PRINTER'S NO. 1086 THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL No.997 Session of 2025 INTRODUCED BY SOLOMON, HILL-EVANS, CERRATO, HOWARD, FREEMAN, KAZEEM, GIRAL, GUENST, MERSKI, CEPEDA-FREYTIZ, PIELLI, SANCHEZ, D. WILLIAMS, CIRESI, STEELE, SHUSTERMAN, DEASY, GREEN, DALEY AND GILLEN, MARCH 24, 2025 REFERRED TO COMMITTEE ON COMMERCE, MARCH 24, 2025 AN ACT Amending the act of December 22, 2005 (P.L.474, No.94), entitled "An act providing for security of computerized data and for the notification of residents whose personal information data was or may have been disclosed due to a breach of the security of the system; and imposing penalties," further providing for definitions, for n otification of the breach of the security of the system, for exceptions and for notice exemption; repealing provisions relating to civil relief; providing for protection of personal information, for civil relief for financial institution's liability, for civil relief, for information security, for access devices and breach of security and for applicability; and repealing provisions relating to applicability. The General Assembly of the Commonwealth of Pennsylvania hereby enacts as follows: Section 1. The definitions of "breach of the security of the system," "business," "encryption," "notice" and "personal information" in section 2 of the act of December 22, 2005 (P.L.474, No.94), known as the Breach of Personal Information Notification Act, amended June 28, 2024 (P.L.427, No.33), are amended and the section is amended by adding definitions to read: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Section 2. Definitions. The following words and phrases when used in this act shall have the meanings given to them in this section unless the context clearly indicates otherwise: "Access device." A card issued by a financial institution that contains a magnetic stripe, microprocessor chip or other means for storage of information, including a credit card, debit card or stored value card. "Breach of the security of the system." The unauthorized access and acquisition of computerized data that materially compromises the security or confidentiality of personal information maintained by the entity as part of a database of personal information regarding multiple individuals and that causes or the entity reasonably believes has caused or will cause loss or injury to any resident of this Commonwealth. [ Good faith acquisition of personal information by an employee or agent of the entity for the purposes of the entity is not a breach of the security of the system if the personal information is not used for a purpose other than the lawful purpose of the entity and is not subject to further unauthorized disclosure. ] The term does not include good faith acquisition of personal information by an employee or agent of the entity for the purposes of the entity if the personal information is not used for a purpose other than the lawful purpose of the entity and is not subject to further unauthorized disclosure. "Business." A sole proprietorship, partnership, corporation, association or other group, however organized and whether or not organized to operate at a profit .[, including a financial institution organized, chartered or holding a license or authorization certificate under the laws of this Commonwealth, 20250HB0997PN1086 - 2 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 any other state, the United States or any other country, or the parent or the subsidiary of a financial institution. ] The term includes an entity that destroys records. The term does not include a financial institution. "Card security code." The three-digit or four-digit value printed on an access device or contained in the microprocessor chip or magnetic stripe of an access device that is used to validate access device information during the authorization process. * * * "Encryption." The use of an algorithmic process to transform data into a form [in] which [there is] has a low probability of assigning meaning without use of a confidential process or key. "Encryption key." The confidential key or process designed to render the encrypted personal information useable, readable and decipherable. * * * "Financial institution." An office of a bank, bank and trust, trust company with banking powers, savings bank, industrial loan company, savings association, credit union or regulated lender. * * * "Identity theft." The possession and use, by a person, through any means, of identifying information of another person without consent of the other person to further an unlawful purpose. * * * "Magnetic stripe data." The data contained in the magnetic stripe of an access device. * * * 20250HB0997PN1086 - 3 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 "Notice." [May be provided by any of the following methods of notification] As follows: (1) Written notice to the last known home address for the individual. (2) Telephonic notice, if the individual can be reasonably expected to receive it and the notice is given in a clear and conspicuous manner, describes the incident in general terms and verifies personal information but does not require the individual to provide personal information and the individual is provided with a telephone number to call or Internet website to visit for further information or assistance. (3) E-mail notice, if a prior business relationship exists and the person or entity has a valid e-mail address for the individual. [(3.1) Electronic notice, if the notice directs the person whose personal information has been materially compromised by a breach of the security of the system to promptly change the person's password and security question or answer, as applicable, or to take other steps appropriate to protect the person's online account to the extent the entity has sufficient contact information for the person. (4) (i) Substitute notice, if the entity demonstrates one of the following: (A) The cost of providing notice would exceed $100,000. (B) The affected class of subject persons to be notified exceeds 175,000. (C) The entity does not have sufficient contact information. 20250HB0997PN1086 - 4 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 (ii) Substitute notice shall consist of all of the following: (A) E-mail notice when the entity has an e-mail address for the subject persons. (B) Conspicuous posting of the notice on the entity's Internet website if the entity maintains one. (C) Notification to major Statewide media. ] (4) Substitute notice, if the entity demonstrates one of the following: (i) The cost of providing notice would exceed $100,000. (ii) The affected class of subject persons to be notified exceeds $175,000. (iii) The entity does not have sufficient contact information. "Person." An individual, corporation, business trust, estate trust, partnership, limited liability company, association, joint venture, government, governmental subdivision, agency or instrumentality, public corporation or any other legal or commercial entity. "Personal information." The following: (1) [An individual's] The first name or first initial and last name of a resident of this Commonwealth in combination with and linked to any one or more of the following data elements [ when the data elements are not encrypted or redacted ] that relate to that individual : (i) Social Security number. (ii) Driver's license number or a Federal or State identification card number [ issued in lieu of a driver's 20250HB0997PN1086 - 5 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 license]. (iii) Financial account number, credit or debit card number, in combination with any required security code, access code or password that would permit access to [ an individual's] a resident's financial account. [(iv) Medical information in the possession of a State agency or State agency contractor . (v) Health insurance information. (vi) A user name or e-mail address, in combination with a password or security question and answer that would permit access to an online account. ] (iv) Passport number. (v) A username or email address, in combination with a password or security question and answer that would permit access to an online account. (vi) Medical history, medical treatment by a health care professional, diagnosis of a mental or physical condition by a health care professional or deoxyribonucleic acid profile. (vii) Health insurance policy number, subscriber identification number or any other unique identifier used by a health insurer to identify the person. (viii) Unique biometric data generated from measurements or analysis of human body characteristics for authentication purposes and collected from measurements or analysis of human body characteristics resulting from the uploading or electronic storage of a likeness, whether still or video capture. (ix) An individual taxpayer identification number. (2) The term does not include publicly available 20250HB0997PN1086 - 6 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 information that is lawfully made available to the general public from Federal, State or local government records or widely distributed media . "PIN." A personal identification code that identifies the cardholder. "PIN verification code number." The data used to verify cardholder identity when a PIN is used in a transaction. * * * "Service provider." A person or entity that stores, processes or transmits access device data on behalf of another person or entity. * * * "Substitute notice." Any of the following: (1) Email notice when an entity has an email address for the subject person. (2) Conspicuous posting of the notice on the entity's Internet website if the entity maintains an Internet website. (3) Notification to major Statewide media. Section 2. Sections 3(a) and (b), 4 and 7(b) of the act are amended to read: Section 3. Notification of the breach of the security of the system. (a) General rule.--An entity that maintains, stores or manages computerized data that includes personal information shall provide notice of any breach of the security of the system following [determination] discovery of the breach of the security of the system to any resident of this Commonwealth whose unencrypted and unredacted personal information was or is reasonably believed to have been accessed and acquired by an unauthorized person. Except as provided in section 4 or in order 20250HB0997PN1086 - 7 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 to take any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the data system, the notice shall be made without unreasonable delay. For the purpose of this section, a resident of this Commonwealth may be determined to be an individual whose principal mailing address, as reflected in the computerized data which is maintained, stored or managed by the entity, is in this Commonwealth. * * * (b) Encrypted information.--An entity must provide notice of the breach if encrypted information is accessed and acquired in an unencrypted form, if the security breach is linked to a breach of the security of the encryption or if the security breach [involves] is committed by a person with access to or who otherwise learns of the encryption key. * * * Section 4. Exceptions. The notification required by this act may be delayed for up to three days if a law enforcement agency determines and advises the entity in writing specifically referencing this section that the notification will impede a criminal or civil investigation. [The notification required by this act shall be made after the law enforcement agency determines that it will not compromise the investigation or national or homeland security. ] Section 7. Notice exemption. * * * (b) Compliance with Federal requirements.-- [(1) A financial institution that complies with the notification requirements prescribed by the Federal Interagency Guidance on Response Programs for Unauthorized 20250HB0997PN1086 - 8 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Access to Customer Information and Customer Notice is deemed to be in compliance with this act. ] (2) An entity[, a State agency or a State agency's contractor] that complies with the notification requirements or procedures pursuant to the rules, regulations, procedures or guidelines established by the entity's[ , State agency's or State agency's contractor's ] primary State or functional Federal regulator, shall be in compliance with this act. (3) This act shall not apply to an entity, an affiliate of an entity or data subject to the Gramm-Leach-Bliley Act (Public Law 106-102, 113 Stat. 1338). Section 3. Section 8 of the act is repealed: [Section 8. Civil relief. A violation of this act shall be deemed to be an unfair or deceptive act or practice in violation of the act of December 17, 1968 (P.L.1224, No.387), known as the Unfair Trade Practices and Consumer Protection Law. The Office of Attorney General shall have exclusive authority to bring an action under the Unfair Trade Practices and Consumer Protection Law for a violation of this act. ] Section 4. The act is amended by adding sections to read: Section 9. Protection of personal information. Any person who conducts business in this Commonwealth and owns, licenses or maintains personal information shall implement and maintain reasonable procedures and practices to prevent the unauthorized acquisition, use, modification, disclosure or destruction of personal information collected or maintained in the regular course of business. Section 10. Civil relief for financial institution's liability. (a) Reimbursement.--If there is a breach of the security of 20250HB0997PN1086 - 9 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 the system of a person or entity that has violated this section, or that person's or entity's service provider, that person or entity shall reimburse the financial institution that issued any access devices affected by the breach for the costs of reasonable actions undertaken by the financial institution as a result of the breach in order to protect the information of the entity's cardholders or to continue to provide services to cardholders, including any cost incurred in connection with: (1) the cancellation or reissuance of any access device affected by the breach; (2) the closure of a deposit, transaction, share draft or other accounts affected by the breach and any action to stop payments or block transactions with respect to the accounts; (3) the opening or reopening of a deposit, transaction, share draft or other accounts affected by the breach; (4) a refund or credit made to a cardholder to cover the cost of an unauthorized transaction relating to the breach; or (5) the notification of cardholders affected by the breach. (b) Recovery of damages.--The financial institution shall also be entitled to recover costs for damages paid by the financial institution to cardholders injured by a breach of the security of the system of a person or entity that has violated this section. Costs may not include any amounts recovered from a credit card company by a financial institution. The remedies under this subsection are cumulative and do not restrict any other right or remedy otherwise available to the financial institution. 20250HB0997PN1086 - 10 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Section 11. Civil relief. (a) Remedies for residents.--A resident of this Commonwealth who is adversely affected by a violation of this act, in addition to and cumulative of all other rights and remedies available at law, may bring an action to: (1) Enjoin further violations of this act. (2) Recover the greater of actual damages or $5,000 for each separate violation of this act. (b) Attorney General.--The Attorney General may bring an action against a person who violates this act to: (1) Enjoin further violations of this act. (2) Recover a civil penalty not to exceed $10,000 per violation. (c) Limitation period.--An action under this section must be brought within three years after the violation is discovered or by the exercise of reasonable diligence that should have been discovered, whichever is earlier. (d) Repeated violations.--In an action under this section, the court may increase a damage award to an amount equal to not more than three times the amount otherwise available under this section if the court determines that the defendant has engaged in a pattern and practice of violating this section. (e) Attorney fees and costs.--A prevailing plaintiff in any action commenced under this section shall be entitled to recover reasonable attorney fees and costs. (f) Arbitration.--The rights of residents of this Commonwealth and a resident's access to the courts of this Commonwealth are in addition to and are not barred by any arbitration provision in a contract between residents and businesses. A contract entered into on or after the effective 20250HB0997PN1086 - 11 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 date of this section shall not include language that requires arbitration or restricts a resident's right to legal action. (g) Violations.--For the purpose of this section, multiple violations of this act resulting from any single action or act shall constitute one violation. Section 12. Information security. (a) Security or identification information.--An entity that maintains, stores or manages computerized data that includes personal information shall take reasonable measures, consistent with the nature and size of the entity, to secure the system and personal information of residents of this Commonwealth that is not redacted. (b) Liability.--If there is a breach of the security of the system of a person or entity that has violated this section, or that person's or entity's service provider, that person or entity shall compensate the person affected by the breach for identity theft and fraudulent charges in the amount of $5,000 for each separate violation of this act or the actual damages incurred, whichever is greater. Section 13. Access devices and breach of security. (a) Security or identification information and retention prohibited.--A person or entity conducting business in this Commonwealth that accepts an access device in connection with a transaction may not retain the card security code data, the PIN verification code number or the full contents of any tract magnetic stripe data, subsequent to the authorization of the transaction or in the case of a PIN debit transaction, subsequent to 48 hours after authorization of the transaction. A person or entity is in violation of this section if the person's or entity's service provider retains the data subsequent to the 20250HB0997PN1086 - 12 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 authorization of the transaction or, in the case of a PIN debit transaction, subsequent to 48 hours after authorization of the transaction. (b) Liability.--If there is a breach of the security of the system of a person or entity that has violated this section, or that person's or entity's service provider, that person or entity shall reimburse the financial institution that issued any access devices affected by the breach for the costs of reasonable actions undertaken by the financial institution as a result of the breach in order to protect the information of the financial institution's cardholders or to continue to provide services to cardholders, including any cost incurred in connection with: (1) the cancellation or reissuance of any access device affected by the breach; (2) the closure of any deposit, transaction, share draft or other accounts affected by the breach and any action to stop payments or block transactions with respect to the accounts; (3) the opening or reopening of any deposit, transaction, share draft or other account affected by the breach; (4) any refund or credit made to a cardholder to cover the cost of any unauthorized transaction relating to the breach; and (5) the notification of cardholders affected by the breach. (c) Recovery.--The financial institution shall also be entitled to recover costs for damages paid by the financial institution to cardholders injured by a breach of the security 20250HB0997PN1086 - 13 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 of the system of a person or entity that has violated this section. Costs do not include any amounts recovered from a credit card company by a financial institution. The remedies under this subsection are cumulative and do not restrict any other right or remedy otherwise available to the financial institution. Section 14. Applicability. This act shall apply to the discovery or notification of a breach in the security of personal information that occurs on or after the effective date of this section. Section 5. Section 29 of the act is repealed: [Section 29. Applicability. This act shall apply to the determination or notification of a breach of the security of the system that occurs on or after the effective date of this section. ] Section 6. This act shall take effect in 60 days. 20250HB0997PN1086 - 14 - 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16