the following in a clear
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252 SB213 INTRODUCED
Page 10
b. Publicly commits to both of the following in a clear
and conspicuous manner:
1. To process and transfer the data solely in a
de-identified form without any reasonable means for
reidentification.
2. To not attempt to identify the information to an
individual with whom the data is associated. 
c. Contractually obligates a person that receives the
information from the provider to both of the following: 
1. Comply with this subsection with respect to the
information. 
2. Include those contractual obligations in any
subsequent transfer of the data to another person.
(2) Employee data.
(3) Publicly available information.
(4) Inferences made exclusively from multiple
independent sources of publicly available information that
does not reveal sensitive data with respect to an individual.
(5) Data subject to Title V of the Gramm-Leach-Bliley
Act, 15 U.S.C. § 6801, et seq.
Section 3. (a) Except as provided by subsection (b),
this act applies only to a data broker that derives either of
the following within a 12-month period:
(1) More than 50 percent of the data broker's revenue
from processing or transferring personal data that the data
broker did not collect directly from the individuals to whom
the data pertains.
(2) Revenue from processing or transferring the
personal data of more than 50,000 individuals that the data
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280 SB213 INTRODUCED
Page 11
personal data of more than 50,000 individuals that the data
broker did not collect directly from the individuals to whom
the data pertains.
(b) This chapter does not apply to any of the
following:
(1) A service provider, including a service provider
that engages in the business of processing employee data for a
third-party employer for the sole purpose of providing
benefits to the third-party employer's employees.
(2) A person that collects personal data from another
person to which the person is related by common ownership or
corporate control, provided a reasonable consumer would expect
the persons to share data.
(3) A federal, state, tribal, territorial, or local
governmental entity, including a body, authority, board,
bureau, commission, district, agency, or political subdivision
of a governmental entity.
(4) An entity that serves as a congressionally
designated nonprofit, national resource center, or
clearinghouse to provide assistance to victims, families,
child-serving professionals, and the general public on missing
and exploited children issues.
(5) A consumer reporting agency or other entity that
furnishes information for inclusion in a consumer credit
report or obtains a consumer credit report, but only to the
extent the entity engages in activity regulated or authorized
by the Fair Credit Reporting Act, 15 U.S.C. § 1681, et seq.,
including the collection, maintenance, disclosure, sale,
communication, or use of any personal information bearing on a
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308 SB213 INTRODUCED
Page 12
communication, or use of any personal information bearing on a
consumer's creditworthiness, credit standing, credit capacity,
character, general reputation, personal characteristics, or
mode of living.
(6) A financial institution subject to Title V of the
Gramm-Leach-Bliley Act, 15 U.S.C. § 6801, et seq.
Section 4. A data broker that maintains an Internet
website or mobile application shall post a conspicuous notice
on the website or application that complies with all of the
following:
(1) States that the entity maintaining the website or
application is a data broker.
(2) Is clear, not misleading, and readily accessible 
by the general public, including individuals with a
disability.
(3) Contains language provided by rule of the Secretary
of State for inclusion in the notice.
Section 5. (a) To conduct business in this state, a
data broker that is subject to this act shall register by
January 1, 2025, with the Secretary of State by filing a
registration certificate and paying a registration fee of
three hundred dollars ($300).
(b) The registration certificate must include all of
the following:
(1) The legal name of the data broker.
(2) A contact individual and the primary physical
address, e-mail address, telephone number, and Internet
website address for the data broker.
(3) A description of the categories of data the data
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336 SB213 INTRODUCED
Page 13
(3) A description of the categories of data the data
broker processes and transfers.
(4) A statement of whether or not the data broker
implements a purchaser credentialing process.
(5) If the data broker has actual knowledge that the 
data broker possesses personal data of a known child, both of
the following:
a. A statement detailing the data collection practices,
databases, sales activities, and opt-out policies that are
applicable to the personal data of a known child.
b. A statement as to how the data broker complies with
applicable federal and state law regarding the collection,
use, or disclosure of personal data from and about a child on
the Internet.
(6) The number of security breaches the data broker has
experienced during the year immediately preceding the year in
which the registration is filed and, if known, the total
number of consumers affected by each breach.
(c) The registration certificate may include any
additional information or explanation the data broker chooses
to provide to the Secretary of State concerning the data
broker's data collection practices.
(d) A registration certificate expires on the first
anniversary of its date of issuance and every year thereafter.
A data broker may renew a registration certificate by filing a
renewal application, in the form prescribed by the Secretary
of State, and paying a renewal fee of three hundred dollars
($300).
Section 6. (a) The Secretary of State shall establish
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364 SB213 INTRODUCED
Page 14
Section 6. (a) The Secretary of State shall establish
and maintain, on its Internet website, a searchable, central
registry of data brokers registered pursuant to Section 5.
(b) The registry must include both of the following:
(1) A search feature that allows an individual
searching the registry to identify a specific data broker.
(2) For each data broker, the information filed under
Section 5(b).
Section 7. (a) A data broker conducting business in
this state has a duty to protect personal data held by the
data broker in accordance with this section. 
(b) A data broker shall develop, implement, and
maintain a comprehensive information security program that is
written in one or more readily accessible parts and employs
administrative, technical, and physical safeguards that are
appropriate for:
(1) The data broker's size, scope, and type of
business;
(2) The amount of resources available to the data
broker;
(3) The amount of data stored by the data broker; and
(4) The need for security and confidentiality of the
personal data stored by the data broker.
(c) The comprehensive information security program
required by this section must:
(1) Incorporate safeguards that are consistent with the
safeguards for protection of personal data and information of
a similar character under state or federal laws and rules
applicable to the data broker;
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392 SB213 INTRODUCED
Page 15
applicable to the data broker;
(2) Include the designation of one or more employees of
the data broker to maintain the program;
(3) Require the identification and assessment of
reasonably foreseeable internal and external risks to the
security, confidentiality, and integrity of any electronic,
paper, or other record containing personal data, and the
establishment of a process for evaluating and improving, as
necessary, the effectiveness of the current safeguards for
limiting those risks, including:
a. Requiring ongoing employee and contractor education
and training, including education and training for temporary
employees and contractors of the data broker, on the proper
use of security procedures and protocols and the importance of
personal data security;
b. Mandating employee compliance with policies and
procedures established under the program; and
c. Providing a means for detecting and preventing
security system failures;
(4) Include security policies for the data broker's
employees relating to the storage, access, and transportation
of records containing personal data outside of the broker's
physical business premises;
(5) Provide disciplinary measures for violations of a
policy or procedure established under the program;
(6) Include measures for preventing a terminated
employee from accessing records containing personal data;
(7) Provide policies for the supervision of third-party
service providers that include:
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420 SB213 INTRODUCED
Page 16
service providers that include:
a. Taking reasonable steps to select and retain
third-party service providers that are capable of maintaining
appropriate security measures to protect personal data
consistent with applicable law; and
b. Requiring third-party service providers, by
contract, to implement and maintain appropriate security
measures for personal data;
(8) Provide reasonable restrictions on physical access
to records containing personal data, including requiring the
records containing the data to be stored in a locked facility,
storage area, or container;
(9) Include regular monitoring to ensure that the
program is operating in a manner reasonably calculated to
prevent unauthorized access to or unauthorized use of personal
data and, as necessary, upgrading information safeguards to
limit the risk of unauthorized access to or unauthorized use
of personal data;
(10)a. Require the regular review of the scope of the
program's security measures;
b. A review of the scope of the program's security
measures must occur at least annually and anytime there is a
material change in the data broker's business practices that
may reasonably affect the security or integrity of records
containing personal data;
(11) Require the documentation of responsive actions
taken in connection with any incident involving a breach of
security, including a mandatory post-incident review of each
event and the actions taken, if any, to make changes in
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448 SB213 INTRODUCED
Page 17
event and the actions taken, if any, to make changes in
business practices relating to the protection of personal data
in response to that event; and
(12) To the extent feasible, include the following
procedures and protocols with respect to computer system
security requirements or procedures and protocols providing a
higher degree of security, for the protection of personal
data:
a. Using secure user authentication protocols that
include:
1. Controlling user log-in credentials and other
identifiers;
2. Using a reasonably secure method of assigning and
selecting passwords or using unique identifier technologies,
which may include biometrics or token devices;
3. Controlling data security passwords to ensure that
the passwords are kept in a location and format that do not
compromise the security of the data the passwords protect;
4. Restricting access to only active users and active
user accounts; and
5. Blocking access to user credentials or
identification after multiple unsuccessful attempts to gain
access;
b. Using secure access control measures that include:
1. Restricting access to records containing personal
data to only employees or contractors who need access to the
personal data to perform their job duties; and
2. Assigning to each employee or contractor with access
to a computer containing personal data a unique identification
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476 SB213 INTRODUCED
Page 18
to a computer containing personal data a unique identification
and password, which may not be a vendor-supplied default
password, or using another protocol reasonably designed to
maintain the integrity of the security of the access controls
to personal data;
c. Encryption of:
1. Transmitted records containing personal data that
will travel across public networks; and
2. Data containing personal data that is transmitted
wirelessly;
d. Reasonable monitoring of systems for unauthorized
use of or access to personal data;
e. Encryption of all personal data stored on laptop
computers or other portable devices;
f. For records containing personal data on a system
that is connected to the Internet, using reasonably current
firewall protection and operating system security patches that
are reasonably designed to maintain the integrity of the
personal data; and
g. Using:
1. A reasonably current version of system security
agent software that must include malware protection and
reasonably current patches and virus definitions; or
2. A version of system security agent software that is
supportable with current patches and virus definitions and is
set to receive the most current security updates on a regular
basis.
(d) A violation of this section by a data broker
constitutes a violation of the Deceptive Trade Practices Act,
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504 SB213 INTRODUCED
Page 19
constitutes a violation of the Deceptive Trade Practices Act,
Chapter 19 of Title 8, Code of Alabama 1975, and shall be
subject to the same penalties as provided therein.
Section 8. (a) A data broker that violates Section 4 or
5 shall be assessed the following civil penalties by the
Secretary of State:
(1) One hundred dollars ($100) for each day the entity
is in violation.
(2) The amount of unpaid registration fees for each
year the entity fails to register as required by Section 5.
(b) A civil penalty assessed pursuant to this section 
may not exceed ten thousand dollars ($10,000) against a single
data broker during a 12-month period.
(c) The Attorney General may bring an action to recover
any civil penalty assessed under this section and may recover
reasonable attorney fees and court costs incurred in bringing
the action. 
(d)(1) All penalties collected pursuant to this act
shall be deposited into the Consumer Privacy Protection Fund
which is created in the State Treasury. The fund shall be
administered by the Secretary of State for the purpose of
implementing and administering this act.
(2) No money shall be withdrawn or expended from this
fund for any purpose unless the monies have been appropriated
by the Legislature and allocated pursuant to this act. Any
monies appropriated shall be budgeted and allocated pursuant
to the Budget Management Act in accordance with Article 4,
commencing with Section 41-4-80 of Chapter 4 of Title 41, Code
of Alabama 1975, and only in the amounts provided by the
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532 SB213 INTRODUCED
Page 20
of Alabama 1975, and only in the amounts provided by the
Legislature in the general appropriations act or other
appropriations act.
Section 9. The Secretary of State shall adopt rules as
necessary to implement this act.
Section 10. This act does not apply to the collection,
processing, or transfer of personal data by a data broker
before January 1, 2025. 
Section 11. Although this bill would have as its
purpose or effect the requirement of a new or increased
expenditure of local funds, the bill is excluded from further
requirements and application under Section 111.05 of the
Constitution of Alabama of 2022, because the bill defines a
new crime or amends the definition of an existing crime.
Section 12. This act shall become effective on October
1, 2024.
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547