SLS 18RS-605 REENGROSSED 2018 Regular Session SENATE BILL NO. 361 BY SENATOR WALSWORTH ATTORNEY GENERAL. Provides relative to the protection of computerized data that contains personal information and requires notification of data breaches. (8/1/18) 1 AN ACT 2 To amend and reenact R.S. 51:3073(2) and (4)(a) and 3074, relative to the Database Security 3 Breach Notification Law; to provide for the protection of personal information; to 4 require certain security procedures and practices; to provide for notification 5 requirements; to provide relative to violations; to provide for definitions; and to 6 provide for related matters. 7 Be it enacted by the Legislature of Louisiana: 8 Section 1. R.S. 51:3073(2) and (4)(a) and 3074 are hereby amended and reenacted 9 to read as follows: 10 §3073. Definitions 11 As used in this Chapter, the following terms shall have the following 12 meanings: 13 * * * 14 (2) "Breach of the security of the system" means the compromise of the 15 security, confidentiality, or integrity of computerized data that results in, or there is 16 a reasonable basis to conclude has resulted likelihood to result in, the unauthorized 17 acquisition of and access to personal information maintained by an agency or person. Page 1 of 8 Coding: Words which are struck through are deletions from existing law; words in boldface type and underscored are additions. SB NO. 361 SLS 18RS-605 REENGROSSED 1 Good faith acquisition of personal information by an employee or agent of an agency 2 or person for the purposes of the agency or person is not a breach of the security of 3 the system, provided that the personal information is not used for, or is subject to, 4 unauthorized disclosure. 5 * * * 6 (4)(a) "Personal information" means an individual's the first name or first 7 initial and last name of an individual resident of this state in combination with any 8 one or more of the following data elements, when the name or the data element is not 9 encrypted or redacted: 10 (i) Social security number. 11 (ii) Driver's license number or state identification card. 12 (iii) Account number, credit or debit card number, in combination with any 13 required security code, access code, or password that would permit access to an 14 individual's financial account. 15 (iv) Passport number. 16 (v) Biometric data. "Biometric data" means data generated by automatic 17 measurements of an individual's biological characteristics, such as fingerprints, 18 voice print, eye retina or iris, or other unique biological characteristic that is 19 used by the owner or licensee to uniquely authenticate an individual's identity 20 when the individual accesses a system or account. 21 * * * 22 §3074. Disclosure Protection of personal information; disclosure upon breach in 23 the security of personal information; notification requirements; 24 exemption 25 A. Any person that conducts business in the state or that owns or licenses 26 computerized data that includes personal information, or any agency that owns 27 or licenses computerized data that includes personal information, shall 28 implement and maintain reasonable security procedures and practices 29 appropriate to the nature of the information to protect the personal information Page 2 of 8 Coding: Words which are struck through are deletions from existing law; words in boldface type and underscored are additions. SB NO. 361 SLS 18RS-605 REENGROSSED 1 from unauthorized access, destruction, use, modification, or disclosure. 2 B. Any person that conducts business in the state or that owns or licenses 3 computerized data that includes personal information, or any agency that owns 4 or licenses computerized data that includes personal information shall take all 5 reasonable steps to destroy or arrange for the destruction of the records within 6 its custody or control containing personal information that is no longer to be 7 retained by the person or business by shredding, erasing, or otherwise 8 modifying the personal information in the records to make it unreadable or 9 undecipherable through any means. 10 C. Any person that conducts business in the state or that owns or licenses 11 computerized data that includes personal information, or any agency that owns or 12 licenses computerized data that includes personal information, shall, following 13 discovery of a breach in the security of the system containing such data, notify any 14 resident of the state whose personal information was, or is reasonably believed to 15 have been, acquired by an unauthorized person. 16 B.D. Any agency or person that maintains computerized data that includes 17 personal information that the agency or person does not own shall notify the owner 18 or licensee of the information if the personal information was, or is reasonably 19 believed to have been, acquired by an unauthorized person through a breach of 20 security of the system containing such data, following discovery by the agency or 21 person of a breach of security of the system. 22 C.E. The notification required pursuant to Subsections A and B C and D of 23 this Section shall be made in the most expedient time possible and without 24 unreasonable delay but not later than sixty days from the discovery of the 25 breach, consistent with the legitimate needs of law enforcement, as provided in 26 Subsection D F of this Section, or any measures necessary to determine the scope of 27 the breach, prevent further disclosures, and restore the reasonable integrity of the 28 data system. When notification required pursuant to Subsections C and D of this 29 Section is delayed pursuant to Subsection F of this Section or due to a Page 3 of 8 Coding: Words which are struck through are deletions from existing law; words in boldface type and underscored are additions. SB NO. 361 SLS 18RS-605 REENGROSSED 1 determination by the person or agency that measures are necessary to 2 determine the scope of the breach, prevent further disclosures, and restore the 3 reasonable integrity of the data system, the person or agency shall provide the 4 attorney general the reasons for the delay in writing within the sixty day 5 notification period provided in this Subsection. Upon receipt of the written 6 reasons, the attorney general shall allow a reasonable extension of time to 7 provide the notification required in Subsections C and D of this Section. 8 D.F. If a law enforcement agency determines that the notification required 9 under this Section would impede a criminal investigation, such notification may be 10 delayed until such law enforcement agency determines that the notification will no 11 longer compromise such investigation. 12 E.G. Notification may be provided by one of the following methods: 13 (1) Written notification. 14 (2) Electronic notification, if the notification provided is consistent with the 15 provisions regarding electronic records and signatures set forth in 15 USC U.S.C. 16 7001. 17 (3) Substitute notification, if an agency or person demonstrates that the cost 18 of providing notification would exceed two hundred fifty one hundred thousand 19 dollars, or that the affected class of persons to be notified exceeds five one hundred 20 thousand, or the agency or person does not have sufficient contact information. 21 Substitute notification shall consist of all of the following: 22 (a) E-mail notification when the agency or person has an e-mail address for 23 the subject persons. 24 (b) Conspicuous posting of the notification on the Internet site of the agency 25 or person, if an Internet site is maintained. 26 (c) Notification to major statewide media. 27 F.H. Notwithstanding Subsection E G of this Section, an agency or person 28 that maintains a notification procedure as part of its information security policy for 29 the treatment of personal information which is otherwise consistent with the timing Page 4 of 8 Coding: Words which are struck through are deletions from existing law; words in boldface type and underscored are additions. SB NO. 361 SLS 18RS-605 REENGROSSED 1 requirements of this Section shall be deemed considered to be in compliance with 2 the notification requirements of this Section if the agency or person notifies subject 3 persons in accordance with the policy and procedure in the event of a breach of 4 security of the system. 5 G. Notification under this title is not required if after a reasonable 6 investigation the person or business determines that there is no reasonable likelihood 7 of harm to customers. 8 I. Notification as provided in this Section shall not be required if after a 9 reasonable investigation, the person or business determines that there is no 10 reasonable likelihood of harm to the residents of this state. The person or 11 business shall retain a copy of the written determination and supporting 12 documentation for five years from the date of discovery of the breach of the 13 security system. If requested in writing, the person or business shall send a copy 14 of the written determination and supporting documentation to the attorney 15 general no later than thirty days from the date of receipt of the request. The 16 provisions of R.S. 51:1404(A)(1)(c) shall apply to a written determination and 17 supporting documentation sent to the attorney general pursuant to this 18 Subsection. 19 J. A violation of a provision of this Chapter shall constitute an unfair act 20 or practice pursuant to R.S. 51:1405(A). The original instrument was prepared by Curry J. Lann. The following digest, which does not constitute a part of the legislative instrument, was prepared by Linda Nugent. DIGEST SB 361 Reengrossed 2018 Regular Session Walsworth Present law defines "breach of security of the system" as the compromise of the security, confidentiality, or integrity of computerized data that results in, or there is a reasonable basis to conclude has resulted in, the unauthorized acquisition of and access to personal information maintained by an agency or person. Proposed law defines "breach of the security system" as the compromise of the security, confidentiality, or integrity of computerized data that results in, or there is a reasonable likelihood to result in, the unauthorized acquisition of and access to personal information maintained by an agency or person. Page 5 of 8 Coding: Words which are struck through are deletions from existing law; words in boldface type and underscored are additions. SB NO. 361 SLS 18RS-605 REENGROSSED Present law defines "personal information" as an individual's first name or first initial and last name in combination with any one or more of the following data elements, when the name or the data element is not encrypted or redacted: (1) Social security number. (2) Driver's license number. (3)Account number, credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual's financial account. Proposed law defines "personal information" as the first name or first initial and last name of an individual resident of this state in combination with any one or more of the following data elements, when the name or the data element is not encrypted or redacted: (1) Social security number. (2) Driver's license number or state identification card. (3) Account number, credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual's financial account. (4)Passport number. (5)Biometric data. Proposed law defines "biometric data" as data generated by automatic measurements of an individual's biological characteristics, such as fingerprints, voice print, eye retina or iris, or other unique biological characteristic that is used by the owner or licensee to uniquely authenticate an individual's identity when the individual accesses a system or account. Proposed law requires any person that conducts business in the state or that owns or licenses computerized data that includes personal information, or any agency that owns or licenses computerized data that includes personal information, to implement and maintain reasonable security procedures and practices appropriate to the nature of the information to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Proposed law requires any person that conducts business in the state or that owns or licenses computerized data that includes personal information, or any agency that owns or licenses computerized data that includes personal information to take all reasonable steps to destroy or arrange for the destruction of the records within its custody or control containing personal information that is no longer to be retained by the person or business by shredding, erasing, or otherwise modifying the personal information in the records to make it unreadable or undecipherable through any means. Present law requires notification to be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, or any measures necessary to determine the scope of the breach, prevent further disclosures, and restore the reasonable integrity of the data system. Proposed law retains present law and further requires that notification be made within 60 days of the discovery of the breach. Further provides that when notification is delayed the person or agency shall provide the attorney general with the reasons for the delay in writing with the 60 days period to receive an extension of time. Present law provides that notification may be provided by substitute notification if the Page 6 of 8 Coding: Words which are struck through are deletions from existing law; words in boldface type and underscored are additions. SB NO. 361 SLS 18RS-605 REENGROSSED person or agency demonstrates that the cost of notification would exceed $250,000 or that the affected class of persons exceeds 500,000, or the agency or person does not have sufficient contact information. Proposed law provides that notification may be provided by substitute notification if the person or agency demonstrates that the cost of notification would exceed $150,000 or that the affected class of persons exceeds 100,000, or the agency or person does not have sufficient contact information. Proposed law provides that notification shall not be required if after a reasonable investigation, the person or business determines that there is no reasonable likelihood of harm to the residents of this state. Further, the person or business shall retain a copy of the written determination and supporting documentation for five years from the date of discovery of the breach of the security system. Proposed law provides that, if requested in writing, the person or business shall send a copy of the written determination and supporting documentation to the attorney general no later than thirty days from the date of receipt of the request. Present law (R.S. 51:1405(A)) declares unfair methods of competition and unfair or deceptive acts or practices in the conduct of any trade or commerce unlawful. Proposed law retains present law and provides that violations of the Database Security Breach Notification Law constitute an unfair practice under R.S. 51:1405(A). Effective August 1, 2018. (Amends R.S. 51:3073(2) and (4)(a) and 3074) Summary of Amendments Adopted by Senate Committee Amendments Proposed by Senate Committee on Judiciary B to the original bill 1. Makes changes to the definition of "breach of the security of the system". 2. Clarifies that the definition of "personal information" applies to an individual resident of this state. 3. Defines "biometric data". 4. Changes the notification period for a breach from no later than 45 days to no later than 60 days from the discovery of the breach. 5. Requires a person or agency to notify the attorney general in writing if the required notification is delayed. 6. Decreases the cost that allows for substitute notification from the cost of notification would exceed $250,000 to the cost of notification would exceed $100,000. 7. Decreases the amount of persons in the affected class that allows for substitute notification from more than 500,000 to more than 100,000. 8. Adds present law originally deleted that provides notification is not required if there is no reasonable likelihood of harm to residents. Page 7 of 8 Coding: Words which are struck through are deletions from existing law; words in boldface type and underscored are additions. SB NO. 361 SLS 18RS-605 REENGROSSED Senate Floor Amendments to engrossed bill 1. Legislative Bureau technical amendments. Page 8 of 8 Coding: Words which are struck through are deletions from existing law; words in boldface type and underscored are additions.