California 2025-2026 Regular Session

California Senate Bill SB446 Compare Versions

OldNewDifferences
1-Amended IN Senate April 03, 2025 CALIFORNIA LEGISLATURE 20252026 REGULAR SESSION Senate Bill No. 446Introduced by Senator HurtadoFebruary 18, 2025 An act to amend Section 1798.82 of the Civil Code, relating to personal information.LEGISLATIVE COUNSEL'S DIGESTSB 446, as amended, Hurtado. Data breaches: customer notification.Existing law requires an individual or a business that conducts business in California, and that owns or licenses computerized data that includes personal information, to disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was compromised, as specified, and requires that disclosure to be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as specified, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.This bill would require that data breach disclosure to be made within 30 calendar days of discovery or notification of the data breach but would authorize a an individual or business to delay the disclosure to accommodate the legitimate needs of law enforcement, as specified, or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Existing law also requires an individual or business that is required to issue the security breach notification described above to more than 500 California residents as a result of a single breach of the security system to electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General.This bill would require that submission to the Attorney General to be made within 15 calendar days of discovery or notification of the security breach.Digest Key Vote: MAJORITY Appropriation: NO Fiscal Committee: NO Local Program: NO Bill TextThe people of the State of California do enact as follows:SECTION 1. Section 1798.82 of the Civil Code is amended to read:1798.82. (a) (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A An individual or business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) An individual or business that maintains computerized data that includes personal information that the individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected individual for not less than 12 months along with all information necessary to take advantage of the offer to any individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the individual or business, the security breach notification may also include any of the following:(A) Information about what the individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the individual or business. Good faith acquisition of personal information by an employee or agent of the individual or business for the purposes of the individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the individual or business, if the individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the individual whose personal information has been breached promptly to change the individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the individual or business and all other online accounts for which the individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the individual or business, the individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the individual or business notifies subject individuals in accordance with its policies in the event of a breach of security of the system.
1+CALIFORNIA LEGISLATURE 20252026 REGULAR SESSION Senate Bill No. 446Introduced by Senator HurtadoFebruary 18, 2025 An act to amend Section 1798.82 of the Civil Code, relating to personal information.LEGISLATIVE COUNSEL'S DIGESTSB 446, as introduced, Hurtado. Data breaches: customer notification.Existing law requires an individual or a business that conducts business in California, and that owns or licenses computerized data that includes personal information, to disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was compromised, as specified, and requires that disclosure to be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as specified, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.This bill would require that data breach disclosure to be made within 30 calendar days of discovery or notification of the data breach but would authorize a business to delay the disclosure to accommodate the legitimate needs of law enforcement, as specified, or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Existing law also requires an individual or business that is required to issue the security breach notification described above to more than 500 California residents as a result of a single breach of the security system to electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General.This bill would require that submission to the Attorney General to be made within 15 calendar days of discovery or notification of the security breach.Digest Key Vote: MAJORITY Appropriation: NO Fiscal Committee: NO Local Program: NO Bill TextThe people of the State of California do enact as follows:SECTION 1. Section 1798.82 of the Civil Code is amended to read:1798.82. (a) A person (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California (1) whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or, (2) or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision (c), or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) A person An individual or business that maintains computerized data that includes personal information that the person individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) A person An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting person individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the person individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected person individual for not less than 12 months along with all information necessary to take advantage of the offer to any person individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the person individual or business, the security breach notification may also include any of the following:(A) Information about what the person individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) A person An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General. General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the person individual or business. Good faith acquisition of personal information by an employee or agent of the person individual or business for the purposes of the person individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the person individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the person individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the person individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the person individual or business, if the person individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the persons individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the person individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the person individual whose personal information has been breached promptly to change the persons individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the person individual or business and all other online accounts for which the person individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the person individual or business, the person individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the person individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a person individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the person individual or business notifies subject persons individuals in accordance with its policies in the event of a breach of security of the system.
22
3- Amended IN Senate April 03, 2025 CALIFORNIA LEGISLATURE 20252026 REGULAR SESSION Senate Bill No. 446Introduced by Senator HurtadoFebruary 18, 2025 An act to amend Section 1798.82 of the Civil Code, relating to personal information.LEGISLATIVE COUNSEL'S DIGESTSB 446, as amended, Hurtado. Data breaches: customer notification.Existing law requires an individual or a business that conducts business in California, and that owns or licenses computerized data that includes personal information, to disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was compromised, as specified, and requires that disclosure to be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as specified, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.This bill would require that data breach disclosure to be made within 30 calendar days of discovery or notification of the data breach but would authorize a an individual or business to delay the disclosure to accommodate the legitimate needs of law enforcement, as specified, or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Existing law also requires an individual or business that is required to issue the security breach notification described above to more than 500 California residents as a result of a single breach of the security system to electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General.This bill would require that submission to the Attorney General to be made within 15 calendar days of discovery or notification of the security breach.Digest Key Vote: MAJORITY Appropriation: NO Fiscal Committee: NO Local Program: NO
3+ CALIFORNIA LEGISLATURE 20252026 REGULAR SESSION Senate Bill No. 446Introduced by Senator HurtadoFebruary 18, 2025 An act to amend Section 1798.82 of the Civil Code, relating to personal information.LEGISLATIVE COUNSEL'S DIGESTSB 446, as introduced, Hurtado. Data breaches: customer notification.Existing law requires an individual or a business that conducts business in California, and that owns or licenses computerized data that includes personal information, to disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was compromised, as specified, and requires that disclosure to be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as specified, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.This bill would require that data breach disclosure to be made within 30 calendar days of discovery or notification of the data breach but would authorize a business to delay the disclosure to accommodate the legitimate needs of law enforcement, as specified, or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Existing law also requires an individual or business that is required to issue the security breach notification described above to more than 500 California residents as a result of a single breach of the security system to electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General.This bill would require that submission to the Attorney General to be made within 15 calendar days of discovery or notification of the security breach.Digest Key Vote: MAJORITY Appropriation: NO Fiscal Committee: NO Local Program: NO
44
5- Amended IN Senate April 03, 2025
65
7-Amended IN Senate April 03, 2025
6+
7+
88
99 CALIFORNIA LEGISLATURE 20252026 REGULAR SESSION
1010
1111 Senate Bill
1212
1313 No. 446
1414
1515 Introduced by Senator HurtadoFebruary 18, 2025
1616
1717 Introduced by Senator Hurtado
1818 February 18, 2025
1919
2020 An act to amend Section 1798.82 of the Civil Code, relating to personal information.
2121
2222 LEGISLATIVE COUNSEL'S DIGEST
2323
2424 ## LEGISLATIVE COUNSEL'S DIGEST
2525
26-SB 446, as amended, Hurtado. Data breaches: customer notification.
26+SB 446, as introduced, Hurtado. Data breaches: customer notification.
2727
28-Existing law requires an individual or a business that conducts business in California, and that owns or licenses computerized data that includes personal information, to disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was compromised, as specified, and requires that disclosure to be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as specified, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.This bill would require that data breach disclosure to be made within 30 calendar days of discovery or notification of the data breach but would authorize a an individual or business to delay the disclosure to accommodate the legitimate needs of law enforcement, as specified, or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Existing law also requires an individual or business that is required to issue the security breach notification described above to more than 500 California residents as a result of a single breach of the security system to electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General.This bill would require that submission to the Attorney General to be made within 15 calendar days of discovery or notification of the security breach.
28+Existing law requires an individual or a business that conducts business in California, and that owns or licenses computerized data that includes personal information, to disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was compromised, as specified, and requires that disclosure to be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as specified, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.This bill would require that data breach disclosure to be made within 30 calendar days of discovery or notification of the data breach but would authorize a business to delay the disclosure to accommodate the legitimate needs of law enforcement, as specified, or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system. Existing law also requires an individual or business that is required to issue the security breach notification described above to more than 500 California residents as a result of a single breach of the security system to electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General.This bill would require that submission to the Attorney General to be made within 15 calendar days of discovery or notification of the security breach.
2929
3030 Existing law requires an individual or a business that conducts business in California, and that owns or licenses computerized data that includes personal information, to disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was compromised, as specified, and requires that disclosure to be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as specified, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.
3131
32-This bill would require that data breach disclosure to be made within 30 calendar days of discovery or notification of the data breach but would authorize a an individual or business to delay the disclosure to accommodate the legitimate needs of law enforcement, as specified, or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.
32+This bill would require that data breach disclosure to be made within 30 calendar days of discovery or notification of the data breach but would authorize a business to delay the disclosure to accommodate the legitimate needs of law enforcement, as specified, or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.
3333
3434 Existing law also requires an individual or business that is required to issue the security breach notification described above to more than 500 California residents as a result of a single breach of the security system to electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General.
3535
3636 This bill would require that submission to the Attorney General to be made within 15 calendar days of discovery or notification of the security breach.
3737
3838 ## Digest Key
3939
4040 ## Bill Text
4141
42-The people of the State of California do enact as follows:SECTION 1. Section 1798.82 of the Civil Code is amended to read:1798.82. (a) (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A An individual or business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) An individual or business that maintains computerized data that includes personal information that the individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected individual for not less than 12 months along with all information necessary to take advantage of the offer to any individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the individual or business, the security breach notification may also include any of the following:(A) Information about what the individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the individual or business. Good faith acquisition of personal information by an employee or agent of the individual or business for the purposes of the individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the individual or business, if the individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the individual whose personal information has been breached promptly to change the individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the individual or business and all other online accounts for which the individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the individual or business, the individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the individual or business notifies subject individuals in accordance with its policies in the event of a breach of security of the system.
42+The people of the State of California do enact as follows:SECTION 1. Section 1798.82 of the Civil Code is amended to read:1798.82. (a) A person (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California (1) whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or, (2) or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision (c), or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) A person An individual or business that maintains computerized data that includes personal information that the person individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) A person An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting person individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the person individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected person individual for not less than 12 months along with all information necessary to take advantage of the offer to any person individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the person individual or business, the security breach notification may also include any of the following:(A) Information about what the person individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) A person An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General. General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the person individual or business. Good faith acquisition of personal information by an employee or agent of the person individual or business for the purposes of the person individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the person individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the person individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the person individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the person individual or business, if the person individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the persons individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the person individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the person individual whose personal information has been breached promptly to change the persons individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the person individual or business and all other online accounts for which the person individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the person individual or business, the person individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the person individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a person individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the person individual or business notifies subject persons individuals in accordance with its policies in the event of a breach of security of the system.
4343
4444 The people of the State of California do enact as follows:
4545
4646 ## The people of the State of California do enact as follows:
4747
48-SECTION 1. Section 1798.82 of the Civil Code is amended to read:1798.82. (a) (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A An individual or business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) An individual or business that maintains computerized data that includes personal information that the individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected individual for not less than 12 months along with all information necessary to take advantage of the offer to any individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the individual or business, the security breach notification may also include any of the following:(A) Information about what the individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the individual or business. Good faith acquisition of personal information by an employee or agent of the individual or business for the purposes of the individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the individual or business, if the individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the individual whose personal information has been breached promptly to change the individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the individual or business and all other online accounts for which the individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the individual or business, the individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the individual or business notifies subject individuals in accordance with its policies in the event of a breach of security of the system.
48+SECTION 1. Section 1798.82 of the Civil Code is amended to read:1798.82. (a) A person (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California (1) whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or, (2) or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision (c), or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) A person An individual or business that maintains computerized data that includes personal information that the person individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) A person An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting person individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the person individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected person individual for not less than 12 months along with all information necessary to take advantage of the offer to any person individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the person individual or business, the security breach notification may also include any of the following:(A) Information about what the person individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) A person An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General. General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the person individual or business. Good faith acquisition of personal information by an employee or agent of the person individual or business for the purposes of the person individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the person individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the person individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the person individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the person individual or business, if the person individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the persons individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the person individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the person individual whose personal information has been breached promptly to change the persons individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the person individual or business and all other online accounts for which the person individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the person individual or business, the person individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the person individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a person individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the person individual or business notifies subject persons individuals in accordance with its policies in the event of a breach of security of the system.
4949
5050 SECTION 1. Section 1798.82 of the Civil Code is amended to read:
5151
5252 ### SECTION 1.
5353
54-1798.82. (a) (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A An individual or business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) An individual or business that maintains computerized data that includes personal information that the individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected individual for not less than 12 months along with all information necessary to take advantage of the offer to any individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the individual or business, the security breach notification may also include any of the following:(A) Information about what the individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the individual or business. Good faith acquisition of personal information by an employee or agent of the individual or business for the purposes of the individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the individual or business, if the individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the individual whose personal information has been breached promptly to change the individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the individual or business and all other online accounts for which the individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the individual or business, the individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the individual or business notifies subject individuals in accordance with its policies in the event of a breach of security of the system.
54+1798.82. (a) A person (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California (1) whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or, (2) or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision (c), or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) A person An individual or business that maintains computerized data that includes personal information that the person individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) A person An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting person individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the person individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected person individual for not less than 12 months along with all information necessary to take advantage of the offer to any person individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the person individual or business, the security breach notification may also include any of the following:(A) Information about what the person individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) A person An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General. General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the person individual or business. Good faith acquisition of personal information by an employee or agent of the person individual or business for the purposes of the person individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the person individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the person individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the person individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the person individual or business, if the person individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the persons individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the person individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the person individual whose personal information has been breached promptly to change the persons individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the person individual or business and all other online accounts for which the person individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the person individual or business, the person individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the person individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a person individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the person individual or business notifies subject persons individuals in accordance with its policies in the event of a breach of security of the system.
5555
56-1798.82. (a) (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A An individual or business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) An individual or business that maintains computerized data that includes personal information that the individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected individual for not less than 12 months along with all information necessary to take advantage of the offer to any individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the individual or business, the security breach notification may also include any of the following:(A) Information about what the individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the individual or business. Good faith acquisition of personal information by an employee or agent of the individual or business for the purposes of the individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the individual or business, if the individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the individual whose personal information has been breached promptly to change the individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the individual or business and all other online accounts for which the individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the individual or business, the individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the individual or business notifies subject individuals in accordance with its policies in the event of a breach of security of the system.
56+1798.82. (a) A person (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California (1) whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or, (2) or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision (c), or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) A person An individual or business that maintains computerized data that includes personal information that the person individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) A person An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting person individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the person individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected person individual for not less than 12 months along with all information necessary to take advantage of the offer to any person individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the person individual or business, the security breach notification may also include any of the following:(A) Information about what the person individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) A person An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General. General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the person individual or business. Good faith acquisition of personal information by an employee or agent of the person individual or business for the purposes of the person individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the person individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the person individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the person individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the person individual or business, if the person individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the persons individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the person individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the person individual whose personal information has been breached promptly to change the persons individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the person individual or business and all other online accounts for which the person individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the person individual or business, the person individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the person individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a person individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the person individual or business notifies subject persons individuals in accordance with its policies in the event of a breach of security of the system.
5757
58-1798.82. (a) (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A An individual or business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) An individual or business that maintains computerized data that includes personal information that the individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected individual for not less than 12 months along with all information necessary to take advantage of the offer to any individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the individual or business, the security breach notification may also include any of the following:(A) Information about what the individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the individual or business. Good faith acquisition of personal information by an employee or agent of the individual or business for the purposes of the individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the individual or business, if the individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the individual whose personal information has been breached promptly to change the individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the individual or business and all other online accounts for which the individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the individual or business, the individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the individual or business notifies subject individuals in accordance with its policies in the event of a breach of security of the system.
58+1798.82. (a) A person (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California (1) whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or, (2) or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision (c), or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.(B) A business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.(b) A person An individual or business that maintains computerized data that includes personal information that the person individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.(c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.(d) A person An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:(1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.(A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.(B) The title and headings in the notice shall be clearly and conspicuously displayed.(C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.(D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.[NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]NOTICE OF DATA BREACHWhat Happened? What Information Was Involved?What We Are Doing.What You Can Do. Other Important Information.[insert other important information]For More Information.Call [telephone number] or go to [internet website](E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.(2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:(A) The name and contact information of the reporting person individual or business subject to this section.(B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.(C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.(D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.(E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.(F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.(G) If the person individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected person individual for not less than 12 months along with all information necessary to take advantage of the offer to any person individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).(3) At the discretion of the person individual or business, the security breach notification may also include any of the following:(A) Information about what the person individual or business has done to protect individuals whose information has been breached.(B) Advice on steps that people whose information has been breached may take to protect themselves.(C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.(e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.(f) A person An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General. General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the person individual or business. Good faith acquisition of personal information by an employee or agent of the person individual or business for the purposes of the person individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.(h) For purposes of this section, personal information means either of the following:(1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:(A) Social security number.(B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.(D) Medical information.(E) Health insurance information.(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.(H) Genetic data.(2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.(i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.(2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.(3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.(4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.(5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.(j) For purposes of this section, notice may be provided by one of the following methods:(1) Written notice.(2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.(3) Substitute notice, if the person individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the person individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:(A) Email notice when the person individual or business has an email address for the subject persons.(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the person individual or business, if the person individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the persons individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.(C) Notification to major statewide media.(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the person individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the person individual whose personal information has been breached promptly to change the persons individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the person individual or business and all other online accounts for which the person individual whose personal information has been breached uses the same username or email address and password or security question or answer.(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the person individual or business, the person individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the person individual or business knows the resident customarily accesses the account.(k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.(l) Notwithstanding subdivision (j), a person individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the person individual or business notifies subject persons individuals in accordance with its policies in the event of a breach of security of the system.
5959
6060
6161
62-1798.82. (a) (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable.
62+1798.82. (a) A person (1) An individual or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose a breach of the security of the system following discovery or notification of the breach in the security of the data to a resident of California (1) whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, or, (2) or whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person person, and the person or business that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision (c), or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.
6363
6464 (2) (A) Subject to subparagraph (B), the disclosure required by this subdivision shall be made within 30 calendar days of discovery or notification of the data breach.
6565
66-(B) A An individual or business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.
66+(B) A business may delay the disclosure required by this subdivision to accommodate the legitimate needs of law enforcement, pursuant to subdivision (c), or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.
6767
68-(b) An individual or business that maintains computerized data that includes personal information that the individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.
68+(b) A person An individual or business that maintains computerized data that includes personal information that the person individual or business does not own shall notify the owner or licensee of the information of the breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.
6969
7070 (c) The notification required by this section may be delayed if a law enforcement agency determines that the notification will impede a criminal investigation. The notification required by this section shall be made promptly after the law enforcement agency determines that it will not compromise the investigation.
7171
72-(d) An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:
72+(d) A person An individual or business that is required to issue a security breach notification pursuant to this section shall meet all of the following requirements:
7373
7474 (1) The security breach notification shall be written in plain language, shall be titled Notice of Data Breach, and shall present the information described in paragraph (2) under the following headings: What Happened, What Information Was Involved, What We Are Doing, What You Can Do, and For More Information. Additional information may be provided as a supplement to the notice.
7575
7676 (A) The format of the notice shall be designed to call attention to the nature and significance of the information it contains.
7777
7878 (B) The title and headings in the notice shall be clearly and conspicuously displayed.
7979
8080 (C) The text of the notice and any other notice provided pursuant to this section shall be no smaller than 10-point type.
8181
8282 (D) For a written notice described in paragraph (1) of subdivision (j), use of the model security breach notification form prescribed below or use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.
8383
8484 [NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]
8585 NOTICE OF DATA BREACH
8686 What Happened?
8787 What Information Was Involved?
8888 What We Are Doing.
8989 What You Can Do.
9090 Other Important Information.[insert other important information]
9191 For More Information. Call [telephone number] or go to [internet website]
9292
9393 [NAME OF INSTITUTION / LOGO] _____ _____ Date: [insert date]
9494
9595 NOTICE OF DATA BREACH
9696
9797 What Happened?
9898
9999 What Information Was Involved?
100100
101101 What We Are Doing.
102102
103103 What You Can Do.
104104
105105 Other Important Information.
106106
107107 [insert other important information]
108108
109109 For More Information.
110110
111111 Call [telephone number] or go to [internet website]
112112
113113 (E) For an electronic notice described in paragraph (2) of subdivision (j), use of the headings described in this paragraph with the information described in paragraph (2), written in plain language, shall be deemed to be in compliance with this subdivision.
114114
115115 (2) The security breach notification described in paragraph (1) shall include, at a minimum, the following information:
116116
117-(A) The name and contact information of the reporting individual or business subject to this section.
117+(A) The name and contact information of the reporting person individual or business subject to this section.
118118
119119 (B) A list of the types of personal information that were or are reasonably believed to have been the subject of a breach.
120120
121121 (C) If the information is possible to determine at the time the notice is provided, then any of the following: (i) the date of the breach, (ii) the estimated date of the breach, or (iii) the date range within which the breach occurred. The notification shall also include the date of the notice.
122122
123123 (D) Whether notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided.
124124
125125 (E) A general description of the breach incident, if that information is possible to determine at the time the notice is provided.
126126
127127 (F) The toll-free telephone numbers and addresses of the major credit reporting agencies if the breach exposed a social security number or a drivers license or California identification card number.
128128
129-(G) If the individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected individual for not less than 12 months along with all information necessary to take advantage of the offer to any individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).
129+(G) If the person individual or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, shall be provided at no cost to the affected person individual for not less than 12 months along with all information necessary to take advantage of the offer to any person individual whose information was or may have been breached if the breach exposed or may have exposed personal information defined in subparagraphs (A) and (B) of paragraph (1) of subdivision (h).
130130
131-(3) At the discretion of the individual or business, the security breach notification may also include any of the following:
131+(3) At the discretion of the person individual or business, the security breach notification may also include any of the following:
132132
133-(A) Information about what the individual or business has done to protect individuals whose information has been breached.
133+(A) Information about what the person individual or business has done to protect individuals whose information has been breached.
134134
135135 (B) Advice on steps that people whose information has been breached may take to protect themselves.
136136
137137 (C) In breaches involving biometric data, instructions on how to notify other entities that used the same type of biometric data as an authenticator to no longer rely on data for authentication purposes.
138138
139139 (e) A covered entity under the federal Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. Sec. 1320d et seq.) will be deemed to have complied with the notice requirements in subdivision (d) if it has complied completely with Section 13402(f) of the federal Health Information Technology for Economic and Clinical Health Act (Public Law 111-5). However, nothing in this subdivision shall be construed to exempt a covered entity from any other provision of this section.
140140
141-(f) An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.
141+(f) A person An individual or business that is required to issue a security breach notification pursuant to this section to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General. General within 15 calendar days of discovery or notification of the security breach. A single sample copy of a security breach notification shall not be deemed to be within Article 1 (commencing with Section 7923.600) of Chapter 1 of Part 5 of Division 10 of Title 1 of the Government Code.
142142
143-(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the individual or business. Good faith acquisition of personal information by an employee or agent of the individual or business for the purposes of the individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.
143+(g) For purposes of this section, breach of the security of the system means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the person individual or business. Good faith acquisition of personal information by an employee or agent of the person individual or business for the purposes of the person individual or business is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.
144144
145145 (h) For purposes of this section, personal information means either of the following:
146146
147147 (1) An individuals first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted:
148148
149149 (A) Social security number.
150150
151151 (B) Drivers license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.
152152
153153 (C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account.
154154
155155 (D) Medical information.
156156
157157 (E) Health insurance information.
158158
159159 (F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.
160160
161161 (G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.
162162
163163 (H) Genetic data.
164164
165165 (2) A username or email address, in combination with a password or security question and answer that would permit access to an online account.
166166
167167 (i) (1) For purposes of this section, personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records.
168168
169169 (2) For purposes of this section, medical information means any information regarding an individuals medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.
170170
171171 (3) For purposes of this section, health insurance information means an individuals health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individuals application and claims history, including any appeals records.
172172
173173 (4) For purposes of this section, encrypted means rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.
174174
175175 (5) Genetic data means any data, regardless of its format, that results from the analysis of a biological sample of an individual, or from another source enabling equivalent information to be obtained, and concerns genetic material. Genetic material includes, but is not limited to, deoxyribonucleic acids (DNA), ribonucleic acids (RNA), genes, chromosomes, alleles, genomes, alterations or modifications to DNA or RNA, single nucleotide polymorphisms (SNPs), uninterpreted data that results from analysis of the biological sample or other source, and any information extrapolated, derived, or inferred therefrom.
176176
177177 (j) For purposes of this section, notice may be provided by one of the following methods:
178178
179179 (1) Written notice.
180180
181181 (2) Electronic notice, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in Section 7001 of Title 15 of the United States Code.
182182
183-(3) Substitute notice, if the individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:
183+(3) Substitute notice, if the person individual or business demonstrates that the cost of providing notice would exceed two hundred fifty thousand dollars ($250,000), or that the affected class of subject persons to be notified exceeds 500,000, or the person individual or business does not have sufficient contact information. Substitute notice shall consist of all of the following:
184184
185-(A) Email notice when the individual or business has an email address for the subject persons.
185+(A) Email notice when the person individual or business has an email address for the subject persons.
186186
187-(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the individual or business, if the individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.
187+(B) Conspicuous posting, for a minimum of 30 days, of the notice on the internet website page of the person individual or business, if the person individual or business maintains one. For purposes of this subparagraph, conspicuous posting on the persons individuals or businesss internet website means providing a link to the notice on the home page or first significant page after entering the internet website that is in larger type than the surrounding text, or in contrasting type, font, or color to the surrounding text of the same size, or set off from the surrounding text of the same size by symbols or other marks that call attention to the link.
188188
189189 (C) Notification to major statewide media.
190190
191-(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the individual whose personal information has been breached promptly to change the individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the individual or business and all other online accounts for which the individual whose personal information has been breached uses the same username or email address and password or security question or answer.
191+(4) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for an online account, and no other personal information defined in paragraph (1) of subdivision (h), the person individual or business may comply with this section by providing the security breach notification in electronic or other form that directs the person individual whose personal information has been breached promptly to change the persons individuals password and security question or answer, as applicable, or to take other steps appropriate to protect the online account with the person individual or business and all other online accounts for which the person individual whose personal information has been breached uses the same username or email address and password or security question or answer.
192192
193-(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the individual or business, the individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the individual or business knows the resident customarily accesses the account.
193+(5) In the case of a breach of the security of the system involving personal information defined in paragraph (2) of subdivision (h) for login credentials of an email account furnished by the person individual or business, the person individual or business shall not comply with this section by providing the security breach notification to that email address, but may, instead, comply with this section by providing notice by another method described in this subdivision or by clear and conspicuous notice delivered to the resident online when the resident is connected to the online account from an Internet Protocol address or online location from which the person individual or business knows the resident customarily accesses the account.
194194
195195 (k) For purposes of this section, encryption key and security credential mean the confidential key or process designed to render data usable, readable, and decipherable.
196196
197-(l) Notwithstanding subdivision (j), a individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the individual or business notifies subject individuals in accordance with its policies in the event of a breach of security of the system.
197+(l) Notwithstanding subdivision (j), a person individual or business that maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this part, shall be deemed to be in compliance with the notification requirements of this section if the person individual or business notifies subject persons individuals in accordance with its policies in the event of a breach of security of the system.