CALIFORNIA LEGISLATURE 20252026 REGULAR SESSION Senate Bill No. 468Introduced by Senator BeckerFebruary 19, 2025 An act to add Title 1.81.28 (commencing with Section 1798.91.2) to Part 4 of Division 3 of the Civil Code, relating to artificial intelligence. LEGISLATIVE COUNSEL'S DIGESTSB 468, as introduced, Becker. High-risk artificial intelligence systems: duty to protect personal information.Existing law, the California Consumer Privacy Act of 2018 (CCPA), grants a consumer various rights with respect to personal information that is collected or sold by a business. The CCPA defines various terms for these purposes. The California Privacy Rights Act of 2020 (CPRA), approved by the voters as Proposition 24 at the November 3, 2020, statewide general election, amended, added to, and reenacted the CCPA and establishes the California Privacy Protection Agency (agency) and vests the agency with full administrative power, authority, and jurisdiction to enforce the CCPA. Existing law requires, on or before January 1, 2026, and before each time thereafter that a generative artificial intelligence system or service, as defined, or a substantial modification to a generative artificial intelligence system or service, released on or after January 1, 2022, is made available to Californians for use, regardless of whether the terms of that use include compensation, a developer of the system or service to post on the developers internet website documentation, as specified, regarding the data used to train the generative artificial intelligence system or service. This bill would impose a duty on a covered deployer, defined as a business that deploys a high-risk artificial intelligence system that processes personal information, to protect personal information held by the covered deployer, subject to certain requirements. In this regard, the bill would require a covered deployer whose high-risk artificial intelligence systems process personal information to develop, implement, and maintain a comprehensive information security program, as specified, that contains administrative, technical, and physical safeguards that are appropriate for, among other things, the covered deployers size, scope, and type of business. The bill would require the program described above to meet specified requirements, including, among other things, that the program incorporates safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under applicable state or federal laws and regulations. Existing law, the Unfair Competition Law, establishes a statutory cause of action for unfair competition, including any unlawful, unfair, or fraudulent business act or practice and unfair, deceptive, untrue, or misleading advertising, and establishes remedies and penalties in that regard, including injunctive relief and civil penalties. This bill would specify that a violation of the above-described provisions relating to the duty of a covered deployer to protect information, including the requirement that a covered deployer maintain the comprehensive information security program described above, constitute a deceptive trade act or practice under that law.Existing law, the Administrative Procedure Act, governs the procedure for the adoption, amendment, or repeal of regulations by state agencies and for the review of those regulatory actions by the Office of Administrative Law.This bill would authorize the agency to adopt regulations pursuant to the act to implement these provisions, and would exempt, notwithstanding that provision, any regulations adopted by the agency to establish fees from the act. The bill would define various terms for these purposes.The California Privacy Rights Act of 2020 authorizes the Legislature to amend the act to further the purposes and intent of the act by a majority vote of both houses of the Legislature, as specified.This bill would declare that its provisions further the purposes and intent of the California Privacy Rights Act of 2020. Digest Key Vote: MAJORITY Appropriation: NO Fiscal Committee: YES Local Program: NO Bill TextThe people of the State of California do enact as follows:SECTION 1. Title 1.81.28 (commencing with Section 1798.91.2) is added to Part 4 of Division 3 of the Civil Code, to read:TITLE 1.81.28. High-risk Artificial Intelligence Systems1798.91.2. For purposes of this title, the following definitions shall apply:(a) Artificial intelligence has the same meaning as that term is defined in Section 11546.45.5 of the Government Code.(b) Business has the same meaning as that term is defined in Section 1798.140.(c) Consumer has the same meaning as that term is defined in Section 1798.140.(d) Covered deployer means a business that deploys a high-risk artificial intelligence system that processes personal information.(e) Deploy means to put into effect or commercialize.(f) Deployer means a person doing business in this state that deploys a high-risk artificial intelligence system.(g) High-risk artificial intelligence system has the same meaning as high-risk automated decision system, as that term is defined in Section 11546.45.5 of the Government Code.(h) Personal information has the same meaning as that term is defined in Section 1798.140.(i) Processes or processing have the same meaning as processing, as that term is defined in Section 1798.140.1798.91.3. (a) A covered deployer conducting business in this state shall have a duty to protect personal information held by the covered deployer as provided by this section.(b) A covered deployer whose high-risk artificial intelligence systems process personal information shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate for all of the following:(1) The covered deployers size, scope, and type of business.(2) The amount of resources available to the covered deployer.(3) The amount of data stored by the covered deployer.(4) The need for security and confidentiality of personal information stored by the covered deployer.(c) The comprehensive information security program required by subdivision (a) shall meet all of the following requirements:(1) The program shall incorporate safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under state or federal laws and regulations applicable to the covered deployer.(2) The program shall include the designation of one or more employees of the covered deployer to maintain the program.(3) The program shall require the identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of any electronic, paper, or other record containing personal information, and the establishment of a process for evaluating and improving, as necessary, the effectiveness of the current safeguards for limiting those risks, including by all of the following:(A) Requiring ongoing employee and contractor education and training, including education and training for temporary employees and contractors of the covered deployer, on the proper use of security procedures and protocols and the importance of personal information security.(B) Mandating employee compliance with policies and procedures established under the program.(C) Providing a means for detecting and preventing security system failures.(4) The program shall include security policies for the covered deployers employees relating to the storage, access, and transportation of records containing personal information outside of the covered deployers physical business premises.(5) The program shall provide disciplinary measures for violations of a policy or procedure established under the program.(6) The program shall include measures for preventing a terminated employee from accessing records containing personal information.(7) The program shall provide policies for the supervision of third-party service providers that include both of the following:(A) Taking reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect personal information consistent with applicable law.(B) Requiring third-party service providers by contract to implement and maintain appropriate security measures for personal information.(8) The program shall provide reasonable restrictions on physical access to records containing personal information, including by requiring the records containing the data to be stored in a locked facility, storage area, or container.(9) The program shall include regular monitoring to ensure that the program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personal information and, as necessary, upgrading information safeguards to limit the risk of unauthorized access to or unauthorized use of personal information.(10) The program shall require the regular review of the scope of the programs security measures that must occur subject to both of the following timeframes:(A) At least annually.(B) Whenever there is a material change in the covered deployers business practices that may reasonably affect the security or integrity of records containing personal information.(11) The program shall require the documentation of responsive actions taken in connection with any incident involving a breach of security, including a mandatory postincident review of each event and the actions taken, if any, in response to that event to make changes in business practices relating to protection of personal information.(12) The program shall, to the extent feasible, include all of the following procedures and protocols with respect to computer system security requirements or procedures and protocols providing a higher degree of security, for the protection of personal information:(A) The use of secure user authentication protocols that include all of the following features:(i) The control of user login credentials and other identifiers.(ii) The use of a reasonably secure method of assigning and selecting passwords or using unique identifier technologies, which may include biometrics or token devices.(iii) The control of data security passwords to ensure that the passwords are kept in a location and a format that do not compromise the security of the data the passwords protect.(iv) The restriction of access to only active users and active user accounts.(v) The blocking of access to user credentials or identification after multiple unsuccessful attempts to gain access.(B) The use of secure access control measures that include both of the following:(i) The restriction of access to records and files containing personal information to only employees or contractors who need access to that personal information to perform the job duties of the employees or contractors.(ii) The assignment of a unique identification and a password to each employee or contractor with access to a computer containing personal information, that may not be a vendor-supplied default password, or the use of another protocol reasonably designed to maintain the integrity of the security of the access controls to personal information.(C) The encryption of both of the following:(i) Transmitted records and files containing personal information that will travel across public networks.(ii) Data containing personal information that is transmitted wirelessly.(D) The use of reasonable monitoring of systems for unauthorized use of or access to personal information.(E) The encryption of all personal information stored on laptop computers or other portable devices.(F) For files containing personal information on a system that is connected to the internet, the use of reasonably current firewall protection and operating system security patches that are reasonably designed to maintain the integrity of the personal information.(G) The use of both of the following:(i) A reasonably current version of system security agent software that shall include malware protection and reasonably current patches and virus definitions.(ii) A version of a system security agent software that is supportable with current patches and virus definitions, and is set to receive the most current security updates on a regular basis.(d) A violation of this section by a covered deployer constitutes a deceptive trade act or practice under the Unfair Competition Law (Chapter 5 (commencing with Section 17200) of Part 2 of Division 7 of the Business and Professions Code).1798.91.4. (a) Except as provided in subdivision (b), the California Privacy Protection Agency may adopt regulations pursuant to the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code) to implement and administer this title. (b) Notwithstanding subdivision (a), any regulation adopted by the California Privacy Protection Agency to establish fees authorized by this title shall be exempt from the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code). SEC. 2. The Legislature finds and declares that this act furthers the purposes and intent of the California Privacy Rights Act of 2020 by ensuring consumers rights, including the constitutional right to privacy, are protected by enabling and empowering Californians to request that covered deployers secure their high-risk artificial intelligence systems that process personal information. CALIFORNIA LEGISLATURE 20252026 REGULAR SESSION Senate Bill No. 468Introduced by Senator BeckerFebruary 19, 2025 An act to add Title 1.81.28 (commencing with Section 1798.91.2) to Part 4 of Division 3 of the Civil Code, relating to artificial intelligence. LEGISLATIVE COUNSEL'S DIGESTSB 468, as introduced, Becker. High-risk artificial intelligence systems: duty to protect personal information.Existing law, the California Consumer Privacy Act of 2018 (CCPA), grants a consumer various rights with respect to personal information that is collected or sold by a business. The CCPA defines various terms for these purposes. The California Privacy Rights Act of 2020 (CPRA), approved by the voters as Proposition 24 at the November 3, 2020, statewide general election, amended, added to, and reenacted the CCPA and establishes the California Privacy Protection Agency (agency) and vests the agency with full administrative power, authority, and jurisdiction to enforce the CCPA. Existing law requires, on or before January 1, 2026, and before each time thereafter that a generative artificial intelligence system or service, as defined, or a substantial modification to a generative artificial intelligence system or service, released on or after January 1, 2022, is made available to Californians for use, regardless of whether the terms of that use include compensation, a developer of the system or service to post on the developers internet website documentation, as specified, regarding the data used to train the generative artificial intelligence system or service. This bill would impose a duty on a covered deployer, defined as a business that deploys a high-risk artificial intelligence system that processes personal information, to protect personal information held by the covered deployer, subject to certain requirements. In this regard, the bill would require a covered deployer whose high-risk artificial intelligence systems process personal information to develop, implement, and maintain a comprehensive information security program, as specified, that contains administrative, technical, and physical safeguards that are appropriate for, among other things, the covered deployers size, scope, and type of business. The bill would require the program described above to meet specified requirements, including, among other things, that the program incorporates safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under applicable state or federal laws and regulations. Existing law, the Unfair Competition Law, establishes a statutory cause of action for unfair competition, including any unlawful, unfair, or fraudulent business act or practice and unfair, deceptive, untrue, or misleading advertising, and establishes remedies and penalties in that regard, including injunctive relief and civil penalties. This bill would specify that a violation of the above-described provisions relating to the duty of a covered deployer to protect information, including the requirement that a covered deployer maintain the comprehensive information security program described above, constitute a deceptive trade act or practice under that law.Existing law, the Administrative Procedure Act, governs the procedure for the adoption, amendment, or repeal of regulations by state agencies and for the review of those regulatory actions by the Office of Administrative Law.This bill would authorize the agency to adopt regulations pursuant to the act to implement these provisions, and would exempt, notwithstanding that provision, any regulations adopted by the agency to establish fees from the act. The bill would define various terms for these purposes.The California Privacy Rights Act of 2020 authorizes the Legislature to amend the act to further the purposes and intent of the act by a majority vote of both houses of the Legislature, as specified.This bill would declare that its provisions further the purposes and intent of the California Privacy Rights Act of 2020. Digest Key Vote: MAJORITY Appropriation: NO Fiscal Committee: YES Local Program: NO CALIFORNIA LEGISLATURE 20252026 REGULAR SESSION Senate Bill No. 468 Introduced by Senator BeckerFebruary 19, 2025 Introduced by Senator Becker February 19, 2025 An act to add Title 1.81.28 (commencing with Section 1798.91.2) to Part 4 of Division 3 of the Civil Code, relating to artificial intelligence. LEGISLATIVE COUNSEL'S DIGEST ## LEGISLATIVE COUNSEL'S DIGEST SB 468, as introduced, Becker. High-risk artificial intelligence systems: duty to protect personal information. Existing law, the California Consumer Privacy Act of 2018 (CCPA), grants a consumer various rights with respect to personal information that is collected or sold by a business. The CCPA defines various terms for these purposes. The California Privacy Rights Act of 2020 (CPRA), approved by the voters as Proposition 24 at the November 3, 2020, statewide general election, amended, added to, and reenacted the CCPA and establishes the California Privacy Protection Agency (agency) and vests the agency with full administrative power, authority, and jurisdiction to enforce the CCPA. Existing law requires, on or before January 1, 2026, and before each time thereafter that a generative artificial intelligence system or service, as defined, or a substantial modification to a generative artificial intelligence system or service, released on or after January 1, 2022, is made available to Californians for use, regardless of whether the terms of that use include compensation, a developer of the system or service to post on the developers internet website documentation, as specified, regarding the data used to train the generative artificial intelligence system or service. This bill would impose a duty on a covered deployer, defined as a business that deploys a high-risk artificial intelligence system that processes personal information, to protect personal information held by the covered deployer, subject to certain requirements. In this regard, the bill would require a covered deployer whose high-risk artificial intelligence systems process personal information to develop, implement, and maintain a comprehensive information security program, as specified, that contains administrative, technical, and physical safeguards that are appropriate for, among other things, the covered deployers size, scope, and type of business. The bill would require the program described above to meet specified requirements, including, among other things, that the program incorporates safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under applicable state or federal laws and regulations. Existing law, the Unfair Competition Law, establishes a statutory cause of action for unfair competition, including any unlawful, unfair, or fraudulent business act or practice and unfair, deceptive, untrue, or misleading advertising, and establishes remedies and penalties in that regard, including injunctive relief and civil penalties. This bill would specify that a violation of the above-described provisions relating to the duty of a covered deployer to protect information, including the requirement that a covered deployer maintain the comprehensive information security program described above, constitute a deceptive trade act or practice under that law.Existing law, the Administrative Procedure Act, governs the procedure for the adoption, amendment, or repeal of regulations by state agencies and for the review of those regulatory actions by the Office of Administrative Law.This bill would authorize the agency to adopt regulations pursuant to the act to implement these provisions, and would exempt, notwithstanding that provision, any regulations adopted by the agency to establish fees from the act. The bill would define various terms for these purposes.The California Privacy Rights Act of 2020 authorizes the Legislature to amend the act to further the purposes and intent of the act by a majority vote of both houses of the Legislature, as specified.This bill would declare that its provisions further the purposes and intent of the California Privacy Rights Act of 2020. Existing law, the California Consumer Privacy Act of 2018 (CCPA), grants a consumer various rights with respect to personal information that is collected or sold by a business. The CCPA defines various terms for these purposes. The California Privacy Rights Act of 2020 (CPRA), approved by the voters as Proposition 24 at the November 3, 2020, statewide general election, amended, added to, and reenacted the CCPA and establishes the California Privacy Protection Agency (agency) and vests the agency with full administrative power, authority, and jurisdiction to enforce the CCPA. Existing law requires, on or before January 1, 2026, and before each time thereafter that a generative artificial intelligence system or service, as defined, or a substantial modification to a generative artificial intelligence system or service, released on or after January 1, 2022, is made available to Californians for use, regardless of whether the terms of that use include compensation, a developer of the system or service to post on the developers internet website documentation, as specified, regarding the data used to train the generative artificial intelligence system or service. This bill would impose a duty on a covered deployer, defined as a business that deploys a high-risk artificial intelligence system that processes personal information, to protect personal information held by the covered deployer, subject to certain requirements. In this regard, the bill would require a covered deployer whose high-risk artificial intelligence systems process personal information to develop, implement, and maintain a comprehensive information security program, as specified, that contains administrative, technical, and physical safeguards that are appropriate for, among other things, the covered deployers size, scope, and type of business. The bill would require the program described above to meet specified requirements, including, among other things, that the program incorporates safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under applicable state or federal laws and regulations. Existing law, the Unfair Competition Law, establishes a statutory cause of action for unfair competition, including any unlawful, unfair, or fraudulent business act or practice and unfair, deceptive, untrue, or misleading advertising, and establishes remedies and penalties in that regard, including injunctive relief and civil penalties. This bill would specify that a violation of the above-described provisions relating to the duty of a covered deployer to protect information, including the requirement that a covered deployer maintain the comprehensive information security program described above, constitute a deceptive trade act or practice under that law. Existing law, the Administrative Procedure Act, governs the procedure for the adoption, amendment, or repeal of regulations by state agencies and for the review of those regulatory actions by the Office of Administrative Law. This bill would authorize the agency to adopt regulations pursuant to the act to implement these provisions, and would exempt, notwithstanding that provision, any regulations adopted by the agency to establish fees from the act. The bill would define various terms for these purposes. The California Privacy Rights Act of 2020 authorizes the Legislature to amend the act to further the purposes and intent of the act by a majority vote of both houses of the Legislature, as specified. This bill would declare that its provisions further the purposes and intent of the California Privacy Rights Act of 2020. ## Digest Key ## Bill Text The people of the State of California do enact as follows:SECTION 1. Title 1.81.28 (commencing with Section 1798.91.2) is added to Part 4 of Division 3 of the Civil Code, to read:TITLE 1.81.28. High-risk Artificial Intelligence Systems1798.91.2. For purposes of this title, the following definitions shall apply:(a) Artificial intelligence has the same meaning as that term is defined in Section 11546.45.5 of the Government Code.(b) Business has the same meaning as that term is defined in Section 1798.140.(c) Consumer has the same meaning as that term is defined in Section 1798.140.(d) Covered deployer means a business that deploys a high-risk artificial intelligence system that processes personal information.(e) Deploy means to put into effect or commercialize.(f) Deployer means a person doing business in this state that deploys a high-risk artificial intelligence system.(g) High-risk artificial intelligence system has the same meaning as high-risk automated decision system, as that term is defined in Section 11546.45.5 of the Government Code.(h) Personal information has the same meaning as that term is defined in Section 1798.140.(i) Processes or processing have the same meaning as processing, as that term is defined in Section 1798.140.1798.91.3. (a) A covered deployer conducting business in this state shall have a duty to protect personal information held by the covered deployer as provided by this section.(b) A covered deployer whose high-risk artificial intelligence systems process personal information shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate for all of the following:(1) The covered deployers size, scope, and type of business.(2) The amount of resources available to the covered deployer.(3) The amount of data stored by the covered deployer.(4) The need for security and confidentiality of personal information stored by the covered deployer.(c) The comprehensive information security program required by subdivision (a) shall meet all of the following requirements:(1) The program shall incorporate safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under state or federal laws and regulations applicable to the covered deployer.(2) The program shall include the designation of one or more employees of the covered deployer to maintain the program.(3) The program shall require the identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of any electronic, paper, or other record containing personal information, and the establishment of a process for evaluating and improving, as necessary, the effectiveness of the current safeguards for limiting those risks, including by all of the following:(A) Requiring ongoing employee and contractor education and training, including education and training for temporary employees and contractors of the covered deployer, on the proper use of security procedures and protocols and the importance of personal information security.(B) Mandating employee compliance with policies and procedures established under the program.(C) Providing a means for detecting and preventing security system failures.(4) The program shall include security policies for the covered deployers employees relating to the storage, access, and transportation of records containing personal information outside of the covered deployers physical business premises.(5) The program shall provide disciplinary measures for violations of a policy or procedure established under the program.(6) The program shall include measures for preventing a terminated employee from accessing records containing personal information.(7) The program shall provide policies for the supervision of third-party service providers that include both of the following:(A) Taking reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect personal information consistent with applicable law.(B) Requiring third-party service providers by contract to implement and maintain appropriate security measures for personal information.(8) The program shall provide reasonable restrictions on physical access to records containing personal information, including by requiring the records containing the data to be stored in a locked facility, storage area, or container.(9) The program shall include regular monitoring to ensure that the program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personal information and, as necessary, upgrading information safeguards to limit the risk of unauthorized access to or unauthorized use of personal information.(10) The program shall require the regular review of the scope of the programs security measures that must occur subject to both of the following timeframes:(A) At least annually.(B) Whenever there is a material change in the covered deployers business practices that may reasonably affect the security or integrity of records containing personal information.(11) The program shall require the documentation of responsive actions taken in connection with any incident involving a breach of security, including a mandatory postincident review of each event and the actions taken, if any, in response to that event to make changes in business practices relating to protection of personal information.(12) The program shall, to the extent feasible, include all of the following procedures and protocols with respect to computer system security requirements or procedures and protocols providing a higher degree of security, for the protection of personal information:(A) The use of secure user authentication protocols that include all of the following features:(i) The control of user login credentials and other identifiers.(ii) The use of a reasonably secure method of assigning and selecting passwords or using unique identifier technologies, which may include biometrics or token devices.(iii) The control of data security passwords to ensure that the passwords are kept in a location and a format that do not compromise the security of the data the passwords protect.(iv) The restriction of access to only active users and active user accounts.(v) The blocking of access to user credentials or identification after multiple unsuccessful attempts to gain access.(B) The use of secure access control measures that include both of the following:(i) The restriction of access to records and files containing personal information to only employees or contractors who need access to that personal information to perform the job duties of the employees or contractors.(ii) The assignment of a unique identification and a password to each employee or contractor with access to a computer containing personal information, that may not be a vendor-supplied default password, or the use of another protocol reasonably designed to maintain the integrity of the security of the access controls to personal information.(C) The encryption of both of the following:(i) Transmitted records and files containing personal information that will travel across public networks.(ii) Data containing personal information that is transmitted wirelessly.(D) The use of reasonable monitoring of systems for unauthorized use of or access to personal information.(E) The encryption of all personal information stored on laptop computers or other portable devices.(F) For files containing personal information on a system that is connected to the internet, the use of reasonably current firewall protection and operating system security patches that are reasonably designed to maintain the integrity of the personal information.(G) The use of both of the following:(i) A reasonably current version of system security agent software that shall include malware protection and reasonably current patches and virus definitions.(ii) A version of a system security agent software that is supportable with current patches and virus definitions, and is set to receive the most current security updates on a regular basis.(d) A violation of this section by a covered deployer constitutes a deceptive trade act or practice under the Unfair Competition Law (Chapter 5 (commencing with Section 17200) of Part 2 of Division 7 of the Business and Professions Code).1798.91.4. (a) Except as provided in subdivision (b), the California Privacy Protection Agency may adopt regulations pursuant to the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code) to implement and administer this title. (b) Notwithstanding subdivision (a), any regulation adopted by the California Privacy Protection Agency to establish fees authorized by this title shall be exempt from the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code). SEC. 2. The Legislature finds and declares that this act furthers the purposes and intent of the California Privacy Rights Act of 2020 by ensuring consumers rights, including the constitutional right to privacy, are protected by enabling and empowering Californians to request that covered deployers secure their high-risk artificial intelligence systems that process personal information. The people of the State of California do enact as follows: ## The people of the State of California do enact as follows: SECTION 1. Title 1.81.28 (commencing with Section 1798.91.2) is added to Part 4 of Division 3 of the Civil Code, to read:TITLE 1.81.28. High-risk Artificial Intelligence Systems1798.91.2. For purposes of this title, the following definitions shall apply:(a) Artificial intelligence has the same meaning as that term is defined in Section 11546.45.5 of the Government Code.(b) Business has the same meaning as that term is defined in Section 1798.140.(c) Consumer has the same meaning as that term is defined in Section 1798.140.(d) Covered deployer means a business that deploys a high-risk artificial intelligence system that processes personal information.(e) Deploy means to put into effect or commercialize.(f) Deployer means a person doing business in this state that deploys a high-risk artificial intelligence system.(g) High-risk artificial intelligence system has the same meaning as high-risk automated decision system, as that term is defined in Section 11546.45.5 of the Government Code.(h) Personal information has the same meaning as that term is defined in Section 1798.140.(i) Processes or processing have the same meaning as processing, as that term is defined in Section 1798.140.1798.91.3. (a) A covered deployer conducting business in this state shall have a duty to protect personal information held by the covered deployer as provided by this section.(b) A covered deployer whose high-risk artificial intelligence systems process personal information shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate for all of the following:(1) The covered deployers size, scope, and type of business.(2) The amount of resources available to the covered deployer.(3) The amount of data stored by the covered deployer.(4) The need for security and confidentiality of personal information stored by the covered deployer.(c) The comprehensive information security program required by subdivision (a) shall meet all of the following requirements:(1) The program shall incorporate safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under state or federal laws and regulations applicable to the covered deployer.(2) The program shall include the designation of one or more employees of the covered deployer to maintain the program.(3) The program shall require the identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of any electronic, paper, or other record containing personal information, and the establishment of a process for evaluating and improving, as necessary, the effectiveness of the current safeguards for limiting those risks, including by all of the following:(A) Requiring ongoing employee and contractor education and training, including education and training for temporary employees and contractors of the covered deployer, on the proper use of security procedures and protocols and the importance of personal information security.(B) Mandating employee compliance with policies and procedures established under the program.(C) Providing a means for detecting and preventing security system failures.(4) The program shall include security policies for the covered deployers employees relating to the storage, access, and transportation of records containing personal information outside of the covered deployers physical business premises.(5) The program shall provide disciplinary measures for violations of a policy or procedure established under the program.(6) The program shall include measures for preventing a terminated employee from accessing records containing personal information.(7) The program shall provide policies for the supervision of third-party service providers that include both of the following:(A) Taking reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect personal information consistent with applicable law.(B) Requiring third-party service providers by contract to implement and maintain appropriate security measures for personal information.(8) The program shall provide reasonable restrictions on physical access to records containing personal information, including by requiring the records containing the data to be stored in a locked facility, storage area, or container.(9) The program shall include regular monitoring to ensure that the program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personal information and, as necessary, upgrading information safeguards to limit the risk of unauthorized access to or unauthorized use of personal information.(10) The program shall require the regular review of the scope of the programs security measures that must occur subject to both of the following timeframes:(A) At least annually.(B) Whenever there is a material change in the covered deployers business practices that may reasonably affect the security or integrity of records containing personal information.(11) The program shall require the documentation of responsive actions taken in connection with any incident involving a breach of security, including a mandatory postincident review of each event and the actions taken, if any, in response to that event to make changes in business practices relating to protection of personal information.(12) The program shall, to the extent feasible, include all of the following procedures and protocols with respect to computer system security requirements or procedures and protocols providing a higher degree of security, for the protection of personal information:(A) The use of secure user authentication protocols that include all of the following features:(i) The control of user login credentials and other identifiers.(ii) The use of a reasonably secure method of assigning and selecting passwords or using unique identifier technologies, which may include biometrics or token devices.(iii) The control of data security passwords to ensure that the passwords are kept in a location and a format that do not compromise the security of the data the passwords protect.(iv) The restriction of access to only active users and active user accounts.(v) The blocking of access to user credentials or identification after multiple unsuccessful attempts to gain access.(B) The use of secure access control measures that include both of the following:(i) The restriction of access to records and files containing personal information to only employees or contractors who need access to that personal information to perform the job duties of the employees or contractors.(ii) The assignment of a unique identification and a password to each employee or contractor with access to a computer containing personal information, that may not be a vendor-supplied default password, or the use of another protocol reasonably designed to maintain the integrity of the security of the access controls to personal information.(C) The encryption of both of the following:(i) Transmitted records and files containing personal information that will travel across public networks.(ii) Data containing personal information that is transmitted wirelessly.(D) The use of reasonable monitoring of systems for unauthorized use of or access to personal information.(E) The encryption of all personal information stored on laptop computers or other portable devices.(F) For files containing personal information on a system that is connected to the internet, the use of reasonably current firewall protection and operating system security patches that are reasonably designed to maintain the integrity of the personal information.(G) The use of both of the following:(i) A reasonably current version of system security agent software that shall include malware protection and reasonably current patches and virus definitions.(ii) A version of a system security agent software that is supportable with current patches and virus definitions, and is set to receive the most current security updates on a regular basis.(d) A violation of this section by a covered deployer constitutes a deceptive trade act or practice under the Unfair Competition Law (Chapter 5 (commencing with Section 17200) of Part 2 of Division 7 of the Business and Professions Code).1798.91.4. (a) Except as provided in subdivision (b), the California Privacy Protection Agency may adopt regulations pursuant to the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code) to implement and administer this title. (b) Notwithstanding subdivision (a), any regulation adopted by the California Privacy Protection Agency to establish fees authorized by this title shall be exempt from the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code). SECTION 1. Title 1.81.28 (commencing with Section 1798.91.2) is added to Part 4 of Division 3 of the Civil Code, to read: ### SECTION 1. TITLE 1.81.28. High-risk Artificial Intelligence Systems1798.91.2. For purposes of this title, the following definitions shall apply:(a) Artificial intelligence has the same meaning as that term is defined in Section 11546.45.5 of the Government Code.(b) Business has the same meaning as that term is defined in Section 1798.140.(c) Consumer has the same meaning as that term is defined in Section 1798.140.(d) Covered deployer means a business that deploys a high-risk artificial intelligence system that processes personal information.(e) Deploy means to put into effect or commercialize.(f) Deployer means a person doing business in this state that deploys a high-risk artificial intelligence system.(g) High-risk artificial intelligence system has the same meaning as high-risk automated decision system, as that term is defined in Section 11546.45.5 of the Government Code.(h) Personal information has the same meaning as that term is defined in Section 1798.140.(i) Processes or processing have the same meaning as processing, as that term is defined in Section 1798.140.1798.91.3. (a) A covered deployer conducting business in this state shall have a duty to protect personal information held by the covered deployer as provided by this section.(b) A covered deployer whose high-risk artificial intelligence systems process personal information shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate for all of the following:(1) The covered deployers size, scope, and type of business.(2) The amount of resources available to the covered deployer.(3) The amount of data stored by the covered deployer.(4) The need for security and confidentiality of personal information stored by the covered deployer.(c) The comprehensive information security program required by subdivision (a) shall meet all of the following requirements:(1) The program shall incorporate safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under state or federal laws and regulations applicable to the covered deployer.(2) The program shall include the designation of one or more employees of the covered deployer to maintain the program.(3) The program shall require the identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of any electronic, paper, or other record containing personal information, and the establishment of a process for evaluating and improving, as necessary, the effectiveness of the current safeguards for limiting those risks, including by all of the following:(A) Requiring ongoing employee and contractor education and training, including education and training for temporary employees and contractors of the covered deployer, on the proper use of security procedures and protocols and the importance of personal information security.(B) Mandating employee compliance with policies and procedures established under the program.(C) Providing a means for detecting and preventing security system failures.(4) The program shall include security policies for the covered deployers employees relating to the storage, access, and transportation of records containing personal information outside of the covered deployers physical business premises.(5) The program shall provide disciplinary measures for violations of a policy or procedure established under the program.(6) The program shall include measures for preventing a terminated employee from accessing records containing personal information.(7) The program shall provide policies for the supervision of third-party service providers that include both of the following:(A) Taking reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect personal information consistent with applicable law.(B) Requiring third-party service providers by contract to implement and maintain appropriate security measures for personal information.(8) The program shall provide reasonable restrictions on physical access to records containing personal information, including by requiring the records containing the data to be stored in a locked facility, storage area, or container.(9) The program shall include regular monitoring to ensure that the program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personal information and, as necessary, upgrading information safeguards to limit the risk of unauthorized access to or unauthorized use of personal information.(10) The program shall require the regular review of the scope of the programs security measures that must occur subject to both of the following timeframes:(A) At least annually.(B) Whenever there is a material change in the covered deployers business practices that may reasonably affect the security or integrity of records containing personal information.(11) The program shall require the documentation of responsive actions taken in connection with any incident involving a breach of security, including a mandatory postincident review of each event and the actions taken, if any, in response to that event to make changes in business practices relating to protection of personal information.(12) The program shall, to the extent feasible, include all of the following procedures and protocols with respect to computer system security requirements or procedures and protocols providing a higher degree of security, for the protection of personal information:(A) The use of secure user authentication protocols that include all of the following features:(i) The control of user login credentials and other identifiers.(ii) The use of a reasonably secure method of assigning and selecting passwords or using unique identifier technologies, which may include biometrics or token devices.(iii) The control of data security passwords to ensure that the passwords are kept in a location and a format that do not compromise the security of the data the passwords protect.(iv) The restriction of access to only active users and active user accounts.(v) The blocking of access to user credentials or identification after multiple unsuccessful attempts to gain access.(B) The use of secure access control measures that include both of the following:(i) The restriction of access to records and files containing personal information to only employees or contractors who need access to that personal information to perform the job duties of the employees or contractors.(ii) The assignment of a unique identification and a password to each employee or contractor with access to a computer containing personal information, that may not be a vendor-supplied default password, or the use of another protocol reasonably designed to maintain the integrity of the security of the access controls to personal information.(C) The encryption of both of the following:(i) Transmitted records and files containing personal information that will travel across public networks.(ii) Data containing personal information that is transmitted wirelessly.(D) The use of reasonable monitoring of systems for unauthorized use of or access to personal information.(E) The encryption of all personal information stored on laptop computers or other portable devices.(F) For files containing personal information on a system that is connected to the internet, the use of reasonably current firewall protection and operating system security patches that are reasonably designed to maintain the integrity of the personal information.(G) The use of both of the following:(i) A reasonably current version of system security agent software that shall include malware protection and reasonably current patches and virus definitions.(ii) A version of a system security agent software that is supportable with current patches and virus definitions, and is set to receive the most current security updates on a regular basis.(d) A violation of this section by a covered deployer constitutes a deceptive trade act or practice under the Unfair Competition Law (Chapter 5 (commencing with Section 17200) of Part 2 of Division 7 of the Business and Professions Code).1798.91.4. (a) Except as provided in subdivision (b), the California Privacy Protection Agency may adopt regulations pursuant to the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code) to implement and administer this title. (b) Notwithstanding subdivision (a), any regulation adopted by the California Privacy Protection Agency to establish fees authorized by this title shall be exempt from the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code). TITLE 1.81.28. High-risk Artificial Intelligence Systems1798.91.2. For purposes of this title, the following definitions shall apply:(a) Artificial intelligence has the same meaning as that term is defined in Section 11546.45.5 of the Government Code.(b) Business has the same meaning as that term is defined in Section 1798.140.(c) Consumer has the same meaning as that term is defined in Section 1798.140.(d) Covered deployer means a business that deploys a high-risk artificial intelligence system that processes personal information.(e) Deploy means to put into effect or commercialize.(f) Deployer means a person doing business in this state that deploys a high-risk artificial intelligence system.(g) High-risk artificial intelligence system has the same meaning as high-risk automated decision system, as that term is defined in Section 11546.45.5 of the Government Code.(h) Personal information has the same meaning as that term is defined in Section 1798.140.(i) Processes or processing have the same meaning as processing, as that term is defined in Section 1798.140.1798.91.3. (a) A covered deployer conducting business in this state shall have a duty to protect personal information held by the covered deployer as provided by this section.(b) A covered deployer whose high-risk artificial intelligence systems process personal information shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate for all of the following:(1) The covered deployers size, scope, and type of business.(2) The amount of resources available to the covered deployer.(3) The amount of data stored by the covered deployer.(4) The need for security and confidentiality of personal information stored by the covered deployer.(c) The comprehensive information security program required by subdivision (a) shall meet all of the following requirements:(1) The program shall incorporate safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under state or federal laws and regulations applicable to the covered deployer.(2) The program shall include the designation of one or more employees of the covered deployer to maintain the program.(3) The program shall require the identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of any electronic, paper, or other record containing personal information, and the establishment of a process for evaluating and improving, as necessary, the effectiveness of the current safeguards for limiting those risks, including by all of the following:(A) Requiring ongoing employee and contractor education and training, including education and training for temporary employees and contractors of the covered deployer, on the proper use of security procedures and protocols and the importance of personal information security.(B) Mandating employee compliance with policies and procedures established under the program.(C) Providing a means for detecting and preventing security system failures.(4) The program shall include security policies for the covered deployers employees relating to the storage, access, and transportation of records containing personal information outside of the covered deployers physical business premises.(5) The program shall provide disciplinary measures for violations of a policy or procedure established under the program.(6) The program shall include measures for preventing a terminated employee from accessing records containing personal information.(7) The program shall provide policies for the supervision of third-party service providers that include both of the following:(A) Taking reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect personal information consistent with applicable law.(B) Requiring third-party service providers by contract to implement and maintain appropriate security measures for personal information.(8) The program shall provide reasonable restrictions on physical access to records containing personal information, including by requiring the records containing the data to be stored in a locked facility, storage area, or container.(9) The program shall include regular monitoring to ensure that the program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personal information and, as necessary, upgrading information safeguards to limit the risk of unauthorized access to or unauthorized use of personal information.(10) The program shall require the regular review of the scope of the programs security measures that must occur subject to both of the following timeframes:(A) At least annually.(B) Whenever there is a material change in the covered deployers business practices that may reasonably affect the security or integrity of records containing personal information.(11) The program shall require the documentation of responsive actions taken in connection with any incident involving a breach of security, including a mandatory postincident review of each event and the actions taken, if any, in response to that event to make changes in business practices relating to protection of personal information.(12) The program shall, to the extent feasible, include all of the following procedures and protocols with respect to computer system security requirements or procedures and protocols providing a higher degree of security, for the protection of personal information:(A) The use of secure user authentication protocols that include all of the following features:(i) The control of user login credentials and other identifiers.(ii) The use of a reasonably secure method of assigning and selecting passwords or using unique identifier technologies, which may include biometrics or token devices.(iii) The control of data security passwords to ensure that the passwords are kept in a location and a format that do not compromise the security of the data the passwords protect.(iv) The restriction of access to only active users and active user accounts.(v) The blocking of access to user credentials or identification after multiple unsuccessful attempts to gain access.(B) The use of secure access control measures that include both of the following:(i) The restriction of access to records and files containing personal information to only employees or contractors who need access to that personal information to perform the job duties of the employees or contractors.(ii) The assignment of a unique identification and a password to each employee or contractor with access to a computer containing personal information, that may not be a vendor-supplied default password, or the use of another protocol reasonably designed to maintain the integrity of the security of the access controls to personal information.(C) The encryption of both of the following:(i) Transmitted records and files containing personal information that will travel across public networks.(ii) Data containing personal information that is transmitted wirelessly.(D) The use of reasonable monitoring of systems for unauthorized use of or access to personal information.(E) The encryption of all personal information stored on laptop computers or other portable devices.(F) For files containing personal information on a system that is connected to the internet, the use of reasonably current firewall protection and operating system security patches that are reasonably designed to maintain the integrity of the personal information.(G) The use of both of the following:(i) A reasonably current version of system security agent software that shall include malware protection and reasonably current patches and virus definitions.(ii) A version of a system security agent software that is supportable with current patches and virus definitions, and is set to receive the most current security updates on a regular basis.(d) A violation of this section by a covered deployer constitutes a deceptive trade act or practice under the Unfair Competition Law (Chapter 5 (commencing with Section 17200) of Part 2 of Division 7 of the Business and Professions Code).1798.91.4. (a) Except as provided in subdivision (b), the California Privacy Protection Agency may adopt regulations pursuant to the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code) to implement and administer this title. (b) Notwithstanding subdivision (a), any regulation adopted by the California Privacy Protection Agency to establish fees authorized by this title shall be exempt from the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code). TITLE 1.81.28. High-risk Artificial Intelligence Systems TITLE 1.81.28. High-risk Artificial Intelligence Systems 1798.91.2. For purposes of this title, the following definitions shall apply:(a) Artificial intelligence has the same meaning as that term is defined in Section 11546.45.5 of the Government Code.(b) Business has the same meaning as that term is defined in Section 1798.140.(c) Consumer has the same meaning as that term is defined in Section 1798.140.(d) Covered deployer means a business that deploys a high-risk artificial intelligence system that processes personal information.(e) Deploy means to put into effect or commercialize.(f) Deployer means a person doing business in this state that deploys a high-risk artificial intelligence system.(g) High-risk artificial intelligence system has the same meaning as high-risk automated decision system, as that term is defined in Section 11546.45.5 of the Government Code.(h) Personal information has the same meaning as that term is defined in Section 1798.140.(i) Processes or processing have the same meaning as processing, as that term is defined in Section 1798.140. 1798.91.2. For purposes of this title, the following definitions shall apply: (a) Artificial intelligence has the same meaning as that term is defined in Section 11546.45.5 of the Government Code. (b) Business has the same meaning as that term is defined in Section 1798.140. (c) Consumer has the same meaning as that term is defined in Section 1798.140. (d) Covered deployer means a business that deploys a high-risk artificial intelligence system that processes personal information. (e) Deploy means to put into effect or commercialize. (f) Deployer means a person doing business in this state that deploys a high-risk artificial intelligence system. (g) High-risk artificial intelligence system has the same meaning as high-risk automated decision system, as that term is defined in Section 11546.45.5 of the Government Code. (h) Personal information has the same meaning as that term is defined in Section 1798.140. (i) Processes or processing have the same meaning as processing, as that term is defined in Section 1798.140. 1798.91.3. (a) A covered deployer conducting business in this state shall have a duty to protect personal information held by the covered deployer as provided by this section.(b) A covered deployer whose high-risk artificial intelligence systems process personal information shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate for all of the following:(1) The covered deployers size, scope, and type of business.(2) The amount of resources available to the covered deployer.(3) The amount of data stored by the covered deployer.(4) The need for security and confidentiality of personal information stored by the covered deployer.(c) The comprehensive information security program required by subdivision (a) shall meet all of the following requirements:(1) The program shall incorporate safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under state or federal laws and regulations applicable to the covered deployer.(2) The program shall include the designation of one or more employees of the covered deployer to maintain the program.(3) The program shall require the identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of any electronic, paper, or other record containing personal information, and the establishment of a process for evaluating and improving, as necessary, the effectiveness of the current safeguards for limiting those risks, including by all of the following:(A) Requiring ongoing employee and contractor education and training, including education and training for temporary employees and contractors of the covered deployer, on the proper use of security procedures and protocols and the importance of personal information security.(B) Mandating employee compliance with policies and procedures established under the program.(C) Providing a means for detecting and preventing security system failures.(4) The program shall include security policies for the covered deployers employees relating to the storage, access, and transportation of records containing personal information outside of the covered deployers physical business premises.(5) The program shall provide disciplinary measures for violations of a policy or procedure established under the program.(6) The program shall include measures for preventing a terminated employee from accessing records containing personal information.(7) The program shall provide policies for the supervision of third-party service providers that include both of the following:(A) Taking reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect personal information consistent with applicable law.(B) Requiring third-party service providers by contract to implement and maintain appropriate security measures for personal information.(8) The program shall provide reasonable restrictions on physical access to records containing personal information, including by requiring the records containing the data to be stored in a locked facility, storage area, or container.(9) The program shall include regular monitoring to ensure that the program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personal information and, as necessary, upgrading information safeguards to limit the risk of unauthorized access to or unauthorized use of personal information.(10) The program shall require the regular review of the scope of the programs security measures that must occur subject to both of the following timeframes:(A) At least annually.(B) Whenever there is a material change in the covered deployers business practices that may reasonably affect the security or integrity of records containing personal information.(11) The program shall require the documentation of responsive actions taken in connection with any incident involving a breach of security, including a mandatory postincident review of each event and the actions taken, if any, in response to that event to make changes in business practices relating to protection of personal information.(12) The program shall, to the extent feasible, include all of the following procedures and protocols with respect to computer system security requirements or procedures and protocols providing a higher degree of security, for the protection of personal information:(A) The use of secure user authentication protocols that include all of the following features:(i) The control of user login credentials and other identifiers.(ii) The use of a reasonably secure method of assigning and selecting passwords or using unique identifier technologies, which may include biometrics or token devices.(iii) The control of data security passwords to ensure that the passwords are kept in a location and a format that do not compromise the security of the data the passwords protect.(iv) The restriction of access to only active users and active user accounts.(v) The blocking of access to user credentials or identification after multiple unsuccessful attempts to gain access.(B) The use of secure access control measures that include both of the following:(i) The restriction of access to records and files containing personal information to only employees or contractors who need access to that personal information to perform the job duties of the employees or contractors.(ii) The assignment of a unique identification and a password to each employee or contractor with access to a computer containing personal information, that may not be a vendor-supplied default password, or the use of another protocol reasonably designed to maintain the integrity of the security of the access controls to personal information.(C) The encryption of both of the following:(i) Transmitted records and files containing personal information that will travel across public networks.(ii) Data containing personal information that is transmitted wirelessly.(D) The use of reasonable monitoring of systems for unauthorized use of or access to personal information.(E) The encryption of all personal information stored on laptop computers or other portable devices.(F) For files containing personal information on a system that is connected to the internet, the use of reasonably current firewall protection and operating system security patches that are reasonably designed to maintain the integrity of the personal information.(G) The use of both of the following:(i) A reasonably current version of system security agent software that shall include malware protection and reasonably current patches and virus definitions.(ii) A version of a system security agent software that is supportable with current patches and virus definitions, and is set to receive the most current security updates on a regular basis.(d) A violation of this section by a covered deployer constitutes a deceptive trade act or practice under the Unfair Competition Law (Chapter 5 (commencing with Section 17200) of Part 2 of Division 7 of the Business and Professions Code). 1798.91.3. (a) A covered deployer conducting business in this state shall have a duty to protect personal information held by the covered deployer as provided by this section. (b) A covered deployer whose high-risk artificial intelligence systems process personal information shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate for all of the following: (1) The covered deployers size, scope, and type of business. (2) The amount of resources available to the covered deployer. (3) The amount of data stored by the covered deployer. (4) The need for security and confidentiality of personal information stored by the covered deployer. (c) The comprehensive information security program required by subdivision (a) shall meet all of the following requirements: (1) The program shall incorporate safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under state or federal laws and regulations applicable to the covered deployer. (2) The program shall include the designation of one or more employees of the covered deployer to maintain the program. (3) The program shall require the identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of any electronic, paper, or other record containing personal information, and the establishment of a process for evaluating and improving, as necessary, the effectiveness of the current safeguards for limiting those risks, including by all of the following: (A) Requiring ongoing employee and contractor education and training, including education and training for temporary employees and contractors of the covered deployer, on the proper use of security procedures and protocols and the importance of personal information security. (B) Mandating employee compliance with policies and procedures established under the program. (C) Providing a means for detecting and preventing security system failures. (4) The program shall include security policies for the covered deployers employees relating to the storage, access, and transportation of records containing personal information outside of the covered deployers physical business premises. (5) The program shall provide disciplinary measures for violations of a policy or procedure established under the program. (6) The program shall include measures for preventing a terminated employee from accessing records containing personal information. (7) The program shall provide policies for the supervision of third-party service providers that include both of the following: (A) Taking reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect personal information consistent with applicable law. (B) Requiring third-party service providers by contract to implement and maintain appropriate security measures for personal information. (8) The program shall provide reasonable restrictions on physical access to records containing personal information, including by requiring the records containing the data to be stored in a locked facility, storage area, or container. (9) The program shall include regular monitoring to ensure that the program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personal information and, as necessary, upgrading information safeguards to limit the risk of unauthorized access to or unauthorized use of personal information. (10) The program shall require the regular review of the scope of the programs security measures that must occur subject to both of the following timeframes: (A) At least annually. (B) Whenever there is a material change in the covered deployers business practices that may reasonably affect the security or integrity of records containing personal information. (11) The program shall require the documentation of responsive actions taken in connection with any incident involving a breach of security, including a mandatory postincident review of each event and the actions taken, if any, in response to that event to make changes in business practices relating to protection of personal information. (12) The program shall, to the extent feasible, include all of the following procedures and protocols with respect to computer system security requirements or procedures and protocols providing a higher degree of security, for the protection of personal information: (A) The use of secure user authentication protocols that include all of the following features: (i) The control of user login credentials and other identifiers. (ii) The use of a reasonably secure method of assigning and selecting passwords or using unique identifier technologies, which may include biometrics or token devices. (iii) The control of data security passwords to ensure that the passwords are kept in a location and a format that do not compromise the security of the data the passwords protect. (iv) The restriction of access to only active users and active user accounts. (v) The blocking of access to user credentials or identification after multiple unsuccessful attempts to gain access. (B) The use of secure access control measures that include both of the following: (i) The restriction of access to records and files containing personal information to only employees or contractors who need access to that personal information to perform the job duties of the employees or contractors. (ii) The assignment of a unique identification and a password to each employee or contractor with access to a computer containing personal information, that may not be a vendor-supplied default password, or the use of another protocol reasonably designed to maintain the integrity of the security of the access controls to personal information. (C) The encryption of both of the following: (i) Transmitted records and files containing personal information that will travel across public networks. (ii) Data containing personal information that is transmitted wirelessly. (D) The use of reasonable monitoring of systems for unauthorized use of or access to personal information. (E) The encryption of all personal information stored on laptop computers or other portable devices. (F) For files containing personal information on a system that is connected to the internet, the use of reasonably current firewall protection and operating system security patches that are reasonably designed to maintain the integrity of the personal information. (G) The use of both of the following: (i) A reasonably current version of system security agent software that shall include malware protection and reasonably current patches and virus definitions. (ii) A version of a system security agent software that is supportable with current patches and virus definitions, and is set to receive the most current security updates on a regular basis. (d) A violation of this section by a covered deployer constitutes a deceptive trade act or practice under the Unfair Competition Law (Chapter 5 (commencing with Section 17200) of Part 2 of Division 7 of the Business and Professions Code). 1798.91.4. (a) Except as provided in subdivision (b), the California Privacy Protection Agency may adopt regulations pursuant to the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code) to implement and administer this title. (b) Notwithstanding subdivision (a), any regulation adopted by the California Privacy Protection Agency to establish fees authorized by this title shall be exempt from the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code). 1798.91.4. (a) Except as provided in subdivision (b), the California Privacy Protection Agency may adopt regulations pursuant to the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code) to implement and administer this title. (b) Notwithstanding subdivision (a), any regulation adopted by the California Privacy Protection Agency to establish fees authorized by this title shall be exempt from the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code). SEC. 2. The Legislature finds and declares that this act furthers the purposes and intent of the California Privacy Rights Act of 2020 by ensuring consumers rights, including the constitutional right to privacy, are protected by enabling and empowering Californians to request that covered deployers secure their high-risk artificial intelligence systems that process personal information. SEC. 2. The Legislature finds and declares that this act furthers the purposes and intent of the California Privacy Rights Act of 2020 by ensuring consumers rights, including the constitutional right to privacy, are protected by enabling and empowering Californians to request that covered deployers secure their high-risk artificial intelligence systems that process personal information. SEC. 2. The Legislature finds and declares that this act furthers the purposes and intent of the California Privacy Rights Act of 2020 by ensuring consumers rights, including the constitutional right to privacy, are protected by enabling and empowering Californians to request that covered deployers secure their high-risk artificial intelligence systems that process personal information. ### SEC. 2.