-  This bill is not active in this session.
 

A08756 Summary:

BILL NOA08756
 
SAME ASSAME AS S06933
 
SPONSORKavanagh
 
COSPNSRTitone
 
MLTSPNSR
 
Amd Art 39-F Art Head, §899-aa, add §899-bb, Gen Bus L; amd §208, St Tech L
 
Relates to notification of a security breach; includes credit and debit cards; increases civil penalties.
Go to top    

A08756 Actions:

BILL NOA08756
 
10/31/2017referred to consumer affairs and protection
12/15/2017enacting clause stricken
Go to top

A08756 Committee Votes:

Go to top

A08756 Floor Votes:

There are no votes for this bill in this legislative session.
Go to top

A08756 Memo:

NEW YORK STATE ASSEMBLY
MEMORANDUM IN SUPPORT OF LEGISLATION
submitted in accordance with Assembly Rule III, Sec 1(f)
 
BILL NUMBER: A8756
 
SPONSOR: Kavanagh
  TITLE OF BILL: An act to amend the general business law and the state technology law, in relation to notification of a security breach   PURPOSE: New York's data breach notification law needs to be updated keep pace with current technology. This bill broadens the scope of information covered under the notification law and updates the notification require- ments when there has been a breach of data. It also broadens the defi- nition of a data breach to include an unauthorized person gaining access to information. It also requires reasonable data security, provides standards tailored to the size of a business, and provides protections from liability for certain entities.   SUMMARY OF SPECIFIC PROVISIONS: Section 1 of the bill names the act. Section 2 of the bill amends the title of article 39-F of the General Business Law. Section 3 of the bill amends section 899-aa of the General Business Law. The amendments would: *update the notifications section of the General Business Law by adding biometric data, email addresses or user names in combination with a password or security question answer, and protected health information held by a "covered entity" to the private information definition; *update the notifications section of the General Business Law by adding unauthorized access to the private information to the definitions of "private information" and "breach of the security of the system"; *update the notification requirement by applying it to any person or entity with private information of a New York resident, not just to those that "conduct business" in New York State; *add definitions for the terms credit card and debit card; *correct typos and inconsistencies in language to clarify that breaches of private information only (and not personal information) trigger notice obligations and to make consistent all references to compromise by an unauthorized person or a person without valid authorization; *authorize businesses in certain circumstances to notify the consumer via email of the breach and if the consumer's email is believed to have been compromised authorize the business to use other electronic methods to notify the consumer; *require that, if a business is sending out a new credit or debit card to a consumer, the consumer be notified that the card is on its way; *outline penalties for businesses that fail to provide notice to consum- ers of a breach and the limitations period for the attorney general to act on any failure; *require certain information to be included in the notice that would direct consumers to federal and state data security prevention entities and require businesses to send a template of their notice to consumers to the attorney general and the Office of Information Technology Services; and, *task the Department of State with receiving and responding to data breach complaints and with informing the public of data security and breach prevention techniques. Section 4 of the bill creates a new section 899-bb of the General Busi- ness Law that would: *require reasonable data security for private information, with a more flexible standard for small businesses, without creating new require- ments for entities subject to existing or future regulations by any federal or other New York State government entity, and while providing safe harbor from enforcement for entities that take steps to verify their compliance with other existing data security regulations or stand- ards; and *deem failure to provide required reasonable data security to be a violation of section 349 of the General Business Law, permitting the attorney general to bring suit but not any private plaintiff. Section 5 of the bill amends the State Technology Law. The amendments would: *include the same terms as above in the definition of private information; *state that should a data breach occur in a State entity the Office of Information Technology Services shall deliver a report on the scope of the breach to the entity affected; *require that an entity shall notify individuals affected by the data breach as quickly as possible; and, *task the office of information technology services to develop and provide regular trainings to all entities on preventing data breaches. Section 6 of the bill sets forth the effective date.   JUSTIFICATION: New York's current data breach notification law needs to be updated to keep pace with individuals' use and dissemination of private informa- tion. New York also needs to join the increasing number of states that require reasonable data security protections, without imposing duplicate obligations on those already subject to other federal or New York State data security regulations and without imposing excessive costs on small business, while providing safe harbor from enforcement for entities that take steps to verify their compliance with other existing data security regulations or standards. This bill expands the scope of information subject to the current data breach notification law to include biometric information, email addresses and their corresponding passwords or secu- rity questions and answers, and protected health information as defined under HIPAA. It broadens the definition of a data breach to include unauthorized access to private information. It applies the notification requirement to any person or entity with private information of a New York resident, not just to those that conduct business in New York State. It also updates the notification procedures companies and state entities must follow when there has been a breach of private informa- tion. It also creates reasonable data security requirements tailored to the size of a business and provides protections from liability for certain entities that take steps to verify their safeguarding of private information.   PRIOR LEGISLATIVE HISTORY:   FISCAL IMPACT ON THE STATE: None.   FISCAL IMPACT ON LOCALITIES: None.   IMPACT ON THE REGULATION OF BUSINESSES AND INDIVIDUALS: The bill would impose stronger obligations on businesses handling private data of customers, regarding security and proper notification of breaches.   IMPACT ON FINES, IMPRISONMENT, FORFEITURE OF RIGHTS, OR OTHER PENAL SANCTIONS: None.   EFFECTIVE DATE: This act shall take effect January 1, 2018.
Go to top

A08756 Text:



 
                STATE OF NEW YORK
        ________________________________________________________________________
 
                                          8756
 
                               2017-2018 Regular Sessions
 
                   IN ASSEMBLY
 
                                    October 31, 2017
                                       ___________
 
        Introduced by M. of A. KAVANAGH, TITONE -- (at request of the Department
          of Law) -- read once and referred to the Committee on Consumer Affairs
          and Protection
 
        AN  ACT  to amend the general business law and the state technology law,
          in relation to notification of a security breach

          The People of the State of New York, represented in Senate and  Assem-
        bly, do enact as follows:
 
     1    Section  1.  This act shall be known and may be cited as the "New York
     2  Data Security Act".
     3    § 2. The article heading of article 39-F of the general business  law,
     4  as  added  by  chapter  442  of  the laws of 2005, is amended to read as
     5  follows:
     6             NOTIFICATION OF UNAUTHORIZED ACQUISITION OF PRIVATE
     7                   INFORMATION; DATA SECURITY PROTECTIONS
     8    § 3. Subdivisions 1, 2, 3, 5, 6, 7 and 8  of  section  899-aa  of  the
     9  general business law, as added by chapter 442 of the laws of 2005, para-
    10  graph  (c) of subdivision 1, paragraph (a) of subdivision 6 and subdivi-
    11  sion 8 as amended by chapter 491 of the laws of 2005 and  paragraph  (a)
    12  of  subdivision 8 as amended by section 6 of part N of chapter 55 of the
    13  laws of 2013, are amended and a new subdivision 5-a is added to read  as
    14  follows:
    15    1. As used in this section, the following terms shall have the follow-
    16  ing meanings:
    17    (a)  "Personal  information"  shall  mean any information concerning a
    18  natural person which, because of name, number, personal mark,  or  other
    19  identifier, can be used to identify such natural person;
    20    (b)  "Private information" shall mean either: (i) personal information
    21  consisting of any information in combination with any one or more of the
    22  following data elements, when either the  personal  information  or  the
    23  data  element is not encrypted, or encrypted with an encryption key that
    24  has also been accessed or acquired:
 
         EXPLANATION--Matter in italics (underscored) is new; matter in brackets
                              [ ] is old law to be omitted.
                                                                   LBD13619-04-7

        A. 8756                             2
 
     1    (1) social security number;
     2    (2)  driver's license number or non-driver identification card number;
     3  [or]
     4    (3) account number, credit or debit card number, in  combination  with
     5  any required security code, access code, [or] password or other informa-
     6  tion that would permit access to an individual's financial account;
     7    (4)  account  number,  credit  or  debit card number, if circumstances
     8  exist wherein such number could be used to access an individual's finan-
     9  cial account without additional identifying information, security  code,
    10  access code, or password; or
    11    (5)  biometric  information, meaning data generated by automatic meas-
    12  urements of an individual's physical characteristics, which are used  to
    13  authenticate the individual's identity;
    14    (ii)  a  user name or e-mail address in combination with a password or
    15  security question and answer that  would  permit  access  to  an  online
    16  account; or
    17    (iii)  any  unsecured  protected health information held by a "covered
    18  entity" as defined in the health insurance portability and  accountabil-
    19  ity act of 1996 (45 C.F.R.  pts. 160, 162, 164), as amended from time to
    20  time.
    21    "Private  information" does not include publicly available information
    22  which is lawfully made available to the  general  public  from  federal,
    23  state, or local government records.
    24    (c)  "Breach  of  the  security of the system" shall mean unauthorized
    25  access to or acquisition of, or access to or acquisition  without  valid
    26  authorization,  of  computerized  data  that  compromises  the security,
    27  confidentiality, or integrity of [personal]  private  information  main-
    28  tained   by  a  business.  Good  faith  access  to,  or  acquisition  of
    29  [personal], private information by an employee or agent of the  business
    30  for  the purposes of the business is not a breach of the security of the
    31  system, provided that the private information is not used or subject  to
    32  unauthorized disclosure.
    33    In determining whether information has been accessed, or is reasonably
    34  believed  to  have  been accessed, by an unauthorized person or a person
    35  without valid authorization, such business  may  consider,  among  other
    36  factors, indications that the information was viewed, communicated with,
    37  used,  or altered by a person without valid authorization or by an unau-
    38  thorized person.
    39    In determining whether information has been acquired, or is reasonably
    40  believed to have been acquired, by an unauthorized person  or  a  person
    41  without  valid  authorization,  such business may consider the following
    42  factors, among others:
    43    (1) indications that the information is in the physical possession and
    44  control of a person without valid authorization or  by  an  unauthorized
    45  person,  such  as  a  lost or stolen computer or other device containing
    46  information; or
    47    (2) indications that the information has been downloaded or copied; or
    48    (3) indications that the information was  used  by  a  person  without
    49  valid  authorization  or  an  unauthorized  person,  such  as fraudulent
    50  accounts opened or instances of identity theft reported.
    51    (d) "Consumer reporting agency" shall mean any person which, for mone-
    52  tary fees, dues, or on a cooperative nonprofit basis, regularly  engages
    53  in whole or in part in the practice of assembling or evaluating consumer
    54  credit  information or other information on consumers for the purpose of
    55  furnishing consumer reports to third parties, and which uses  any  means
    56  or  facility  of  interstate  commerce  for  the purpose of preparing or

        A. 8756                             3
 
     1  furnishing consumer reports. A list of consumer reporting agencies shall
     2  be compiled by the state attorney general and furnished upon request  to
     3  any person or business required to make a notification under subdivision
     4  two of this section.
     5    (e) "Credit card" shall mean any card or other credit device issued by
     6  a  financial  institution  to  a  consumer  for the purpose of providing
     7  money, property, labor or services on credit.
     8    (f) "Debit card" shall mean any card  or  other  device  issued  by  a
     9  financial  institution to a consumer for use in initiating an electronic
    10  fund transfer from the account of the consumer at such financial  insti-
    11  tution,  for  the  purpose  of  transferring  money  between accounts or
    12  obtaining money, property, labor or services.
    13    2. Any person or business which [conducts business in New York  state,
    14  and  which]  owns  or  licenses computerized data which includes private
    15  information shall disclose any breach of  the  security  of  the  system
    16  following discovery or notification of the breach in the security of the
    17  system  to any resident of New York state whose private information was,
    18  or is reasonably believed to have been, accessed or acquired by a person
    19  without valid authorization or by an unauthorized person.   The  disclo-
    20  sure  shall  be  made  in  the  most expedient time possible and without
    21  unreasonable delay, consistent with the legitimate needs of law enforce-
    22  ment, as provided in subdivision four of this section, or  any  measures
    23  necessary  to determine the scope of the breach and restore the [reason-
    24  able] integrity of the system.
    25    3. Any person or business  which  maintains  computerized  data  which
    26  includes  private information which such person or business does not own
    27  shall notify the owner or licensee of the information of any  breach  of
    28  the  security  of  the  system  immediately  following discovery, if the
    29  private information  was,  or  is  reasonably  believed  to  have  been,
    30  acquired  by  a person without valid authorization or by an unauthorized
    31  person.
    32    5. The notice required by this section shall be directly  provided  to
    33  the affected persons by one of the following methods:
    34    (a) written notice;
    35    (b)  electronic  notice,  provided  that  the person to whom notice is
    36  required has expressly consented to receiving said notice in  electronic
    37  form  and a log of each such notification is kept by the person or busi-
    38  ness who notifies affected  persons  in  such  form;  provided  further,
    39  however,  that  in no case shall any person or business require a person
    40  to consent to accepting said notice in  said  form  as  a  condition  of
    41  establishing any business relationship or engaging in any transaction.
    42    (c)  telephone notification provided that a log of each such notifica-
    43  tion is kept by the person or business who notifies affected persons; or
    44    (d) substitute notice, if a business demonstrates to the state  attor-
    45  ney  general  that the cost of providing notice would exceed two hundred
    46  fifty thousand dollars, or that the affected class of subject persons to
    47  be notified exceeds five hundred thousand, or  such  business  does  not
    48  have  sufficient contact information. Substitute notice shall consist of
    49  all of the following:
    50    (1) e-mail notice when such business has an  e-mail  address  for  the
    51  subject  persons,  except if the breached information includes an e-mail
    52  address in combination with a password or security question  and  answer
    53  that would permit access to the online account, in which case the person
    54  or business shall instead provide clear and conspicuous notice delivered
    55  to  the  consumer  online  when  the consumer is connected to the online
    56  account from an internet protocol address or  from  an  online  location

        A. 8756                             4
 
     1  which  the  person  or  business  knows the consumer customarily uses to
     2  access the online account;
     3    (2)  conspicuous  posting  of  the  notice on such business's web site
     4  page, if such business maintains one; and
     5    (3) notification to major statewide media.
     6    5-a. Any credit or debit card issuer that issues a new credit or debit
     7  card as a result of a breach of the security of the system  pursuant  to
     8  paragraph  (c)  of  subdivision  one  of this section, shall provide the
     9  consumer notice that the issuance of the  replacement  credit  or  debit
    10  card  is  due  to  a  potential  compromise of the prior card absent any
    11  evidence of actual or potential unauthorized use of such credit or debit
    12  card or other circumstances precipitating the issuance of a  replacement
    13  card.
    14    6.  (a)  whenever  the  attorney  general  shall believe from evidence
    15  satisfactory to him that there is a violation of  this  article  he  may
    16  bring  an action in the name and on behalf of the people of the state of
    17  New York, in a court of justice having jurisdiction to issue an  injunc-
    18  tion,  to  enjoin  and  restrain the continuation of such violation.  In
    19  such action, preliminary relief may be granted under article sixty-three
    20  of the civil practice law and rules. In such action the court may  award
    21  damages  for  actual  costs  or  losses incurred by a person entitled to
    22  notice pursuant to this article, if notification  was  not  provided  to
    23  such  person pursuant to this article, including consequential financial
    24  losses. Whenever the court shall determine in such action that a  person
    25  or business violated this article knowingly or recklessly, the court may
    26  impose  a civil penalty of the greater of five thousand dollars or up to
    27  [ten] twenty dollars per instance of failed notification, provided  that
    28  the  latter  amount  shall  not  exceed [one] two hundred fifty thousand
    29  dollars.
    30    (b) the remedies provided by this section shall be in addition to  any
    31  other lawful remedy available.
    32    (c)  no  action  may  be  brought under the provisions of this section
    33  unless such action is commenced within [two] three  years  [immediately]
    34  after either the date [of the act complained of or the date of discovery
    35  of  such  act]  on  which  the  attorney  general  became  aware  of the
    36  violation, or the date of notice  sent  pursuant  to  paragraph  (a)  of
    37  subdivision eight of this section, whichever occurs first.
    38    7.  Regardless  of the method by which notice is provided, such notice
    39  shall include contact information for the person or business making  the
    40  notification,  the  telephone numbers and websites of the relevant state
    41  and federal agencies that provide information regarding security  breach
    42  response and identity theft prevention and protection information, and a
    43  description  of  the categories of information that were, or are reason-
    44  ably believed to have been, accessed or acquired  by  a  person  without
    45  valid  authorization  or by an unauthorized person, including specifica-
    46  tion of which of the elements of personal information and private infor-
    47  mation were, or are reasonably believed to have  been,  so  accessed  or
    48  acquired.
    49    8.  (a)  In  the event that any New York residents are to be notified,
    50  the person or business shall notify  the  state  attorney  general,  the
    51  department  of state and the [division of state police] office of infor-
    52  mation technology services as to the timing, content and distribution of
    53  the notices and approximate number of affected persons and shall provide
    54  a copy of the template of the notice sent to  affected  persons.    Such
    55  notice  shall be made without delaying notice to affected New York resi-
    56  dents.

        A. 8756                             5
 
     1    (b) In the event that more than five thousand New York  residents  are
     2  to  be  notified  at  one time, the person or business shall also notify
     3  consumer reporting agencies as to the timing, content  and  distribution
     4  of  the  notices and approximate number of affected persons. Such notice
     5  shall be made without delaying notice to affected New York residents.
     6    §  4. The general business law is amended by adding a new section 899-
     7  bb to read as follows:
     8    § 899-bb. Data security protections. 1.  Definitions.  (a)  "Compliant
     9  regulated  entity" shall mean any person or business that is subject to,
    10  and in compliance with, any of the following data security requirements:
    11    (i) regulations promulgated pursuant to Title V of the federal  Gramm-
    12  Leach-Bliley Act (15 U.S.C. 6801 to 6809), as amended from time to time;
    13    (ii)  regulations  implementing  the  Health Insurance Portability and
    14  Accountability Act of 1996 (45 C.F.R. parts 160  and  164),  as  amended
    15  from  time  to  time, and the Health Information Technology for Economic
    16  and Clinical Health Act, as amended from time to time;
    17    (iii) part five hundred of title twenty-three of the official compila-
    18  tion of codes, rules and regulations  of  the  state  of  New  York,  as
    19  amended from time to time; or
    20    (iv)  any  other data security rules and regulations of, and the stat-
    21  utes administered by, any official department, division,  commission  or
    22  agency  of the federal or New York State government as such rules, regu-
    23  lations or  statutes  are  interpreted  by  such  department,  division,
    24  commission or agency or by the federal or New York State courts.
    25    (b)  "Certified  compliant  entity"  shall mean any person or business
    26  that:
    27    (i) is compliant with any of the data security requirements  in  para-
    28  graph (a) of this subdivision or with the most up to date version of the
    29  International  Standards Organization Standard 27002 or with the most up
    30  to date version  of  National  Institute  of  Standards  and  Technology
    31  Special Publication 800-53, as it relates to the protection of electron-
    32  ic private information; and
    33    (ii)  has such compliance certified annually by an independent, third-
    34  party assessment organization that is authorized to provide such certif-
    35  ications by the official department, division, commissioner or agency or
    36  standards body that promulgates the data security regulations or  stand-
    37  ards being certified.
    38    (c)  "Private  information"  shall have the same meaning as defined in
    39  section eight hundred ninety-nine-aa of this article.
    40    (d) "Small business" shall mean any person or business with (i)  fewer
    41  than  fifty  employees,  including  any  independent contractors, of the
    42  business; (ii) less than three million dollars in gross  annual  revenue
    43  in  each of the last three fiscal years; or (iii) less than five million
    44  dollars in year-end total assets, calculated in accordance with general-
    45  ly accepted accounting principles.
    46    2. Reasonable security. (a)  Any  person  or  business  that  owns  or
    47  licenses computerized data which includes private information of a resi-
    48  dent  of New York shall develop, implement and maintain reasonable safe-
    49  guards to protect the security, confidentiality  and  integrity  of  the
    50  private information including, but not limited to, disposal of data.
    51    (b)  Small  businesses subject to the requirements of paragraph (a) of
    52  this subdivision shall be deemed to be in compliance with such  require-
    53  ment  if  they  implement  and  maintain  reasonable safeguards that are
    54  appropriate to the size and complexity of the small business to  protect
    55  the  security,  confidentiality and integrity of the private information
    56  including, but not limited to, disposal of data.

        A. 8756                             6
 
     1    (c) A person or business shall be deemed  to  be  in  compliance  with
     2  paragraphs (a) and (b) of this subdivision if it either:
     3    (i)  is  a compliant regulated entity as defined in subdivision one of
     4  this section;
     5    (ii) is a certified compliant entity as defined in subdivision one  of
     6  this section; or
     7    (iii) implements a data security program that includes the following:
     8    (A)  administrative  safeguards  such  as  the following, in which the
     9  person or business:
    10    (1) designates one  or  more  employees  to  coordinate  the  security
    11  program;
    12    (2) identifies reasonably foreseeable internal and external risks;
    13    (3)  assesses  the  sufficiency  of safeguards in place to control the
    14  identified risks;
    15    (4) trains and manages employees in the security program practices and
    16  procedures;
    17    (5) selects service providers capable of maintaining appropriate safe-
    18  guards, and requires those safeguards by contract; and
    19    (6) adjusts the security program in light of business changes  or  new
    20  circumstances; and
    21    (B) technical safeguards such as the following, in which the person or
    22  business:
    23    (1) assesses risks in network and software design;
    24    (2)  assesses  risks in information processing, transmission and stor-
    25  age;
    26    (3) detects, prevents and responds to attacks or system failures; and
    27    (4) regularly tests and monitors the effectiveness  of  key  controls,
    28  systems and procedures; and
    29    (C)  physical safeguards such as the following, in which the person or
    30  business:
    31    (1) assesses risks of information storage and disposal;
    32    (2) detects, prevents and responds to intrusions;
    33    (3) protects against unauthorized access to or use of private informa-
    34  tion during or after the collection, transportation and  destruction  or
    35  disposal of the information; and
    36    (4) disposes of private information within a reasonable amount of time
    37  after it is no longer needed for business purposes by erasing electronic
    38  media so that the information cannot be read or reconstructed.
    39    (d)  Any  person  or business required to comply with paragraph (a) or
    40  (b) of this subdivision that fails  to  comply  with  such  subdivisions
    41  shall  be  deemed  to  have violated section three hundred forty-nine of
    42  this chapter, and the attorney general may bring an action in  the  name
    43  and  on  behalf  of  the  people of the state of New York to enjoin such
    44  violations and to obtain civil penalties  under  section  three  hundred
    45  fifty-d of this chapter.
    46    (e) Nothing in this section shall create a private right of action.
    47    3.  Safe harbor for certified compliant entities.  A certified compli-
    48  ant entity shall not be subject to an enforcement action by the attorney
    49  general pursuant to subdivision two of this section if:
    50    (a) it provides copies of its  certifications  of  compliance  to  the
    51  attorney general; and
    52    (b)  there  is  no  evidence of willful misconduct, bad faith or gross
    53  negligence.
    54    § 5. Paragraph (a) of subdivision 1 and subdivisions 2, 3, 6, 7 and  8
    55  of section 208 of the state technology law, paragraph (a) of subdivision
    56  1  and subdivisions 3 and 8 as added by chapter 442 of the laws of 2005,

        A. 8756                             7
 
     1  subdivision 2 and paragraph (a) of subdivision 7 as amended by section 5
     2  of part N of chapter 55 of the laws of 2013 and subdivisions 6 and 7  as
     3  amended  by  chapter  491  of  the  laws of 2005, are amended to read as
     4  follows:
     5    (a)  "Private information" shall mean either: (i) personal information
     6  consisting of any information in combination with any one or more of the
     7  following data elements, when either the  personal  information  or  the
     8  data  element  is not encrypted or encrypted with an encryption key that
     9  has also been accessed or acquired:
    10    (1) social security number;
    11    (2) driver's license number or non-driver identification card  number;
    12  [or]
    13    (3)  account  number,  or  credit or debit card number, in combination
    14  with any required identifying information, security code,  access  code,
    15  or  password  which  would  permit  access  to an individual's financial
    16  account;
    17    (4) account number, or credit or debit card number,  if  circumstances
    18  exist  wherein  such  number  could be used to access to an individual's
    19  financial account without additional identifying  information,  security
    20  code, access code, or password; or
    21    (5)  biometric  information, meaning data generated by automatic meas-
    22  urements of an individual's physical characteristics, which are used  to
    23  authenticate the individual's identity;
    24    (ii)  a  user name or e-mail address in combination with a password or
    25  security question and answer that  would  permit  access  to  an  online
    26  account; or
    27    (iii)  any  unsecured  protected health information held by a "covered
    28  entity" as defined in the health insurance portability and  accountabil-
    29  ity act of 1996 (45 C.F.R.  pts. 160, 162, 164), as amended from time to
    30  time.
    31    "Private  information" does not include publicly available information
    32  that is lawfully made available to  the  general  public  from  federal,
    33  state, or local government records.
    34    2.  Any  state  entity  that  owns  or licenses computerized data that
    35  includes private information shall disclose any breach of  the  security
    36  of  the  system following discovery or notification of the breach in the
    37  security of the system to any resident of New York state  whose  private
    38  information  was,  or  is  reasonably believed to have been, accessed or
    39  acquired by a person without  valid  authorization  or  an  unauthorized
    40  person.   The disclosure shall be made in the most expedient time possi-
    41  ble and without unreasonable delay, consistent with the legitimate needs
    42  of law enforcement, as provided in subdivision four of this section,  or
    43  any  measures necessary to determine the scope of the breach and restore
    44  the [reasonable] integrity of the data system.  The state  entity  shall
    45  consult  with  the  state  office  of information technology services to
    46  determine the scope of the breach and restoration measures. Within nine-
    47  ty days of the notice of the breach, the office of information technolo-
    48  gy services shall deliver a report on the scope of the breach and recom-
    49  mendations to restore and improve the security  of  the  system  to  the
    50  state entity.
    51    3.  Any  state  entity  that maintains computerized data that includes
    52  private information which such agency does  not  own  shall  notify  the
    53  owner  or  licensee  of the information of any breach of the security of
    54  the system immediately following discovery, if the  private  information
    55  was,  or is reasonably believed to have been, acquired by a person with-
    56  out valid authorization or an unauthorized person.

        A. 8756                             8
 
     1    6. Regardless of the method by which notice is provided,  such  notice
     2  shall  include  contact  information  for  the  state  entity making the
     3  notification, the telephone numbers and websites of the  relevant  state
     4  and  federal agencies that provide information regarding security breach
     5  response  and identity theft prevention and protection information and a
     6  description of the categories of information that were, or  are  reason-
     7  ably  believed  to  have  been, accessed or acquired by a person without
     8  valid authorization or an unauthorized person,  including  specification
     9  of which of the elements of personal information and private information
    10  were, or are reasonably believed to have been, so accessed or acquired.
    11    7.  (a)  In  the event that any New York residents are to be notified,
    12  the state entity shall notify the state attorney general, the department
    13  of state and the state office of information technology services  as  to
    14  the  timing,  content  and  distribution  of the notices and approximate
    15  number of affected persons and provide a copy of  the  template  of  the
    16  notice  sent  to  affected  persons.   Such notice shall be made without
    17  delaying notice to affected New York residents.
    18    (b) In the event that more than five thousand New York  residents  are
    19  to  be notified at one time, the state entity shall also notify consumer
    20  reporting agencies as to the timing, content  and  distribution  of  the
    21  notices and approximate number of affected persons. Such notice shall be
    22  made without delaying notice to affected New York residents.
    23    8.  The state office of information technology services shall develop,
    24  update and provide regular training to all state  entities  relating  to
    25  best  practices  for  the  prevention of a breach of the security of the
    26  system.
    27     9. Any entity listed in subparagraph two of paragraph (c) of subdivi-
    28  sion one of this section shall adopt a notification policy no more  than
    29  one  hundred  twenty days after the effective date of this section. Such
    30  entity may develop a notification policy which is consistent  with  this
    31  section  or  alternatively  shall  adopt a local law which is consistent
    32  with this section.
    33    § 6. This act shall take effect January 1, 2018.
Go to top