Connecticut 2015 Regular Session

Connecticut Senate Bill SB00589 Compare Versions

OldNewDifferences
1-General Assembly Committee Bill No. 589
2-January Session, 2015 LCO No. 5036
3- *05036SB00589GL_*
1+General Assembly Proposed Bill No. 589
2+January Session, 2015 LCO No. 2160
3+ *02160*
44 Referred to Committee on GENERAL LAW
55 Introduced by:
6-(GL)
6+SEN. LOONEY, 11th Dist.
77
88 General Assembly
99
10-Committee Bill No. 589
10+Proposed Bill No. 589
1111
1212 January Session, 2015
1313
14-LCO No. 5036
14+LCO No. 2160
1515
16-*05036SB00589GL_*
16+*02160*
1717
1818 Referred to Committee on GENERAL LAW
1919
2020 Introduced by:
2121
22-(GL)
22+SEN. LOONEY, 11th Dist.
2323
24-AN ACT CONCERNING THE UNAUTHORIZED ACCESS OF CONSUMER DATA.
24+AN ACT REQUIRING COMPANIES TO NOTIFY CONSUMERS OF UNAUTHORIZED ACCESS TO COMPUTER DATA.
2525
2626 Be it enacted by the Senate and House of Representatives in General Assembly convened:
2727
28-Section 1. (NEW) (Effective from passage) (a) As used in this section, (1) "encrypt" means the transformation of electronic data into a form in which meaning cannot be assigned without the use of a confidential process or key, and (2) "personal information" means an individual's first name or first initial and last name in combination with any one or more of the following data: (A) A Social Security number; (B) a driver's license number or a state identification number; (C) a home address; or (D) individually identifiable health information. "Personal information" does not include publicly available information that is lawfully made available to the general public from federal, state or local government records or widely distributed media.
29-
30-(b) Not later than July 1, 2016, each insurer, banking or financial organization, data broker that collects personal information and health care center or other entity licensed to do health insurance business in this state shall implement security technology that encrypts the personal information of consumers, insureds and enrollees that is compiled or maintained by such insurer, banking or financial organization, data broker, health care center or other entity. Any such security technology shall be updated as is necessary and practicable.
31-
32-(c) Not later than seven days after receiving notice of unauthorized access to personal information by a third party, an entity listed in subsection (b) of this section shall notify each person who has had his or her personal information accessed, in writing, of such unauthorized access of his or her personal information.
33-
34-(d) An entity required to notify a person of unauthorized access of his or her personal information pursuant to subsection (c) of this section shall provide such person with not less than two years of commercially available identity theft monitoring and protection at no charge to the person.
35-
36-(e) The Insurance Commissioner, after consulting with the Commissioner of Consumer Protection, shall adopt regulations, in accordance with the provisions of chapter 54 of the general statutes, to implement the provisions of this section and to establish minimum standards for security technology required to be implemented pursuant to subsection (b) of this section.
37-
38-
39-
40-
41-This act shall take effect as follows and shall amend the following sections:
42-Section 1 from passage New section
43-
44-This act shall take effect as follows and shall amend the following sections:
45-
46-Section 1
47-
48-from passage
49-
50-New section
28+That the general statutes be amended to require a company to notify consumers when unauthorized access to data in the company's computer system has occurred.
5129
5230 Statement of Purpose:
5331
54-To require insurance companies, banks and other entities to implement security technology that encrypts the personal information of consumers that is compiled or maintained by such insurance companies, banks and entities, to require the Insurance Commissioner to adopt regulations, after consulting with the Commissioner of Consumer Protection, to establish minimum standards for such security technology and to require written notification and identity theft monitoring and protection relating to unauthorized access of personal information.
55-
56-[Proposed deletions are enclosed in brackets. Proposed additions are indicated by underline, except that when the entire text of a bill or resolution or a section of a bill or resolution is new, it is not underlined.]
57-
58-
59-
60-Co-Sponsors: SEN. LOONEY, 11th Dist.
61-
62-Co-Sponsors:
63-
64-SEN. LOONEY, 11th Dist.
65-
66-S.B. 589
32+To give notice to consumers of potentially harmful unauthorized access of computer data.