Louisiana 2018 2018 Regular Session

Louisiana Senate Bill SB361 Engrossed / Bill

                    SLS 18RS-605	ENGROSSED
2018 Regular Session
SENATE BILL NO. 361
BY SENATOR WALSWORTH 
ATTORNEY GENERAL.  Provides relative to the protection of computerized data that
contains personal information and requires notification of data breaches. (8/1/18)
1	AN ACT
2 To amend and reenact R.S. 51:3073(2) and (4)(a) and 3074, relative to the Database Security
3 Breach Notification Law; to provide for the protection of personal information; to
4 require certain security procedures and practices; to provide for notification
5 requirements; to provide relative to violations; to provide for definitions; and to
6 provide for related matters.
7 Be it enacted by the Legislature of Louisiana:
8 Section 1.  R.S. 51:3073(2) and (4)(a) and 3074 are hereby amended and reenacted
9 to read as follows:
10 §3073. Definitions
11	As used in this Chapter, the following terms shall have the following
12 meanings:
13	*          *          *
14	(2) "Breach of the security of the system" means the compromise of the
15 security, confidentiality, or integrity of computerized data that results in, or there is
16 a reasonable basis to conclude has resulted likelihood to result in, the unauthorized
17 acquisition of and access to personal information maintained by an agency or person.
Page 1 of 7
Coding: Words which are struck through are deletions from existing law;
words in boldface type and underscored are additions. SB NO. 361
SLS 18RS-605	ENGROSSED
1 Good faith acquisition of personal information by an employee or agent of an agency
2 or person for the purposes of the agency or person is not a breach of the security of
3 the system, provided that the personal information is not used for, or is subject to,
4 unauthorized disclosure.
5	*          *          *
6	(4)(a) "Personal information" means an individual's the first name or first
7 initial and last name of an individual resident of this state in combination with any
8 one or more of the following data elements, when the name or the data element is not
9 encrypted or redacted:
10	(i) Social security number.
11	(ii) Driver's license number or state identification card.
12	(iii) Account number, credit or debit card number, in combination with any
13 required security code, access code, or password that would permit access to an
14 individual's financial account.
15	(iv) Passport number.
16	(v) Biometric data. "Biometric data" means data generated by automatic
17 measurements of an individual's biological characteristics, such as fingerprints,
18 voice print, eye retina or iris, or other unique biological characteristic that is
19 used by the owner or licensee to uniquely authenticate an individual's identity
20 when the individual accesses a system or account.
21	*          *          *
22 §3074.  Disclosure Protection of personal information; disclosure upon breach in
23	the security of personal information; notification requirements;
24	exemption
25	A. Any person that conducts business in the state or that owns or licenses
26 computerized data that includes personal information, or any agency that owns
27 or licenses computerized data that includes personal information, shall
28 implement and maintain reasonable security procedures and practices
29 appropriate to the nature of the information to protect the personal information
Page 2 of 7
Coding: Words which are struck through are deletions from existing law;
words in boldface type and underscored are additions. SB NO. 361
SLS 18RS-605	ENGROSSED
1 from unauthorized access, destruction, use, modification, or disclosure.
2	B. Any person that conducts business in the state or that owns or licenses
3 computerized data that includes personal information, or any agency that owns
4 or licenses computerized data that includes personal information shall take all
5 reasonable steps to destroy or arrange for the destruction of the records within
6 its custody or control containing personal information that is no longer to be
7 retained by the person or business by shredding, erasing, or otherwise
8 modifying the personal information in the records to make it unreadable or
9 undecipherable through any means.
10	C. Any person that conducts business in the state or that owns or licenses
11 computerized data that includes personal information, or any agency that owns or
12 licenses computerized data that includes personal information, shall, following
13 discovery of a breach in the security of the system containing such data, notify any
14 resident of the state whose personal information was, or is reasonably believed to
15 have been, acquired by an unauthorized person.
16	B.D. Any agency or person that maintains computerized data that includes
17 personal information that the agency or person does not own shall notify the owner
18 or licensee of the information if the personal information was, or is reasonably
19 believed to have been, acquired by an unauthorized person through a breach of
20 security of the system containing such data, following discovery by the agency or
21 person of a breach of security of the system.
22	C.E. The notification required pursuant to Subsections A and B C and D of
23 this Section shall be made in the most expedient time possible and without
24 unreasonable delay but not later than sixty days from the discovery of the
25 breach, consistent with the legitimate needs of law enforcement, as provided in
26 Subsection D F of this Section, or any measures necessary to determine the scope of
27 the breach, prevent further disclosures, and restore the reasonable integrity of the
28 data system. When notification required pursuant to Subsections C and D of this
29 Section is delayed pursuant to Subsection F of this Section or due to a
Page 3 of 7
Coding: Words which are struck through are deletions from existing law;
words in boldface type and underscored are additions. SB NO. 361
SLS 18RS-605	ENGROSSED
1 determination by the person or agency that measures are necessary to
2 determine the scope of the breach, prevent further disclosures, and restore the
3 reasonable integrity of the data system, the person or agency shall provide the
4 attorney general the reasons for the delay in writing within the sixty day
5 notification period provided in this Subsection. Upon receipt of the written
6 reasons, the attorney general shall allow a reasonable extension of time to
7 provide the notification required in Subsections C and D of this Section.
8	D.F.  If a law enforcement agency determines that the notification required
9 under this Section would impede a criminal investigation, such notification may be
10 delayed until such law enforcement agency determines that the notification will no
11 longer compromise such investigation.
12	E.G. Notification may be provided by one of the following methods:
13	(1) Written notification.
14	(2) Electronic notification, if the notification provided is consistent with the
15 provisions regarding electronic records and signatures set forth in 15 USC 7001.
16	(3) Substitute notification, if an agency or person demonstrates that the cost
17 of providing notification would exceed two hundred fifty one hundred thousand
18 dollars, or that the affected class of persons to be notified exceeds five one hundred
19 thousand, or the agency or person does not have sufficient contact information.
20 Substitute notification shall consist of all of the following:
21	(a) E-mail notification when the agency or person has an e-mail address for
22 the subject persons.
23	(b) Conspicuous posting of the notification on the Internet site of the agency
24 or person, if an Internet site is maintained.
25	(c) Notification to major statewide media.
26	F.H. Notwithstanding Subsection E G of this Section, an agency or person
27 that maintains a notification procedure as part of its information security policy for
28 the treatment of personal information which is otherwise consistent with the timing
29 requirements of this Section shall be deemed to be in compliance with the
Page 4 of 7
Coding: Words which are struck through are deletions from existing law;
words in boldface type and underscored are additions. SB NO. 361
SLS 18RS-605	ENGROSSED
1 notification requirements of this Section if the agency or person notifies subject
2 persons in accordance with the policy and procedure in the event of a breach of
3 security of the system.
4	G. Notification under this title is not required if after a reasonable
5 investigation the person or business determines that there is no reasonable likelihood
6 of harm to customers.
7	I. Notification as provided in this Section shall not be required if after a
8 reasonable investigation, the person or business determines that there is no
9 reasonable likelihood of harm to the residents of this state. The person or
10 business shall retain a copy of the written determination and supporting
11 documentation for five years from the date of discovery of the breach of the
12 security system. If requested in writing, the person or business shall send a copy
13 of the written determination and supporting documentation to the attorney
14 general no later than thirty days from the date of receipt of the request. The
15 provisions of R.S. 51:1404(A)(1)(c) shall apply to a written determination and
16 supporting documentation sent to the attorney general pursuant to this
17 Subsection.
18	J. A violation of a provision of this Chapter shall constitute an unfair act
19 or practice pursuant to R.S. 51:1405(A).
The original instrument was prepared by Curry J. Lann. The following digest,
which does not constitute a part of the legislative instrument, was prepared
by Ashley Menou.
DIGEST
SB 361 Engrossed 2018 Regular Session	Walsworth
Present law defines "breach of security of the system" as the compromise of the security,
confidentiality, or integrity of computerized data that results in, or there is a reasonable basis
to conclude has resulted in, the unauthorized acquisition of and access to personal
information maintained by an agency or person.
Proposed law defines "breach of the security system" as the compromise of the security,
confidentiality, or integrity of computerized data that results in, or there is a reasonable
likelihood to result in, the unauthorized acquisition of and access to personal information
maintained by an agency or person.
Present law defines "personal information" as an individual's first name or first initial and
last name in combination with any one or more of the following data elements, when the
Page 5 of 7
Coding: Words which are struck through are deletions from existing law;
words in boldface type and underscored are additions. SB NO. 361
SLS 18RS-605	ENGROSSED
name or the data element is not encrypted or redacted:
(1) Social security number.
(2) Driver's license number.
(3)Account number, credit or debit card number, in combination with any required
security code, access code, or password that would permit access to an individual's
financial account.
Proposed law defines "personal information" as the first name or first initial and last name
of an individual resident of this state in combination with any one or more of the following
data elements, when the name or the data element is not encrypted or redacted:
(1) Social security number.
(2) Driver's license number or state identification card.
(3) Account number, credit or debit card number, in combination with any required
security code, access code, or password that would permit access to an individual's
financial account.
(4)Passport number.
(5)Biometric data.
Proposed law defines "biometric data" as data generated by automatic measurements of an
individual's biological characteristics, such as fingerprints, voice print, eye retina or iris, or
other unique biological characteristic that is used by the owner or licensee to uniquely
authenticate an individual's identity when the individual accesses a system or account.
Proposed law requires any person that conducts business in the state or that owns or licenses
computerized data that includes personal information, or any agency that owns or licenses
computerized data that includes personal information, to implement and maintain reasonable
security procedures and practices appropriate to the nature of the information to protect the
personal information from unauthorized access, destruction, use, modification, or disclosure.
Proposed law requires any person that conducts business in the state or that owns or licenses
computerized data that includes personal information, or any agency that owns or licenses
computerized data that includes personal information to take all reasonable steps to destroy
or arrange for the destruction of the records within its custody or control containing personal
information that is no longer to be retained by the person or business by shredding, erasing,
or otherwise modifying the personal information in the records to make it unreadable or
undecipherable through any means.
Present law requires notification to be made in the most expedient time possible and without
unreasonable delay, consistent with the legitimate needs of law enforcement, or any
measures necessary to determine the scope of the breach, prevent further disclosures, and
restore the reasonable integrity of the data system.
Proposed law retains present law and further requires that notification be made within 60
days of the discovery of the breach. Further provides that when notification is delayed the
person or agency shall provide the attorney general with the reasons for the delay in writing
with the 60 days period to receive an extension of time.
Present law provides that notification may be provided by substitute notification if the
person or agency demonstrates that the cost of notification would exceed $250,000 or that
the affected class of persons exceeds 500,000, or the agency or person does not have
Page 6 of 7
Coding: Words which are struck through are deletions from existing law;
words in boldface type and underscored are additions. SB NO. 361
SLS 18RS-605	ENGROSSED
sufficient contact information.
Proposed law provides that notification may be provided by substitute notification if the
person or agency demonstrates that the cost of notification would exceed $150,000 or that
the affected class of persons exceeds 100,000, or the agency or person does not have
sufficient contact information.
Proposed law provides that notification shall not be required if after a reasonable
investigation, the person or business determines that there is no reasonable likelihood of
harm to the residents of this state. Further, the person or business shall retain a copy of the
written determination and supporting documentation for five years from the date of
discovery of the breach of the security system. 
Proposed law provides that, if requested in writing, the person or business shall send a copy
of the written determination and supporting documentation to the attorney general no later
than thirty days from the date of receipt of the request.
Present law (R.S. 51:1405(A)) declares unfair methods of competition and unfair or
deceptive acts or practices in the conduct of any trade or commerce unlawful.
Proposed law retains present law and provides that violations of the Database Security
Breach Notification Law constitute an unfair practice under R.S. 51:1405(A).
Effective August 1, 2018.
(Amends R.S. 51:3073(2) and (4)(a) and 3074)
Summary of Amendments Adopted by Senate
Committee Amendments Proposed by Senate Committee on Judiciary B to the
original bill
1. Makes changes to the definition of "breach of the security of the system".
2. Clarifies that the definition of "personal information" applies to an individual
resident of this state.
3. Defines "biometric data".
4. Changes the notification period for a breach from no later than 45 days to no
later than 60 days from the discovery of the breach.
5. Requires a person or agency to notify the attorney general in writing if the
required notification is delayed.
6. Decreases the cost that allows for substitute notification from the cost of
notification would exceed $250,000 to the cost of notification would exceed
$100,000.
7. Decreases the amount of persons in the affected class that allows for
substitute notification from more than 500,000 to more than 100,000.
8. Adds present law originally deleted that provides notification is not required
if there is no reasonable likelihood of harm to residents.
Page 7 of 7
Coding: Words which are struck through are deletions from existing law;
words in boldface type and underscored are additions.