1 of 1 SENATE DOCKET, NO. 2333 FILED ON: 1/17/2025 SENATE . . . . . . . . . . . . . . No. 39 The Commonwealth of Massachusetts _________________ PRESENTED BY: Barry R. Finegold _________________ To the Honorable Senate and House of Representatives of the Commonwealth of Massachusetts in General Court assembled: The undersigned legislators and/or citizens respectfully petition for the adoption of the accompanying bill: An Act protecting sensitive personal information from breaches and other cybersecurity incidents. _______________ PETITION OF: NAME:DISTRICT/ADDRESS :Barry R. FinegoldSecond Essex and Middlesex 1 of 16 SENATE DOCKET, NO. 2333 FILED ON: 1/17/2025 SENATE . . . . . . . . . . . . . . No. 39 By Mr. Finegold, a petition (accompanied by bill, Senate, No. 39) of Barry R. Finegold for legislation to protect sensitive personal information from breaches and other cybersecurity incidents by creating a Massachusetts Cyber Incident Response Team. Advanced Information Technology, the Internet and Cybersecurity. [SIMILAR MATTER FILED IN PREVIOUS SESSION SEE SENATE, NO. 2539 OF 2023-2024.] The Commonwealth of Massachusetts _______________ In the One Hundred and Ninety-Fourth General Court (2025-2026) _______________ An Act protecting sensitive personal information from breaches and other cybersecurity incidents. Whereas, The deferred operation of this act would tend to defeat its purpose, which is to further regulate cybersecurity and breaches of personal information, therefore it is hereby declared to be an emergency law, necessary for the immediate preservation of the public safety. Be it enacted by the Senate and House of Representatives in General Court assembled, and by the authority of the same, as follows: 1 SECTION 1. Chapter 7D of the General Laws is hereby amended by adding the 2following new sections:- 3 Section 12. Definitions 4 As used in this section, and sections 13 and 14, the following words shall have the 5following meanings, unless the context clearly requires otherwise: 2 of 16 6 “Critical infrastructure”, the assets, systems and networks, either physical or virtual, 7within the commonwealth that are so vital to the commonwealth or the United States that the 8incapacitation or destruction of such a system or asset would have a debilitating impact on 9physical security, economic security, public health or safety or any combination thereof; 10provided, however, that “critical infrastructure” shall include, but not be limited to, election 11systems, transportation infrastructure, water, gas and electric utilities and shall include any 12critical infrastructure sectors as identified by: (1) Presidential Policy Directive-21 or a successor 13directive; or (2) the Cybersecurity and Infrastructure Security Agency. 14 “Cybersecurity incident”, an event occurring on or conducted through a computer 15network that actually or imminently jeopardizes the integrity, confidentiality or availability of 16computers, information or communications systems or networks, physical or virtual 17infrastructure controlled by computers or information systems or information resident thereon; 18provided, however, that a cybersecurity incident may include a vulnerability in an information 19system, system security procedures, internal controls or implementation that could be exploited 20by a threat source. 21 “Cybersecurity threat”, any circumstance or event with the potential to adversely impact 22organizational operations, including mission, functions, image or reputation, organizational 23assets or individuals through an information system via unauthorized access, destruction, 24disclosure, modification of information, denial of service or any combination thereof; provided, 25however, that the term “cybersecurity threat” shall also include the potential for a threat source to 26successfully exploit a particular information system vulnerability.. 3 of 16 27 “Governmental entity”, any department of state, county or local government including 28the executive, legislative or judicial, and all councils thereof and thereunder, any division, board, 29bureau, commission, institution, tribunal or other instrumentality within such department or any 30independent state, county or local authority, district, commission, instrumentality or agency. 31 “Response team”, the Massachusetts Cyber Incident Response Team established pursuant 32to section 13. 33 Section 13. Massachusetts Cyber Incident Response Team. 34 (a) There shall be established a Massachusetts Cyber Incident Response Team, which 35shall serve as a standing subcommittee of the office, the mission of which is to enhance the 36commonwealth’s ability to prepare for, respond to, mitigate against and recover from significant 37cybersecurity incidents. 38 (b) The response team shall consist of: the secretary of technology services and security 39or their designee, who shall serve as chair; a representative of the commonwealth security 40operations center as designated by the director of security operations; the secretary of public 41safety and security or their designee; a representative of the state police cyber crime unit; a 42representative of the commonwealth fusion center; the adjutant general of the Massachusetts 43National Guard or their designee; the director of the Massachusetts emergency management 44agency or their designee; the comptroller or their designee; and any other state or local officials 45as assigned by the chair. The chair shall designate a member of the response team to act as a 46liaison with federal agencies. 47 (c) The response team shall review cybersecurity threat information, including intrusion 48methods, common techniques and known vulnerabilities, to make informed recommendations 4 of 16 49and establish appropriate policies to manage the risk of cybersecurity incidents for all 50governmental entities; provided, however, that such recommendations, policies and directives 51shall be informed by information and best practices obtained through the established information 52sharing network of local, state, federal and industry partners in which response team members 53regularly participate. 54 (d) The response team shall develop and maintain an updated cybersecurity incident 55response plan for the commonwealth and submit such plan annually for review, not later than 56November 1, to the governor and the joint committee on advanced information technology, the 57internet and cybersecurity. The response team shall conduct tabletop exercises to test the plan at 58least twice per year and shall conduct individual tabletop exercise testing with a subset of 59governmental entities, as selected by the response team, at least quarterly. Said plan, which shall 60not be a public record pursuant to chapter 66 or clause twenty-sixth of section 7 of chapter 4, 61shall include, but not be limited to: 62 (i) ongoing and anticipated cybersecurity incidents or cybersecurity threats; 63 (ii) a risk analysis identifying the vulnerabilities of critical infrastructure and detailing 64risk-informed recommendations to address such vulnerabilities; 65 (iii) recommendations regarding the deployment of governmental entity resources and 66security professionals in rapidly responding to such cybersecurity incidents or cybersecurity 67threats; 68 (iv) recommendations regarding best practices to minimize the impact of significant 69cybersecurity threats to governmental entities; and 5 of 16 70 (v) guidelines for governmental entities regarding communication with an individual or 71entity that is demanding a payment of ransom related to a cybersecurity incident 72 (e) In the event of a cybersecurity incident that threatens or results in a material 73impairment of the infrastructure or services of a governmental entity or critical infrastructure, the 74secretary of technology services and security shall, with the approval of the governor, serve as 75the director of the response team; provided, however, that the secretary of technology services 76and security may direct the response team to collaborate with other governmental entities, 77including federal entities, that are not members of the response team as appropriate to respond to 78a cybersecurity incident. The provisions of sections 18 through 25, inclusive, of chapter 30A 79shall not apply to meetings, communications, deliberations or other activities of the response 80team conducted in response to a cybersecurity incident under this subsection. 81 (f) Governmental entities shall comply with all protocols and procedures established by 82the response team and all related policies, standards and administrative directives issued by the 83office pursuant to subsection (b) of section 3. The chief information officer or equivalent 84responsible officer for any governmental entity shall, as soon as practicable, report any known 85cybersecurity incident to the commonwealth security operations center, in a form to be 86prescribed by the office. The commonwealth security operations center shall notify the response 87team of all reported security threats or incidents as soon as practicable, but not later than 24 88hours after receiving a report. 89 (g) The commonwealth fusion center and the commonwealth security operations center 90shall routinely exchange information with the response team and the federal cybersecurity and 91infrastructure security agency related to cybersecurity threats and cybersecurity incidents that 6 of 16 92have been reported to or discovered by their respective state agencies or reported to the response 93team. 94 (h) The office and the response team shall consult with the Massachusetts Cyber Center 95and assist said center with efforts to foster cybersecurity resiliency through communications, 96collaboration and outreach to governmental entities, educational institutions and industry 97partners. 98 (i) The secretary of technology services and security shall promulgate regulations or 99directives to carry out the purposes of this section. 100 Section 14. Critical Infrastructure Cyber Incident Reporting Requirements 101 (a) As used in this section, the following words shall have the following meanings unless 102the context clearly requires otherwise: 103 “Covered entity”, any entity that owns or operates critical infrastructure. 104 “Secretary”, the secretary of the executive office of public safety and security. 105 (b) A covered entity shall provide notice, as soon as practicable and without unreasonable 106delay, when such covered entity knows or has reason to know of a cybersecurity incident to the 107commonwealth fusion center in a form to be prescribed by the secretary in consultation with the 108response team; provided, however, that such notice shall include, but not be limited to: 109 (i) a timeline of events as best known by the covered entity and the type of cybersecurity 110incident known or suspected; 111 (ii) how the cybersecurity incident was initially detected or discovered; 7 of 16 112 (iii) a list of the specific assets that have been affected or are suspected to be affected; 113 (iv) copies of any electronic communications that are suspected of being malicious, if 114applicable; 115 (v) copies of any malware, threat actor tool or malicious links suspected of causing the 116cybersecurity incident, if applicable; 117 (vi) any digital logs such as firewall, active directory or event logs, if available; 118 (vii) forensic images of random access memory or virtualized random access memory 119from affected systems, if available; 120 (viii) contact information for the covered entity and any third-party entity engaging in 121cybersecurity incident response that is involved; and 122 (ix) any other information related to the cybersecurity incident as required by the 123secretary. 124 Any notice provided by a covered entity under this subsection shall not be a public record 125pursuant to chapter 66 or clause twenty-sixth of section 7 of chapter 4. 126 (c) Upon receipt of said notice, the representative of the commonwealth fusion center to 127the response team or their designee shall: 128 (i) create and maintain a record of the cybersecurity incident, including all information 129provided by the covered entity in the notice under subsection (b); and 130 (ii) provide a copy of said record to the response team, which shall be included in the 131response team’s annual cyber incident response plan required pursuant to subsection (d) of 8 of 16 132section 13; provided, however, that such copy shall not include any information identifiable to 133the covered entity that is not expressly necessary for the preparation of the response team’s 134report unless the covered entity has provided affirmative consent to share such information. 135 (d) Upon receipt of the notice required by subsection (b), the commonwealth fusion 136center may: 137 (i) coordinate with the response team to identify or communicate recommended response 138measures as appropriate; 139 (ii) assist the covered entity with implementing recommended response measures as 140appropriate, alone or in conjunction with: (A) any agency or entity represented in the response 141team; (B) any local law enforcement agency; (C) private individuals and other entities at the 142discretion of the secretary; or (D) the Massachusetts Cyber Center; and 143 (iii) provide, at the discretion of the secretary, information about other entities that are 144capable of providing mitigation and remediation support following a cybersecurity incident or in 145response to a cybersecurity threat. 146 (e) Nothing in this section shall be construed to: 147 (i) fulfill any regulatory data breach reporting requirements pursuant to chapter 93H; or 148 (ii) absolve any duty under applicable federal law to report a cybersecurity threat or 149cybersecurity incident to the federal cybersecurity and infrastructure security agency. 150 (f) This section shall not apply to a covered entity that reports the cybersecurity incident 151to the federal cybersecurity and infrastructure security agency pursuant to the federal Cyber 152Incident Reporting for Critical Infrastructure Act of 2022 and its implementing regulations. 9 of 16 153 (g) The secretary, in consultation with the secretary of technology services and security, 154shall promulgate regulations for the purposes of carrying out this section. 155 SECTION 2. Section 1 of chapter 93H of the General Laws, as appearing in the 2022 156Official Edition, is hereby amended by inserting after the definition of “Agency” the following 157definition:- 158 “Biometric information”, a retina or iris scan, fingerprint, voiceprint, map or scan of hand 159or face geometry, vein pattern, gait pattern or other data generated from the specific technical 160processing of an individual’s unique biological or physiological patterns or characteristics used 161to authenticate or identify a specific individual; provided, however, that “biometric information” 162shall not include: 163 (i) a digital or physical photograph; 164 (ii) an audio or video recording; or 165 (iii) data generated from a digital or physical photograph, or an audio or video recording, 166unless such data is generated to authenticate or identify a specific individual. 167 SECTION 3. Said section 1 of said chapter 93H, as so appearing, is hereby further 168amended by striking out the definition of “Breach of security” and inserting in place thereof the 169following definition:- 170 “Breach of security”, the unauthorized acquisition or use of unencrypted electronic data, 171or encrypted electronic data when the encryption key or security credential has been acquired; 172provided, however, that such unauthorized acquisition or use compromises the security, 173confidentiality or integrity of personal information maintained by a person or agency; and 10 of 16 174provided further, that a good faith but unauthorized acquisition of personal information by an 175employee or agent of a person or agency for the lawful purposes of such person or agency is not 176a breach of security unless the personal information is used in an unauthorized manner or subject 177to further unauthorized disclosure. 178 SECTION 4. Said section 1 of said chapter 93H, as so appearing, is hereby further 179amended by inserting after the definition of “Encrypted” the following 3 definitions:- 180 “Genetic information”, information, regardless of format, that: 181 (i) results from the analysis of a biological sample of an individual or from another 182source enabling equivalent information to be obtained; and 183 (ii) concerns an individual’s genetic material, including, but not limited to, 184deoxyribonucleic acids, ribonucleic acids, genes, chromosomes, alleles, genomes, alterations or 185modifications to deoxyribonucleic acids or ribonucleic acids, single nucleotide polymorphisms, 186uninterpreted data that results from analysis of the biological sample or other source or any 187information extrapolated, derived or inferred therefrom. 188 "Health insurance information”, an individual’s health insurance policy number, 189subscriber identification number or any identifier used by a health insurer to identify the 190individual. 191 “Medical information”, information regarding an individual’s medical history, mental or 192physical condition or medical treatment or diagnosis by a healthcare professional. 11 of 16 193 SECTION 5. Said section 1 of said chapter 93H, as so appearing, is hereby further 194amended by striking out the definition of “Personal information” and inserting in place thereof 195the following definition:- 196 “Personal information” shall mean: 197 (i) a resident’s first name and last name or first initial and last name in combination with 198any 1 or more of the following data elements that relate to such resident: 199 (A) social security number; 200 (B) taxpayer identification number or identity protection personal identification number 201issued by the Internal Revenue Service; 202 (C) driver’s license number, passport number, military identification number, state-issued 203identification card number or other unique identification number issued by the government that 204is commonly used to verify the identity of a specific individual; 205 (D) financial account number, or credit or debit card number, with or without any 206required security code, access code, personal identification number or password, that would 207permit access to a resident's financial account; 208 (E) biometric information; 209 (F) date of birth; 210 (G) genetic information; 211 (H) health insurance information; 12 of 16 212 (I) medical information; or 213 (J) specific geolocation information; or 214 (ii) a username or electronic mail address, in combination with a password or security 215question and answer, that would permit access to an online account. 216 SECTION 6. Said section 1 of said chapter 93H, as so appearing, is hereby further 217amended by inserting after the definition of “Personal information” the following definition:- 218 “Specific geolocation information”, information derived from technology including, but 219not limited to, global positioning system level latitude and longitude coordinates or other 220mechanisms that directly identify the specific location of an individual within a geographic area 221that is not greater than the area of a circle with a radius of 1,850 feet; provided, however, that 222“specific geolocation information” shall exclude the content of communications or any 223information generated by or connected to advanced utility metering infrastructure systems or 224equipment for use by a utility. 225 SECTION 7. Section 2 of said chapter 93H, as so appearing, is hereby amended by 226adding the following new subsection:- 227 (d) The rules and regulations adopted pursuant to this section shall be updated from time 228to time to reflect any changes to the definitions of “breach of security” or “personal information” 229in section 1. 230 SECTION 8. Section 3 of said chapter 93H, as so appearing, is hereby amended by 231striking out subsection (b) and inserting in place thereof the following subsection:- 13 of 16 232 (b) A person or agency that owns or licenses data that includes personal information 233about a resident of the commonwealth shall provide notice, as soon as practicable and without 234unreasonable delay, when such person or agency: (i) knows or has reason to know of a breach of 235security; or (ii) knows or has reason to know that the personal information of such resident was 236acquired or used by an unauthorized person or used for an unauthorized purpose and such use or 237acquisition presents a reasonably foreseeable risk of financial, physical, reputational or other 238cognizable harm to the resident, the attorney general, the Federal Bureau of Investigation and 239the director of consumer affairs and business regulation, in accordance with this chapter. The 240notice to be provided to the attorney general, Federal Bureau of Investigation and said director, 241and consumer reporting agencies or state agencies if any, shall include, but not be limited to: (i) 242the nature of the breach of security or unauthorized acquisition or use; (ii) the number of 243residents of the commonwealth affected by such incident at the time of notification; (iii) the 244name and address of the person or agency that experienced the breach of security; (iv) the name 245and title of the person or agency reporting the breach of security and their relationship to the 246person or agency that experienced the breach of security; (v) the type of person or agency 247reporting the breach of security; (vi) the person responsible for the breach of security, if known; 248(vii) the type of personal information compromised, including, but not limited to, any of the 249categories of personal information set forth in the definition of “personal information” in section 2501; (viii) whether the person or agency maintains a written information security program; and (ix) 251any steps the person or agency has taken or plans to take relating to the incident, including 252updating such written information security program. A person who experienced a breach of 253security shall file a report with the attorney general and the director of consumer affairs and 254business regulation certifying their credit monitoring services comply with section 3A; provided, 14 of 16 255however, that such a report shall not be required if the personal information compromised by the 256breach of security is medical information or specific geolocation information. 257 Upon receipt of this notice, the director of consumer affairs and business regulation shall 258identify any relevant consumer reporting agency or state agency, as deemed appropriate by said 259director, and forward the names of the identified consumer reporting agencies and state agencies 260to the notifying person or agency. Such person or agency shall, as soon as practicable and 261without unreasonable delay, also provide notice, in accordance with this chapter, to the consumer 262reporting agencies and state agencies so identified. 263 The notice to be provided to the resident shall include, but not be limited to: (i) the date, 264estimated date or estimated date range of the breach of security; (ii) the type of personal 265information compromised, including, but not limited to, any of the categories of personal 266information set forth in subclauses (A) through (J) of clause (i) or in clause (ii) of the definition 267of “personal information” in section 1; (iii) a general description of the breach of security; (iv) 268information that the resident can use to contact the person or agency reporting the breach of 269security; (v) the resident’s right to obtain a police report; (vi) how a resident may request a 270security freeze and the necessary information to be provided when requesting the security freeze; 271(vii) a statement that there shall be no charge for a security freeze; (viii) mitigation services to be 272provided pursuant to this chapter; and (ix) the toll-free number, address and website for the 273federal trade commission; provided, however, that the notice shall not be required to include 274information pursuant to clauses (vi) and (vii) if the personal information compromised by the 275breach of security is medical information or specific geolocation information. 15 of 16 276 The person or agency that experienced the breach of security shall provide a sample copy 277of the notice it sent to consumers to the attorney general and the office of consumer affairs and 278business regulation. A notice provided pursuant to this section shall not be delayed on grounds 279that the total number of residents affected is not yet ascertained. In such case, and where 280otherwise necessary to update or correct the information required, a person or agency shall 281provide additional notice as soon as practicable and without unreasonable delay upon learning 282such additional information. 283 If the breach of security involves log-in credentials pursuant to clause (ii) of the 284definition of “personal information” in section 1 for an online account and no other personal 285information, the person or agency may comply with this chapter by providing notice in electronic 286or other form; provided, however, that such notice shall direct the resident whose personal 287information has been breached to: (i) promptly change the resident’s password and security 288question or answer, as applicable; or (ii) take other steps appropriate to protect the affected 289online account with the person or agency and all other online accounts for which the resident 290whose personal information has been breached uses the same username or electronic mail 291address and password or security question or answer. 292 If the breach of security involves the log-in credentials, pursuant to clause (ii) of the 293definition of “personal information” in section 1, of an electronic mail account furnished by a 294person or agency, the person or agency shall not comply with this chapter by providing notice of 295the breach of security to such electronic mail address but shall instead provide notice by another 296acceptable method of notice pursuant to this chapter or by clear and conspicuous notice delivered 297to the resident online when the resident is connected to the online account from an internet 16 of 16 298protocol address or online location from which the person or agency knows the resident 299customarily accesses the account.