Massachusetts 2025 2025-2026 Regular Session

Massachusetts Senate Bill S39 Introduced / Bill

Filed 02/27/2025

                    1 of 1
SENATE DOCKET, NO. 2333       FILED ON: 1/17/2025
SENATE . . . . . . . . . . . . . . No. 39
The Commonwealth of Massachusetts
_________________
PRESENTED BY:
Barry R. Finegold
_________________
To the Honorable Senate and House of Representatives of the Commonwealth of Massachusetts in General
Court assembled:
The undersigned legislators and/or citizens respectfully petition for the adoption of the accompanying bill:
An Act protecting sensitive personal information from breaches and other cybersecurity 
incidents.
_______________
PETITION OF:
NAME:DISTRICT/ADDRESS :Barry R. FinegoldSecond Essex and Middlesex 1 of 16
SENATE DOCKET, NO. 2333       FILED ON: 1/17/2025
SENATE . . . . . . . . . . . . . . No. 39
By Mr. Finegold, a petition (accompanied by bill, Senate, No. 39) of Barry R. Finegold for 
legislation to protect sensitive personal information from breaches and other cybersecurity 
incidents by creating a Massachusetts Cyber Incident Response Team. Advanced Information 
Technology, the Internet and Cybersecurity.
[SIMILAR MATTER FILED IN PREVIOUS SESSION
SEE SENATE, NO. 2539 OF 2023-2024.]
The Commonwealth of Massachusetts
_______________
In the One Hundred and Ninety-Fourth General Court
(2025-2026)
_______________
An Act protecting sensitive personal information from breaches and other cybersecurity 
incidents.
Whereas, The deferred operation of this act would tend to defeat its purpose, which is to 
further regulate cybersecurity and breaches of personal information, therefore it is hereby 
declared to be an emergency law, necessary for the immediate preservation of the public safety.
Be it enacted by the Senate and House of Representatives in General Court assembled, and by the authority 
of the same, as follows:
1 SECTION 1. Chapter 7D of the General Laws is hereby amended by adding the 
2following new sections:-
3 Section 12. Definitions
4 As used in this section, and sections 13 and 14, the following words shall have the 
5following meanings, unless the context clearly requires otherwise: 2 of 16
6 “Critical infrastructure”, the assets, systems and networks, either physical or virtual, 
7within the commonwealth that are so vital to the commonwealth or the United States that the 
8incapacitation or destruction of such a system or asset would have a debilitating impact on 
9physical security, economic security, public health or safety or any combination thereof; 
10provided, however, that “critical infrastructure” shall include, but not be limited to, election 
11systems, transportation infrastructure, water, gas and electric utilities and shall include any 
12critical infrastructure sectors as identified by: (1) Presidential Policy Directive-21 or a successor 
13directive; or (2) the Cybersecurity and Infrastructure Security Agency.
14 “Cybersecurity incident”, an event occurring on or conducted through a computer 
15network that actually or imminently jeopardizes the integrity, confidentiality or availability of 
16computers, information or communications systems or networks, physical or virtual 
17infrastructure controlled by computers or information systems or information resident thereon; 
18provided, however, that a cybersecurity incident may include a vulnerability in an information 
19system, system security procedures, internal controls or implementation that could be exploited 
20by a threat source.
21 “Cybersecurity threat”, any circumstance or event with the potential to adversely impact 
22organizational operations, including mission, functions, image or reputation, organizational 
23assets or individuals through an information system via unauthorized access, destruction, 
24disclosure, modification of information, denial of service or any combination thereof; provided, 
25however, that the term “cybersecurity threat” shall also include the potential for a threat source to 
26successfully exploit a particular information system vulnerability.. 3 of 16
27 “Governmental entity”, any department of state, county or local government including 
28the executive, legislative or judicial, and all councils thereof and thereunder, any division, board, 
29bureau, commission, institution, tribunal or other instrumentality within such department or any 
30independent state, county or local authority, district, commission, instrumentality or agency.
31 “Response team”, the Massachusetts Cyber Incident Response Team established pursuant 
32to section 13.
33 Section 13. Massachusetts Cyber Incident Response Team.
34 (a) There shall be established a Massachusetts Cyber Incident Response Team, which 
35shall serve as a standing subcommittee of the office, the mission of which is to enhance the 
36commonwealth’s ability to prepare for, respond to, mitigate against and recover from significant 
37cybersecurity incidents.
38 (b) The response team shall consist of: the secretary of technology services and security 
39or their designee, who shall serve as chair; a representative of the commonwealth security 
40operations center as designated by the director of security operations; the secretary of public 
41safety and security or their designee; a representative of the state police cyber crime unit; a 
42representative of the commonwealth fusion center; the adjutant general of the Massachusetts 
43National Guard or their designee; the director of the Massachusetts emergency management 
44agency or their designee; the comptroller or their designee; and any other state or local officials 
45as assigned by the chair. The chair shall designate a member of the response team to act as a 
46liaison with federal agencies.
47 (c) The response team shall review cybersecurity threat information, including intrusion 
48methods, common techniques and known vulnerabilities, to make informed recommendations  4 of 16
49and establish appropriate policies to manage the risk of cybersecurity incidents for all 
50governmental entities; provided, however, that such recommendations, policies and directives 
51shall be informed by information and best practices obtained through the established information 
52sharing network of local, state, federal and industry partners in which response team members 
53regularly participate.
54 (d) The response team shall develop and maintain an updated cybersecurity incident 
55response plan for the commonwealth and submit such plan annually for review, not later than 
56November 1, to the governor and the joint committee on advanced information technology, the 
57internet and cybersecurity. The response team shall conduct tabletop exercises to test the plan at 
58least twice per year and shall conduct individual tabletop exercise testing with a subset of 
59governmental entities, as selected by the response team, at least quarterly. Said plan, which shall 
60not be a public record pursuant to chapter 66 or clause twenty-sixth of section 7 of chapter 4, 
61shall include, but not be limited to:
62 (i) ongoing and anticipated cybersecurity incidents or cybersecurity threats;
63 (ii) a risk analysis identifying the vulnerabilities of critical infrastructure and detailing 
64risk-informed recommendations to address such vulnerabilities;
65 (iii) recommendations regarding the deployment of governmental entity resources and 
66security professionals in rapidly responding to such cybersecurity incidents or cybersecurity 
67threats;
68 (iv) recommendations regarding best practices to minimize the impact of significant 
69cybersecurity threats to governmental entities; and 5 of 16
70 (v) guidelines for governmental entities regarding communication with an individual or 
71entity that is demanding a payment of ransom related to a cybersecurity incident
72 (e) In the event of a cybersecurity incident that threatens or results in a material 
73impairment of the infrastructure or services of a governmental entity or critical infrastructure, the 
74secretary of technology services and security shall, with the approval of the governor, serve as 
75the director of the response team; provided, however, that the secretary of technology services 
76and security may direct the response team to collaborate with other governmental entities, 
77including federal entities, that are not members of the response team as appropriate to respond to 
78a cybersecurity incident. The provisions of sections 18 through 25, inclusive, of chapter 30A 
79shall not apply to meetings, communications, deliberations or other activities of the response 
80team conducted in response to a cybersecurity incident under this subsection.
81 (f) Governmental entities shall comply with all protocols and procedures established by 
82the response team and all related policies, standards and administrative directives issued by the 
83office pursuant to subsection (b) of section 3. The chief information officer or equivalent 
84responsible officer for any governmental entity shall, as soon as practicable, report any known 
85cybersecurity incident to the commonwealth security operations center, in a form to be 
86prescribed by the office. The commonwealth security operations center shall notify the response 
87team of all reported security threats or incidents as soon as practicable, but not later than 24 
88hours after receiving a report.
89 (g) The commonwealth fusion center and the commonwealth security operations center 
90shall routinely exchange information with the response team and the federal cybersecurity and 
91infrastructure security agency related to cybersecurity threats and cybersecurity incidents that  6 of 16
92have been reported to or discovered by their respective state agencies or reported to the response 
93team.
94 (h) The office and the response team shall consult with the Massachusetts Cyber Center 
95and assist said center with 	efforts to foster cybersecurity resiliency through communications, 
96collaboration and outreach to governmental entities, educational institutions and industry 
97partners.
98 (i) The secretary of technology services and security shall promulgate regulations or 
99directives to carry out the purposes of this section.
100 Section 14. Critical Infrastructure Cyber Incident Reporting Requirements
101 (a) As used in this section, the following words shall have the following meanings unless 
102the context clearly requires otherwise:
103 “Covered entity”, any entity that owns or operates critical infrastructure.
104 “Secretary”, the secretary of the executive office of public safety and security.
105 (b) A covered entity shall provide notice, as soon as practicable and without unreasonable 
106delay, when such covered entity knows or has reason to know of a cybersecurity incident to the 
107commonwealth fusion center in a form to be prescribed by the secretary in consultation with the 
108response team; provided, however, that such notice shall include, but not be limited to:
109 (i) a timeline of events as best known by the covered entity and the type of cybersecurity 
110incident known or suspected;
111 (ii) how the cybersecurity incident was initially detected or discovered; 7 of 16
112 (iii) a list of the specific assets that have been affected or are suspected to be affected;
113 (iv) copies of any electronic communications that are suspected of being malicious, if 
114applicable;
115 (v) copies of any malware, threat actor tool or malicious links suspected of causing the 
116cybersecurity incident, if applicable;
117 (vi) any digital logs such as firewall, active directory or event logs, if available;
118 (vii) forensic images of random access memory or virtualized random access memory 
119from affected systems, if available;
120 (viii) contact information for the covered entity and any third-party entity engaging in 
121cybersecurity incident response that is involved; and
122 (ix) any other information related to the cybersecurity incident as required by the 
123secretary.
124 Any notice provided by a covered entity under this subsection shall not be a public record 
125pursuant to chapter 66 or clause twenty-sixth of section 7 of chapter 4.
126 (c) Upon receipt of said notice, the representative of the commonwealth fusion center to 
127the response team or their designee shall:
128 (i) create and maintain a record of the cybersecurity incident, including all information 
129provided by the covered entity in the notice under subsection (b); and
130 (ii) provide a copy of said record to the response team, which shall be included in the 
131response team’s annual cyber incident response plan required pursuant to subsection (d) of  8 of 16
132section 13; provided, however, that such copy shall not include any information identifiable to 
133the covered entity that is not expressly necessary for the preparation of the response team’s 
134report unless the covered entity has provided affirmative consent to share such information.
135 (d) Upon receipt of the notice required by subsection (b), the commonwealth fusion 
136center may:
137 (i) coordinate with 	the response team to identify or communicate recommended response 
138measures as appropriate;
139 (ii) assist the covered entity with implementing recommended response measures as 
140appropriate, alone or in conjunction with: (A) any agency or entity represented in the response 
141team; (B) any local law enforcement agency; (C) private individuals and other entities at the 
142discretion of the secretary; or (D) the Massachusetts Cyber Center; and
143 (iii) provide, at the discretion of the secretary, information about other entities that are 
144capable of providing mitigation and remediation support following a cybersecurity incident or in 
145response to a cybersecurity threat.
146 (e) Nothing in this section shall be construed to:
147 (i) fulfill any regulatory data breach reporting requirements pursuant to chapter 93H; or
148 (ii) absolve any duty under applicable federal law to report a cybersecurity threat or 
149cybersecurity incident to the federal cybersecurity and infrastructure security agency.
150 (f) This section shall not apply to a covered entity that reports the cybersecurity incident 
151to the federal cybersecurity and infrastructure security agency pursuant to the federal Cyber 
152Incident Reporting for Critical Infrastructure Act of 2022 and its implementing regulations. 9 of 16
153 (g) The secretary, in consultation with the secretary of technology services and security, 
154shall promulgate regulations for the purposes of carrying out this section.
155 SECTION 2. Section 1 of chapter 93H of the General Laws, as appearing in the 2022 
156Official Edition, is hereby amended by inserting after the definition of “Agency” the following 
157definition:-
158 “Biometric information”, a retina or iris scan, fingerprint, voiceprint, map or scan of hand 
159or face geometry, vein pattern, gait pattern or other data generated from the specific technical 
160processing of an individual’s unique biological or physiological patterns or characteristics used 
161to authenticate or identify a specific individual; provided, however, that “biometric information” 
162shall not include:
163 (i) a digital or physical photograph;
164 (ii) an audio or video recording; or
165 (iii) data generated from a digital or physical photograph, or an audio or video recording, 
166unless such data is generated to authenticate or identify a specific individual.
167 SECTION 3. Said section 1 of said chapter 93H, as so appearing, is hereby further 
168amended by striking out the definition of “Breach of security” and inserting in place thereof the 
169following definition:-
170 “Breach of security”, the unauthorized acquisition or use of unencrypted electronic data, 
171or encrypted electronic data when the encryption key or security credential has been acquired; 
172provided, however, that such unauthorized acquisition or use compromises the security, 
173confidentiality or integrity of personal information maintained by a person or agency; and  10 of 16
174provided further, that a good faith but unauthorized acquisition of personal information by an 
175employee or agent of a person or agency for the lawful purposes of such person or agency is not 
176a breach of security unless the personal information is used in an unauthorized manner or subject 
177to further unauthorized disclosure.
178 SECTION 4. Said section 1 of said chapter 93H, as so appearing, is hereby further 
179amended by inserting after the definition of “Encrypted” the following 3 definitions:-
180 “Genetic information”, information, regardless of format, that:
181 (i) results from the analysis of a biological sample of an individual or from another 
182source enabling equivalent information to be obtained; and
183 (ii) concerns an individual’s genetic material, 	including, but not limited to, 
184deoxyribonucleic acids, ribonucleic acids, genes, chromosomes, alleles, genomes, alterations or 
185modifications to deoxyribonucleic acids or ribonucleic acids, single nucleotide polymorphisms, 
186uninterpreted data that results from analysis of the biological sample or other source or any 
187information extrapolated, derived or inferred therefrom.
188 "Health insurance information”, an individual’s health insurance policy number, 
189subscriber identification number or any identifier used by a health insurer to identify the 
190individual.
191 “Medical information”, information regarding an individual’s medical history, mental or 
192physical condition or medical treatment or diagnosis by a healthcare professional. 11 of 16
193 SECTION 5. Said section 1 of said chapter 93H, as so appearing, is hereby further 
194amended by striking out the definition of “Personal information” and inserting in place thereof 
195the following definition:-
196 “Personal information” shall mean:
197 (i) a resident’s first name and last name or first initial and last name in combination with 
198any 1 or more of the following data elements that relate to such resident:            
199 (A) social security number;
200 (B) taxpayer identification number or identity 	protection personal identification number 
201issued by the Internal Revenue Service;
202 (C) driver’s license number, passport number, military identification number, state-issued 
203identification card number or other unique identification number issued by the government that 
204is commonly used to verify the identity of a specific individual;
205 (D) financial account number, or credit or debit card number, with or without any 
206required security code, access code, personal identification number or password, that would 
207permit access to a resident's financial account;
208 (E) biometric information;
209 (F) date of birth;
210 (G) genetic information;
211 (H) health insurance information; 12 of 16
212 (I) medical information; or
213 (J) specific geolocation information; or
214 (ii) a username or electronic mail address, in combination with a password or security 
215question and answer, that would permit access to an online account.
216 SECTION 6. Said section 1 of said chapter 93H, as so appearing, is hereby further 
217amended by inserting after the definition of “Personal information” the following definition:-
218 “Specific geolocation information”, information derived from technology including, but 
219not limited to, global positioning system level latitude and longitude coordinates or other 
220mechanisms that directly identify the specific location of an individual within a geographic area 
221that is not greater than the area of a circle with a radius of 1,850 feet; provided, however, that 
222“specific geolocation information” shall exclude the content of communications or any 
223information generated by or connected to advanced utility metering infrastructure systems or 
224equipment for use by a utility.
225 SECTION 7. Section 2 of said chapter 93H, as so appearing, is hereby amended by 
226adding the following new subsection:-
227 (d) The rules and regulations adopted pursuant to this section shall be updated from time 
228to time to reflect any changes to the definitions of “breach of security” or “personal information” 
229in section 1.
230 SECTION 8. Section 3 of said chapter 93H, as so appearing, is hereby amended by 
231striking out subsection (b) 	and inserting in place thereof the following subsection:- 13 of 16
232 (b) A person or agency that owns or licenses data that includes personal information 
233about a resident of the commonwealth shall provide notice, as soon as practicable and without 
234unreasonable delay, when such person or agency: (i) knows or has reason to know of a breach of 
235security; or (ii) knows or has reason to know that the personal information of such resident was 
236acquired or used by an unauthorized person or used for an unauthorized purpose and such use or 
237acquisition presents a reasonably foreseeable risk of financial, physical, reputational or other 
238cognizable harm to the resident, the attorney general, the Federal Bureau of Investigation and 
239the director of consumer affairs and business regulation, in accordance with this chapter. The 
240notice to be provided to the attorney general, Federal Bureau of Investigation and said director, 
241and consumer reporting agencies or state agencies if any, shall include, but not be limited to: (i) 
242the nature of the breach of security or unauthorized acquisition or use; (ii) the number of 
243residents of the commonwealth affected by such incident at the time of notification; (iii) the 
244name and address of the person or agency that experienced the breach of security; (iv) the name 
245and title of the person or agency reporting the breach of security and their relationship to the 
246person or agency that experienced the breach of security; (v) the type of person or agency 
247reporting the breach of security; (vi) the person responsible for the breach of security, if known; 
248(vii) the type of personal information compromised, including, but not limited to, any of the 
249categories of personal information set forth in the definition of “personal information” in section 
2501; (viii) whether the person or agency maintains a written information security program; and (ix) 
251any steps the person or agency has taken or plans to take relating to the incident, including 
252updating such written information security program. A person who experienced a breach of 
253security shall file a report with the attorney general and the director of consumer affairs and 
254business regulation certifying their credit monitoring services comply with section 3A; provided,  14 of 16
255however, that such a report shall not be required if the personal information compromised by the 
256breach of security is medical information or specific geolocation information.
257 Upon receipt of this notice, the director of consumer affairs and business regulation shall 
258identify any relevant consumer reporting agency or state agency, as deemed appropriate by said 
259director, and forward the names of the identified consumer reporting agencies and state agencies 
260to the notifying person or agency. Such person or agency shall, as soon as practicable and 
261without unreasonable delay, also provide notice, in accordance with this chapter, to the consumer 
262reporting agencies and state agencies so identified.
263 The notice to be provided to the resident shall include, but not be limited to: (i) the date, 
264estimated date or estimated date range of the breach of security; (ii) the type of personal 
265information compromised, including, but not limited to, any of the categories of personal 
266information set forth in subclauses (A) through (J) of clause (i) or in clause (ii) of the definition 
267of “personal information” in section 1; (iii) a general description of the breach of security; (iv) 
268information that the resident can use to contact the person or agency reporting the breach of 
269security; (v) the resident’s right to obtain a police report; (vi) how a resident may request a 
270security freeze and the necessary information to be provided when requesting the security freeze; 
271(vii) a statement that there shall be no charge for a security freeze; (viii) mitigation services to be 
272provided pursuant to this chapter; and (ix) the toll-free number, address and website for the 
273federal trade commission; provided, however, that the notice shall not be required to include 
274information pursuant to clauses (vi) and (vii) if the personal information compromised by the 
275breach of security is medical information or specific geolocation information. 15 of 16
276 The person or agency that experienced the breach of security shall provide a sample copy 
277of the notice it sent to consumers to the attorney general and the office of consumer affairs and 
278business regulation. A notice provided pursuant to this section shall not be delayed on grounds 
279that the total number of residents affected is not yet ascertained. In such case, and where 
280otherwise necessary to update or correct the information required, a person or agency shall 
281provide additional notice as soon as practicable and without unreasonable delay upon learning 
282such additional information.
283 If the breach of security involves log-in credentials pursuant to clause (ii) of the 
284definition of “personal information” in section 1 for an online account and no other personal 
285information, the person or agency may comply with this chapter by providing notice in electronic 
286or other form; provided, however, that such notice shall direct the resident whose personal 
287information has been breached to: (i) promptly change the resident’s password and security 
288question or answer, as applicable; or (ii) take other steps appropriate to protect the affected 
289online account with the person or agency and all other online accounts for which the resident 
290whose personal information has been breached uses the same username or electronic mail 
291address and password or security question or answer.
292 If the breach of security involves the log-in credentials, pursuant to clause (ii) of the 
293definition of “personal information” in section 1, of an electronic mail account furnished by a 
294person or agency, the person or agency shall not comply with this chapter by providing notice of 
295the breach of security to such electronic mail address but shall instead provide notice by another 
296acceptable method of notice pursuant to this chapter or by clear and conspicuous notice delivered 
297to the resident online when the resident is connected to the online account from an internet  16 of 16
298protocol address or online location from which the person or agency knows the resident 
299customarily accesses the account.