1 | 1 | | 1 of 1 |
---|
2 | 2 | | SENATE DOCKET, NO. 2333 FILED ON: 1/17/2025 |
---|
3 | 3 | | SENATE . . . . . . . . . . . . . . No. 39 |
---|
4 | 4 | | The Commonwealth of Massachusetts |
---|
5 | 5 | | _________________ |
---|
6 | 6 | | PRESENTED BY: |
---|
7 | 7 | | Barry R. Finegold |
---|
8 | 8 | | _________________ |
---|
9 | 9 | | To the Honorable Senate and House of Representatives of the Commonwealth of Massachusetts in General |
---|
10 | 10 | | Court assembled: |
---|
11 | 11 | | The undersigned legislators and/or citizens respectfully petition for the adoption of the accompanying bill: |
---|
12 | 12 | | An Act protecting sensitive personal information from breaches and other cybersecurity |
---|
13 | 13 | | incidents. |
---|
14 | 14 | | _______________ |
---|
15 | 15 | | PETITION OF: |
---|
16 | 16 | | NAME:DISTRICT/ADDRESS :Barry R. FinegoldSecond Essex and Middlesex 1 of 16 |
---|
17 | 17 | | SENATE DOCKET, NO. 2333 FILED ON: 1/17/2025 |
---|
18 | 18 | | SENATE . . . . . . . . . . . . . . No. 39 |
---|
19 | 19 | | By Mr. Finegold, a petition (accompanied by bill, Senate, No. 39) of Barry R. Finegold for |
---|
20 | 20 | | legislation to protect sensitive personal information from breaches and other cybersecurity |
---|
21 | 21 | | incidents by creating a Massachusetts Cyber Incident Response Team. Advanced Information |
---|
22 | 22 | | Technology, the Internet and Cybersecurity. |
---|
23 | 23 | | [SIMILAR MATTER FILED IN PREVIOUS SESSION |
---|
24 | 24 | | SEE SENATE, NO. 2539 OF 2023-2024.] |
---|
25 | 25 | | The Commonwealth of Massachusetts |
---|
26 | 26 | | _______________ |
---|
27 | 27 | | In the One Hundred and Ninety-Fourth General Court |
---|
28 | 28 | | (2025-2026) |
---|
29 | 29 | | _______________ |
---|
30 | 30 | | An Act protecting sensitive personal information from breaches and other cybersecurity |
---|
31 | 31 | | incidents. |
---|
32 | 32 | | Whereas, The deferred operation of this act would tend to defeat its purpose, which is to |
---|
33 | 33 | | further regulate cybersecurity and breaches of personal information, therefore it is hereby |
---|
34 | 34 | | declared to be an emergency law, necessary for the immediate preservation of the public safety. |
---|
35 | 35 | | Be it enacted by the Senate and House of Representatives in General Court assembled, and by the authority |
---|
36 | 36 | | of the same, as follows: |
---|
37 | 37 | | 1 SECTION 1. Chapter 7D of the General Laws is hereby amended by adding the |
---|
38 | 38 | | 2following new sections:- |
---|
39 | 39 | | 3 Section 12. Definitions |
---|
40 | 40 | | 4 As used in this section, and sections 13 and 14, the following words shall have the |
---|
41 | 41 | | 5following meanings, unless the context clearly requires otherwise: 2 of 16 |
---|
42 | 42 | | 6 “Critical infrastructure”, the assets, systems and networks, either physical or virtual, |
---|
43 | 43 | | 7within the commonwealth that are so vital to the commonwealth or the United States that the |
---|
44 | 44 | | 8incapacitation or destruction of such a system or asset would have a debilitating impact on |
---|
45 | 45 | | 9physical security, economic security, public health or safety or any combination thereof; |
---|
46 | 46 | | 10provided, however, that “critical infrastructure” shall include, but not be limited to, election |
---|
47 | 47 | | 11systems, transportation infrastructure, water, gas and electric utilities and shall include any |
---|
48 | 48 | | 12critical infrastructure sectors as identified by: (1) Presidential Policy Directive-21 or a successor |
---|
49 | 49 | | 13directive; or (2) the Cybersecurity and Infrastructure Security Agency. |
---|
50 | 50 | | 14 “Cybersecurity incident”, an event occurring on or conducted through a computer |
---|
51 | 51 | | 15network that actually or imminently jeopardizes the integrity, confidentiality or availability of |
---|
52 | 52 | | 16computers, information or communications systems or networks, physical or virtual |
---|
53 | 53 | | 17infrastructure controlled by computers or information systems or information resident thereon; |
---|
54 | 54 | | 18provided, however, that a cybersecurity incident may include a vulnerability in an information |
---|
55 | 55 | | 19system, system security procedures, internal controls or implementation that could be exploited |
---|
56 | 56 | | 20by a threat source. |
---|
57 | 57 | | 21 “Cybersecurity threat”, any circumstance or event with the potential to adversely impact |
---|
58 | 58 | | 22organizational operations, including mission, functions, image or reputation, organizational |
---|
59 | 59 | | 23assets or individuals through an information system via unauthorized access, destruction, |
---|
60 | 60 | | 24disclosure, modification of information, denial of service or any combination thereof; provided, |
---|
61 | 61 | | 25however, that the term “cybersecurity threat” shall also include the potential for a threat source to |
---|
62 | 62 | | 26successfully exploit a particular information system vulnerability.. 3 of 16 |
---|
63 | 63 | | 27 “Governmental entity”, any department of state, county or local government including |
---|
64 | 64 | | 28the executive, legislative or judicial, and all councils thereof and thereunder, any division, board, |
---|
65 | 65 | | 29bureau, commission, institution, tribunal or other instrumentality within such department or any |
---|
66 | 66 | | 30independent state, county or local authority, district, commission, instrumentality or agency. |
---|
67 | 67 | | 31 “Response team”, the Massachusetts Cyber Incident Response Team established pursuant |
---|
68 | 68 | | 32to section 13. |
---|
69 | 69 | | 33 Section 13. Massachusetts Cyber Incident Response Team. |
---|
70 | 70 | | 34 (a) There shall be established a Massachusetts Cyber Incident Response Team, which |
---|
71 | 71 | | 35shall serve as a standing subcommittee of the office, the mission of which is to enhance the |
---|
72 | 72 | | 36commonwealth’s ability to prepare for, respond to, mitigate against and recover from significant |
---|
73 | 73 | | 37cybersecurity incidents. |
---|
74 | 74 | | 38 (b) The response team shall consist of: the secretary of technology services and security |
---|
75 | 75 | | 39or their designee, who shall serve as chair; a representative of the commonwealth security |
---|
76 | 76 | | 40operations center as designated by the director of security operations; the secretary of public |
---|
77 | 77 | | 41safety and security or their designee; a representative of the state police cyber crime unit; a |
---|
78 | 78 | | 42representative of the commonwealth fusion center; the adjutant general of the Massachusetts |
---|
79 | 79 | | 43National Guard or their designee; the director of the Massachusetts emergency management |
---|
80 | 80 | | 44agency or their designee; the comptroller or their designee; and any other state or local officials |
---|
81 | 81 | | 45as assigned by the chair. The chair shall designate a member of the response team to act as a |
---|
82 | 82 | | 46liaison with federal agencies. |
---|
83 | 83 | | 47 (c) The response team shall review cybersecurity threat information, including intrusion |
---|
84 | 84 | | 48methods, common techniques and known vulnerabilities, to make informed recommendations 4 of 16 |
---|
85 | 85 | | 49and establish appropriate policies to manage the risk of cybersecurity incidents for all |
---|
86 | 86 | | 50governmental entities; provided, however, that such recommendations, policies and directives |
---|
87 | 87 | | 51shall be informed by information and best practices obtained through the established information |
---|
88 | 88 | | 52sharing network of local, state, federal and industry partners in which response team members |
---|
89 | 89 | | 53regularly participate. |
---|
90 | 90 | | 54 (d) The response team shall develop and maintain an updated cybersecurity incident |
---|
91 | 91 | | 55response plan for the commonwealth and submit such plan annually for review, not later than |
---|
92 | 92 | | 56November 1, to the governor and the joint committee on advanced information technology, the |
---|
93 | 93 | | 57internet and cybersecurity. The response team shall conduct tabletop exercises to test the plan at |
---|
94 | 94 | | 58least twice per year and shall conduct individual tabletop exercise testing with a subset of |
---|
95 | 95 | | 59governmental entities, as selected by the response team, at least quarterly. Said plan, which shall |
---|
96 | 96 | | 60not be a public record pursuant to chapter 66 or clause twenty-sixth of section 7 of chapter 4, |
---|
97 | 97 | | 61shall include, but not be limited to: |
---|
98 | 98 | | 62 (i) ongoing and anticipated cybersecurity incidents or cybersecurity threats; |
---|
99 | 99 | | 63 (ii) a risk analysis identifying the vulnerabilities of critical infrastructure and detailing |
---|
100 | 100 | | 64risk-informed recommendations to address such vulnerabilities; |
---|
101 | 101 | | 65 (iii) recommendations regarding the deployment of governmental entity resources and |
---|
102 | 102 | | 66security professionals in rapidly responding to such cybersecurity incidents or cybersecurity |
---|
103 | 103 | | 67threats; |
---|
104 | 104 | | 68 (iv) recommendations regarding best practices to minimize the impact of significant |
---|
105 | 105 | | 69cybersecurity threats to governmental entities; and 5 of 16 |
---|
106 | 106 | | 70 (v) guidelines for governmental entities regarding communication with an individual or |
---|
107 | 107 | | 71entity that is demanding a payment of ransom related to a cybersecurity incident |
---|
108 | 108 | | 72 (e) In the event of a cybersecurity incident that threatens or results in a material |
---|
109 | 109 | | 73impairment of the infrastructure or services of a governmental entity or critical infrastructure, the |
---|
110 | 110 | | 74secretary of technology services and security shall, with the approval of the governor, serve as |
---|
111 | 111 | | 75the director of the response team; provided, however, that the secretary of technology services |
---|
112 | 112 | | 76and security may direct the response team to collaborate with other governmental entities, |
---|
113 | 113 | | 77including federal entities, that are not members of the response team as appropriate to respond to |
---|
114 | 114 | | 78a cybersecurity incident. The provisions of sections 18 through 25, inclusive, of chapter 30A |
---|
115 | 115 | | 79shall not apply to meetings, communications, deliberations or other activities of the response |
---|
116 | 116 | | 80team conducted in response to a cybersecurity incident under this subsection. |
---|
117 | 117 | | 81 (f) Governmental entities shall comply with all protocols and procedures established by |
---|
118 | 118 | | 82the response team and all related policies, standards and administrative directives issued by the |
---|
119 | 119 | | 83office pursuant to subsection (b) of section 3. The chief information officer or equivalent |
---|
120 | 120 | | 84responsible officer for any governmental entity shall, as soon as practicable, report any known |
---|
121 | 121 | | 85cybersecurity incident to the commonwealth security operations center, in a form to be |
---|
122 | 122 | | 86prescribed by the office. The commonwealth security operations center shall notify the response |
---|
123 | 123 | | 87team of all reported security threats or incidents as soon as practicable, but not later than 24 |
---|
124 | 124 | | 88hours after receiving a report. |
---|
125 | 125 | | 89 (g) The commonwealth fusion center and the commonwealth security operations center |
---|
126 | 126 | | 90shall routinely exchange information with the response team and the federal cybersecurity and |
---|
127 | 127 | | 91infrastructure security agency related to cybersecurity threats and cybersecurity incidents that 6 of 16 |
---|
128 | 128 | | 92have been reported to or discovered by their respective state agencies or reported to the response |
---|
129 | 129 | | 93team. |
---|
130 | 130 | | 94 (h) The office and the response team shall consult with the Massachusetts Cyber Center |
---|
131 | 131 | | 95and assist said center with efforts to foster cybersecurity resiliency through communications, |
---|
132 | 132 | | 96collaboration and outreach to governmental entities, educational institutions and industry |
---|
133 | 133 | | 97partners. |
---|
134 | 134 | | 98 (i) The secretary of technology services and security shall promulgate regulations or |
---|
135 | 135 | | 99directives to carry out the purposes of this section. |
---|
136 | 136 | | 100 Section 14. Critical Infrastructure Cyber Incident Reporting Requirements |
---|
137 | 137 | | 101 (a) As used in this section, the following words shall have the following meanings unless |
---|
138 | 138 | | 102the context clearly requires otherwise: |
---|
139 | 139 | | 103 “Covered entity”, any entity that owns or operates critical infrastructure. |
---|
140 | 140 | | 104 “Secretary”, the secretary of the executive office of public safety and security. |
---|
141 | 141 | | 105 (b) A covered entity shall provide notice, as soon as practicable and without unreasonable |
---|
142 | 142 | | 106delay, when such covered entity knows or has reason to know of a cybersecurity incident to the |
---|
143 | 143 | | 107commonwealth fusion center in a form to be prescribed by the secretary in consultation with the |
---|
144 | 144 | | 108response team; provided, however, that such notice shall include, but not be limited to: |
---|
145 | 145 | | 109 (i) a timeline of events as best known by the covered entity and the type of cybersecurity |
---|
146 | 146 | | 110incident known or suspected; |
---|
147 | 147 | | 111 (ii) how the cybersecurity incident was initially detected or discovered; 7 of 16 |
---|
148 | 148 | | 112 (iii) a list of the specific assets that have been affected or are suspected to be affected; |
---|
149 | 149 | | 113 (iv) copies of any electronic communications that are suspected of being malicious, if |
---|
150 | 150 | | 114applicable; |
---|
151 | 151 | | 115 (v) copies of any malware, threat actor tool or malicious links suspected of causing the |
---|
152 | 152 | | 116cybersecurity incident, if applicable; |
---|
153 | 153 | | 117 (vi) any digital logs such as firewall, active directory or event logs, if available; |
---|
154 | 154 | | 118 (vii) forensic images of random access memory or virtualized random access memory |
---|
155 | 155 | | 119from affected systems, if available; |
---|
156 | 156 | | 120 (viii) contact information for the covered entity and any third-party entity engaging in |
---|
157 | 157 | | 121cybersecurity incident response that is involved; and |
---|
158 | 158 | | 122 (ix) any other information related to the cybersecurity incident as required by the |
---|
159 | 159 | | 123secretary. |
---|
160 | 160 | | 124 Any notice provided by a covered entity under this subsection shall not be a public record |
---|
161 | 161 | | 125pursuant to chapter 66 or clause twenty-sixth of section 7 of chapter 4. |
---|
162 | 162 | | 126 (c) Upon receipt of said notice, the representative of the commonwealth fusion center to |
---|
163 | 163 | | 127the response team or their designee shall: |
---|
164 | 164 | | 128 (i) create and maintain a record of the cybersecurity incident, including all information |
---|
165 | 165 | | 129provided by the covered entity in the notice under subsection (b); and |
---|
166 | 166 | | 130 (ii) provide a copy of said record to the response team, which shall be included in the |
---|
167 | 167 | | 131response team’s annual cyber incident response plan required pursuant to subsection (d) of 8 of 16 |
---|
168 | 168 | | 132section 13; provided, however, that such copy shall not include any information identifiable to |
---|
169 | 169 | | 133the covered entity that is not expressly necessary for the preparation of the response team’s |
---|
170 | 170 | | 134report unless the covered entity has provided affirmative consent to share such information. |
---|
171 | 171 | | 135 (d) Upon receipt of the notice required by subsection (b), the commonwealth fusion |
---|
172 | 172 | | 136center may: |
---|
173 | 173 | | 137 (i) coordinate with the response team to identify or communicate recommended response |
---|
174 | 174 | | 138measures as appropriate; |
---|
175 | 175 | | 139 (ii) assist the covered entity with implementing recommended response measures as |
---|
176 | 176 | | 140appropriate, alone or in conjunction with: (A) any agency or entity represented in the response |
---|
177 | 177 | | 141team; (B) any local law enforcement agency; (C) private individuals and other entities at the |
---|
178 | 178 | | 142discretion of the secretary; or (D) the Massachusetts Cyber Center; and |
---|
179 | 179 | | 143 (iii) provide, at the discretion of the secretary, information about other entities that are |
---|
180 | 180 | | 144capable of providing mitigation and remediation support following a cybersecurity incident or in |
---|
181 | 181 | | 145response to a cybersecurity threat. |
---|
182 | 182 | | 146 (e) Nothing in this section shall be construed to: |
---|
183 | 183 | | 147 (i) fulfill any regulatory data breach reporting requirements pursuant to chapter 93H; or |
---|
184 | 184 | | 148 (ii) absolve any duty under applicable federal law to report a cybersecurity threat or |
---|
185 | 185 | | 149cybersecurity incident to the federal cybersecurity and infrastructure security agency. |
---|
186 | 186 | | 150 (f) This section shall not apply to a covered entity that reports the cybersecurity incident |
---|
187 | 187 | | 151to the federal cybersecurity and infrastructure security agency pursuant to the federal Cyber |
---|
188 | 188 | | 152Incident Reporting for Critical Infrastructure Act of 2022 and its implementing regulations. 9 of 16 |
---|
189 | 189 | | 153 (g) The secretary, in consultation with the secretary of technology services and security, |
---|
190 | 190 | | 154shall promulgate regulations for the purposes of carrying out this section. |
---|
191 | 191 | | 155 SECTION 2. Section 1 of chapter 93H of the General Laws, as appearing in the 2022 |
---|
192 | 192 | | 156Official Edition, is hereby amended by inserting after the definition of “Agency” the following |
---|
193 | 193 | | 157definition:- |
---|
194 | 194 | | 158 “Biometric information”, a retina or iris scan, fingerprint, voiceprint, map or scan of hand |
---|
195 | 195 | | 159or face geometry, vein pattern, gait pattern or other data generated from the specific technical |
---|
196 | 196 | | 160processing of an individual’s unique biological or physiological patterns or characteristics used |
---|
197 | 197 | | 161to authenticate or identify a specific individual; provided, however, that “biometric information” |
---|
198 | 198 | | 162shall not include: |
---|
199 | 199 | | 163 (i) a digital or physical photograph; |
---|
200 | 200 | | 164 (ii) an audio or video recording; or |
---|
201 | 201 | | 165 (iii) data generated from a digital or physical photograph, or an audio or video recording, |
---|
202 | 202 | | 166unless such data is generated to authenticate or identify a specific individual. |
---|
203 | 203 | | 167 SECTION 3. Said section 1 of said chapter 93H, as so appearing, is hereby further |
---|
204 | 204 | | 168amended by striking out the definition of “Breach of security” and inserting in place thereof the |
---|
205 | 205 | | 169following definition:- |
---|
206 | 206 | | 170 “Breach of security”, the unauthorized acquisition or use of unencrypted electronic data, |
---|
207 | 207 | | 171or encrypted electronic data when the encryption key or security credential has been acquired; |
---|
208 | 208 | | 172provided, however, that such unauthorized acquisition or use compromises the security, |
---|
209 | 209 | | 173confidentiality or integrity of personal information maintained by a person or agency; and 10 of 16 |
---|
210 | 210 | | 174provided further, that a good faith but unauthorized acquisition of personal information by an |
---|
211 | 211 | | 175employee or agent of a person or agency for the lawful purposes of such person or agency is not |
---|
212 | 212 | | 176a breach of security unless the personal information is used in an unauthorized manner or subject |
---|
213 | 213 | | 177to further unauthorized disclosure. |
---|
214 | 214 | | 178 SECTION 4. Said section 1 of said chapter 93H, as so appearing, is hereby further |
---|
215 | 215 | | 179amended by inserting after the definition of “Encrypted” the following 3 definitions:- |
---|
216 | 216 | | 180 “Genetic information”, information, regardless of format, that: |
---|
217 | 217 | | 181 (i) results from the analysis of a biological sample of an individual or from another |
---|
218 | 218 | | 182source enabling equivalent information to be obtained; and |
---|
219 | 219 | | 183 (ii) concerns an individual’s genetic material, including, but not limited to, |
---|
220 | 220 | | 184deoxyribonucleic acids, ribonucleic acids, genes, chromosomes, alleles, genomes, alterations or |
---|
221 | 221 | | 185modifications to deoxyribonucleic acids or ribonucleic acids, single nucleotide polymorphisms, |
---|
222 | 222 | | 186uninterpreted data that results from analysis of the biological sample or other source or any |
---|
223 | 223 | | 187information extrapolated, derived or inferred therefrom. |
---|
224 | 224 | | 188 "Health insurance information”, an individual’s health insurance policy number, |
---|
225 | 225 | | 189subscriber identification number or any identifier used by a health insurer to identify the |
---|
226 | 226 | | 190individual. |
---|
227 | 227 | | 191 “Medical information”, information regarding an individual’s medical history, mental or |
---|
228 | 228 | | 192physical condition or medical treatment or diagnosis by a healthcare professional. 11 of 16 |
---|
229 | 229 | | 193 SECTION 5. Said section 1 of said chapter 93H, as so appearing, is hereby further |
---|
230 | 230 | | 194amended by striking out the definition of “Personal information” and inserting in place thereof |
---|
231 | 231 | | 195the following definition:- |
---|
232 | 232 | | 196 “Personal information” shall mean: |
---|
233 | 233 | | 197 (i) a resident’s first name and last name or first initial and last name in combination with |
---|
234 | 234 | | 198any 1 or more of the following data elements that relate to such resident: |
---|
235 | 235 | | 199 (A) social security number; |
---|
236 | 236 | | 200 (B) taxpayer identification number or identity protection personal identification number |
---|
237 | 237 | | 201issued by the Internal Revenue Service; |
---|
238 | 238 | | 202 (C) driver’s license number, passport number, military identification number, state-issued |
---|
239 | 239 | | 203identification card number or other unique identification number issued by the government that |
---|
240 | 240 | | 204is commonly used to verify the identity of a specific individual; |
---|
241 | 241 | | 205 (D) financial account number, or credit or debit card number, with or without any |
---|
242 | 242 | | 206required security code, access code, personal identification number or password, that would |
---|
243 | 243 | | 207permit access to a resident's financial account; |
---|
244 | 244 | | 208 (E) biometric information; |
---|
245 | 245 | | 209 (F) date of birth; |
---|
246 | 246 | | 210 (G) genetic information; |
---|
247 | 247 | | 211 (H) health insurance information; 12 of 16 |
---|
248 | 248 | | 212 (I) medical information; or |
---|
249 | 249 | | 213 (J) specific geolocation information; or |
---|
250 | 250 | | 214 (ii) a username or electronic mail address, in combination with a password or security |
---|
251 | 251 | | 215question and answer, that would permit access to an online account. |
---|
252 | 252 | | 216 SECTION 6. Said section 1 of said chapter 93H, as so appearing, is hereby further |
---|
253 | 253 | | 217amended by inserting after the definition of “Personal information” the following definition:- |
---|
254 | 254 | | 218 “Specific geolocation information”, information derived from technology including, but |
---|
255 | 255 | | 219not limited to, global positioning system level latitude and longitude coordinates or other |
---|
256 | 256 | | 220mechanisms that directly identify the specific location of an individual within a geographic area |
---|
257 | 257 | | 221that is not greater than the area of a circle with a radius of 1,850 feet; provided, however, that |
---|
258 | 258 | | 222“specific geolocation information” shall exclude the content of communications or any |
---|
259 | 259 | | 223information generated by or connected to advanced utility metering infrastructure systems or |
---|
260 | 260 | | 224equipment for use by a utility. |
---|
261 | 261 | | 225 SECTION 7. Section 2 of said chapter 93H, as so appearing, is hereby amended by |
---|
262 | 262 | | 226adding the following new subsection:- |
---|
263 | 263 | | 227 (d) The rules and regulations adopted pursuant to this section shall be updated from time |
---|
264 | 264 | | 228to time to reflect any changes to the definitions of “breach of security” or “personal information” |
---|
265 | 265 | | 229in section 1. |
---|
266 | 266 | | 230 SECTION 8. Section 3 of said chapter 93H, as so appearing, is hereby amended by |
---|
267 | 267 | | 231striking out subsection (b) and inserting in place thereof the following subsection:- 13 of 16 |
---|
268 | 268 | | 232 (b) A person or agency that owns or licenses data that includes personal information |
---|
269 | 269 | | 233about a resident of the commonwealth shall provide notice, as soon as practicable and without |
---|
270 | 270 | | 234unreasonable delay, when such person or agency: (i) knows or has reason to know of a breach of |
---|
271 | 271 | | 235security; or (ii) knows or has reason to know that the personal information of such resident was |
---|
272 | 272 | | 236acquired or used by an unauthorized person or used for an unauthorized purpose and such use or |
---|
273 | 273 | | 237acquisition presents a reasonably foreseeable risk of financial, physical, reputational or other |
---|
274 | 274 | | 238cognizable harm to the resident, the attorney general, the Federal Bureau of Investigation and |
---|
275 | 275 | | 239the director of consumer affairs and business regulation, in accordance with this chapter. The |
---|
276 | 276 | | 240notice to be provided to the attorney general, Federal Bureau of Investigation and said director, |
---|
277 | 277 | | 241and consumer reporting agencies or state agencies if any, shall include, but not be limited to: (i) |
---|
278 | 278 | | 242the nature of the breach of security or unauthorized acquisition or use; (ii) the number of |
---|
279 | 279 | | 243residents of the commonwealth affected by such incident at the time of notification; (iii) the |
---|
280 | 280 | | 244name and address of the person or agency that experienced the breach of security; (iv) the name |
---|
281 | 281 | | 245and title of the person or agency reporting the breach of security and their relationship to the |
---|
282 | 282 | | 246person or agency that experienced the breach of security; (v) the type of person or agency |
---|
283 | 283 | | 247reporting the breach of security; (vi) the person responsible for the breach of security, if known; |
---|
284 | 284 | | 248(vii) the type of personal information compromised, including, but not limited to, any of the |
---|
285 | 285 | | 249categories of personal information set forth in the definition of “personal information” in section |
---|
286 | 286 | | 2501; (viii) whether the person or agency maintains a written information security program; and (ix) |
---|
287 | 287 | | 251any steps the person or agency has taken or plans to take relating to the incident, including |
---|
288 | 288 | | 252updating such written information security program. A person who experienced a breach of |
---|
289 | 289 | | 253security shall file a report with the attorney general and the director of consumer affairs and |
---|
290 | 290 | | 254business regulation certifying their credit monitoring services comply with section 3A; provided, 14 of 16 |
---|
291 | 291 | | 255however, that such a report shall not be required if the personal information compromised by the |
---|
292 | 292 | | 256breach of security is medical information or specific geolocation information. |
---|
293 | 293 | | 257 Upon receipt of this notice, the director of consumer affairs and business regulation shall |
---|
294 | 294 | | 258identify any relevant consumer reporting agency or state agency, as deemed appropriate by said |
---|
295 | 295 | | 259director, and forward the names of the identified consumer reporting agencies and state agencies |
---|
296 | 296 | | 260to the notifying person or agency. Such person or agency shall, as soon as practicable and |
---|
297 | 297 | | 261without unreasonable delay, also provide notice, in accordance with this chapter, to the consumer |
---|
298 | 298 | | 262reporting agencies and state agencies so identified. |
---|
299 | 299 | | 263 The notice to be provided to the resident shall include, but not be limited to: (i) the date, |
---|
300 | 300 | | 264estimated date or estimated date range of the breach of security; (ii) the type of personal |
---|
301 | 301 | | 265information compromised, including, but not limited to, any of the categories of personal |
---|
302 | 302 | | 266information set forth in subclauses (A) through (J) of clause (i) or in clause (ii) of the definition |
---|
303 | 303 | | 267of “personal information” in section 1; (iii) a general description of the breach of security; (iv) |
---|
304 | 304 | | 268information that the resident can use to contact the person or agency reporting the breach of |
---|
305 | 305 | | 269security; (v) the resident’s right to obtain a police report; (vi) how a resident may request a |
---|
306 | 306 | | 270security freeze and the necessary information to be provided when requesting the security freeze; |
---|
307 | 307 | | 271(vii) a statement that there shall be no charge for a security freeze; (viii) mitigation services to be |
---|
308 | 308 | | 272provided pursuant to this chapter; and (ix) the toll-free number, address and website for the |
---|
309 | 309 | | 273federal trade commission; provided, however, that the notice shall not be required to include |
---|
310 | 310 | | 274information pursuant to clauses (vi) and (vii) if the personal information compromised by the |
---|
311 | 311 | | 275breach of security is medical information or specific geolocation information. 15 of 16 |
---|
312 | 312 | | 276 The person or agency that experienced the breach of security shall provide a sample copy |
---|
313 | 313 | | 277of the notice it sent to consumers to the attorney general and the office of consumer affairs and |
---|
314 | 314 | | 278business regulation. A notice provided pursuant to this section shall not be delayed on grounds |
---|
315 | 315 | | 279that the total number of residents affected is not yet ascertained. In such case, and where |
---|
316 | 316 | | 280otherwise necessary to update or correct the information required, a person or agency shall |
---|
317 | 317 | | 281provide additional notice as soon as practicable and without unreasonable delay upon learning |
---|
318 | 318 | | 282such additional information. |
---|
319 | 319 | | 283 If the breach of security involves log-in credentials pursuant to clause (ii) of the |
---|
320 | 320 | | 284definition of “personal information” in section 1 for an online account and no other personal |
---|
321 | 321 | | 285information, the person or agency may comply with this chapter by providing notice in electronic |
---|
322 | 322 | | 286or other form; provided, however, that such notice shall direct the resident whose personal |
---|
323 | 323 | | 287information has been breached to: (i) promptly change the resident’s password and security |
---|
324 | 324 | | 288question or answer, as applicable; or (ii) take other steps appropriate to protect the affected |
---|
325 | 325 | | 289online account with the person or agency and all other online accounts for which the resident |
---|
326 | 326 | | 290whose personal information has been breached uses the same username or electronic mail |
---|
327 | 327 | | 291address and password or security question or answer. |
---|
328 | 328 | | 292 If the breach of security involves the log-in credentials, pursuant to clause (ii) of the |
---|
329 | 329 | | 293definition of “personal information” in section 1, of an electronic mail account furnished by a |
---|
330 | 330 | | 294person or agency, the person or agency shall not comply with this chapter by providing notice of |
---|
331 | 331 | | 295the breach of security to such electronic mail address but shall instead provide notice by another |
---|
332 | 332 | | 296acceptable method of notice pursuant to this chapter or by clear and conspicuous notice delivered |
---|
333 | 333 | | 297to the resident online when the resident is connected to the online account from an internet 16 of 16 |
---|
334 | 334 | | 298protocol address or online location from which the person or agency knows the resident |
---|
335 | 335 | | 299customarily accesses the account. |
---|