Pending Federal Initiatives To Further Regulate Data Privacy and Cyber Security

Size: px
Start display at page:

Download "Pending Federal Initiatives To Further Regulate Data Privacy and Cyber Security"

Transcription

1 Pending Federal Initiatives To Further Regulate Data Privacy and Cyber Security As of September 2011 Prepared for The Advanced Cyber Security Center Launch Conference The MITRE Corporation Michele A. Whitham Partner, Founding Co-Chair Security & Privacy Practice Group Foley Hoag LLP 155 Seaport Boulevard Boston, MA 02210

2 I. THE CURRENT LAW BEARING ON DATA PRIVACY AND CYBER SECURITY 1 Historically, lawmakers in the United States at both the federal and state levels have largely focused their approach to regulating cyber-space on safeguarding the privacy and security of individuals electronic data, including by specifying the requirements for notifying affected persons of a breach. The result is an array of overlapping statutes intended to protect sensitive, non-public, personal information. At the federal level, the United States Congress has to date focused on regulating data privacy and security by dividing the landscape by subject matter and promulgating fifteen (15) stand-alone federal statutes regulating specialized categories of data, principally financial data, health care information, computer and internet data, and personal communications. In contrast, forty-six (46) of the fifty (50) states 2 and the District of Columbia have enacted statutes designed to protect the privacy and security of individual s sensitive, private data (typically requiring that a person s name be delinked from such data as social security number, financial account numbers, credit card numbers, and similar information that could lead to financial loss or other personal data theft) and requiring notification to individuals of security breaches when they occur. An overview of these laws, including tables summarizing the federal and state statutes enacted to date, can be found at: Security-Center-Launch-Conference-Materials.aspx?ref=1 Finally, it should be noted that several states have taken the forwardthinking step of creating a state executive office specifically governing data security. For example, New York has created the Office of Cyber Security and Critical Infrastructure Coordination, which focuses on threats to electronic information systems, California the Office of Privacy Protection (COPP), and Colorado the Office of Cyber Security. The step of creating state agencies could foreshadow similar measures taken in the future at the federal level, as data privacy issues jump to the forefront of both individual and national security. 1 This overview of current law is exclusive of unenacted data privacy and cyber security legislative initiatives currently pending before the United States Senate or House of Representatives, which are the subject of the balance of this publication. 2 Only Alabama, Kentucky, New Mexico and South Dakota have yet to enact such statutes. -2-

3 II. PENDING FEDERAL INITIATIVES TO FURTHER REGULATE DATA PRIVACY AND CYBER SECURITY Faced with the proliferation of federal and state laws regulating piecemeal insulated segments of the privacy and security landscape (by way of example, healthcare data or financial data), Congress has over the last several years promulgated an array of federal legislative proposals directed at creating a federalized data privacy regime. Many of these initiatives have sought simply to nationalize the protection of sensitive, non-public personal information by providing for a federal law preempting the forty-six state data privacy regimes. 3 Most recently, bills aimed at promoting enhanced cyber-security of critical infrastructure and institutions (for example, the internet or the national power grid) have been proposed. This paper overviews currently pending federal initiatives and their status. A. Cyber Security Initiatives Of the fifteen (15) bills currently pending in Washington touching on privacy and security issues, only five (5) including a proposed White House cyber security initiative -- are squarely focused on cyber security per se, as contrasted to the nearly dozen bills seeking to enhance protections for various categories of non-public, sensitive information. 4 Although the Senate s February, 3 To be sure, some bills have continued the federal trend of undertaking to regulate specialized categories of data (for example, social security numbers). Examples include Protecting the Privacy of Social Security Numbers Act (S. 1199), introduced by Senator Diane Feinstein on June 15, 2011 and pending in the Senate Judiciary Committee, and bills requiring the Postal Service to omit proprietary data from noncompetitive purchases (the Postal Service modernization acts), electronic utilities to safeguard billing and energy consumption data of their customers (the e- KNOW Act), and the local educational authorities to secure educational data shared with other such authorities (the METRICS Act). 4 Relatedly, governmental initiatives to protect cyber-space are beginning to be backstopped by the efforts of private actors specializing in cyber security. In the United States, for example, the National Institute of Standards and Technology (NIST), headquartered in Gaithersburg, Maryland, launched on August 11, 2011, a National Initiative for Cyber security Education - Building a Digital Nation (NICE), a national campaign designed to improve the cyber behavior, skills and knowledge of every segment of the population, enabling a safer cyberspace. The goals of NICE are to (1) raise awareness among the American public about the risks of online activities; (2) broaden the pool of skilled workers capable of supporting a cyber-secure nation; and (3) develop and maintain an unrivaled, globally competitive cyber security workforce. In a parallel development in the EU, the inaugural World Cyber Security Technology Research Summit was held this year at the Centre for Secure Information Technologies (CSIT) in Belfast, Ireland. Among the attendees, drawn from leading research institutes, government bodies and industry, were the UK Home Office, US Department of Commerce, US Cyber Consequences Unit, Stanford University, Carnegie Mellon University, BAE systems, Thales and IBM. The conference worked to develop a collective strategy for next generation research critical to the creation of cyber security defenses, organized around the following themes: (1) adaptive cyber security technologies (e.g., self-learning technologies with embedded cyber feedback systems); (2) creation and protection of smart utility grids (e.g., development of smart grid standards and protection technologies for smart grid components); (3) security of the mobile platform and applications -3-

4 2011 initiative seeking to develop a national strategy to secure cyberspace had begun to advance, the Obama administration s May 16, 2011 cyber security proposal has resulted in Senate efforts to draft comprehensive cyber security legislation being put on hold. The remaining three pending initiatives are languishing with no action being taken. Senate and White House National Strategy Proposals 1. (Reintroduced) Cyber Security and Internet Freedom Act of 2011 (S. 413). (Introduced 02/17/11 by Sen. Joseph I. Lieberman. Hearings held by Homeland Security and Governmental Affairs Committee 05/23/11. One of seven Senate committees claiming jurisdiction over the issue. On 07/13/11 Sen. John McCain called for creation of a temporary Select Senate Committee on Cyber Security and Electronic Intelligence Leaks to break the logjam. Efforts to reconcile Senate and White House cyber security proposals put on hold 07/18/11.) Establishes in the Executive Office of the President an Office of Cyberspace Policy to (a) develop national strategy to increase security and resiliency of cyber space; (b) oversee, coordinate and integrate federal policies and activities relating to cyber security; (c) ensure that all federal agencies comply with related guidelines, policies and directives of Department of Homeland Security and other agencies; and (d) ensure that federal agencies have access to, receive and appropriately disseminate law enforcement, intelligence, terrorism and other information relevant to the security of federal, military and intelligence information infrastructure. Requires President to appoint Director of Cyberspace Policy within the Department of Homeland Security, which position intersects that proposed in H.R. 174 (described below) and to establish within DHS a National Center for Cyber security and Communications (NCCC), the Director of which would work with the private sector and lead the federal effort to secure, protect and ensure resiliency of the national information infrastructure, including by creating the United States Computer Emergency Readiness Team to collect and disseminate information on risks to the infrastructure and security controls. Declares that neither the President, the Director of the National Center for Cyber security and Communications (NCCC), nor any officer or employee of the U.S. government shall have the authority to shut down the internet, but authorizes the President to (e.g., addressing cyber security problems created by configuration and use of mobile networks); and (4) multi-faceted approach to cyber security research (accounting for, e.g., social behavioral norms, the economics of cyber security and the impact of legislation). -4-

5 declare national cyber emergencies (for period of 30 days, to be extended only with Congressional approval) and the NCCC Director to take steps to direct owners and operators to implement required response plans and emergency actions to maintain operations. Bars other federal entities from intervening in the response (including by restricting or intercepting communications, compelling disclosure or controlling infrastructure) unless determined necessary by the Director. Requires owners and operators of critical infrastructure to certify to the Director that they have implemented approved security and cyber emergency measures. Mandates readiness and capacity assessments of the federal workforce to respond to cyber security requirements. 2. White House Cyber Security Regulatory Framework for Covered Critical Infrastructure Act (Introduced 05/16/11.) Dual focus on (a) implementing national cyber security program for computer networks and critical infrastructure and (b) mandating a national standard for data breach notification. As to national cyber security, the White House proposal would require the Department of Homeland Security (DHS) to work with the private sector to identify core critical-infrastructure operators and to prioritize the top cyber threats and vulnerabilities facing these entities. Such operators (including those already reporting to the SEC) would be required to develop cyber security risk mitigation plans that would be assessed by third-party, commercial auditors. The proposal also establishes stronger penalties for computer crimes, beefs up cyber security staffing at DHS, and updates the Federal Information Security Management Act to improve cyber security of federal information technology systems. See section by section description of the proposed legislation at As to the national data breach notification standard, the proposal would cover businesses that collect, use, transmit, retain or dispose of sensitive personally identifiable information on more than 10,000 individuals within a 12 month period, exclusive of businesses covered by the Health Information Technology for Economic and Clinical Health (HITECH) Act. The proposal defines sensitive, personally identifiable information (SPII) as name combined with any two of full birth date, home address or telephone number, or mother s maiden name. SPII also includes full Social Security, driver s license, passport or other government issues identification number, biometric data, a unique financial account or payment care number, or other financial information. Covered businesses would be required to notify individuals within 60 days of SPII being unsecured by technology and to notify the Department of Homeland Security of a breach involving (a) more -5-

6 than 5,000 individuals; (b) a database containing information on more than 500,000 individuals; (c) a database owned by the federal government; or (d) a database containing SPII of federal employees or contractors. DHS notification would be required at least 72 hours being providing notice to affected individuals or within 10 day of discovery of the breach, whichever comes first. Breaches affecting more than 5,000 individuals in any one state would require the business to notify the individuals and also post notices in news media outlets. The proposal also includes three breach notification exemptions, however: (1) a risk of harm trigger for when notice is required, exempting covered businesses that notify the FTC within 45 days that, upon investigation, they have concluded that there is no reasonable risk that the security breach has resulted or will result in harm; (2) an exemption for businesses that use a program that blocks unauthorized financial transactions before they are charged to individual accounts while notifying the affected individuals of the attempted security breach; and (3) an exemption if the U.S. Secret Service or FBI determines that notice could reveal sensitive source or methods or damage national security. The FTC would promulgate and enforce breach notification rules; state attorney generals would be authorize to file enforcement actions and impose civil penalties of up to $1,000,000 per security incident that is not willful or intentional. Individual lawsuits would be prohibited and existing state breach notification laws would be preempted. See fact sheet on the White House proposal at Stalled House Initiatives 3. Homeland Security, Cyber and Physical Infrastructure Protection Act of 2011 (H.R. 174) (Introduced 1/05/11 by Rep. Bennie G. Thompson. Referred to House Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology on 01/31/11. No further action.) Amends the Homeland Security Act of 2002 to establish within the Department of Homeland Security (DHS) an Office of Cybersecurity and Communications, to be headed by an Assistant Secretary and to include (a) the United States Computer Emergency Readiness Team; (b) a Cybersecurity Compliance Division; and (c) other DHS units with primary responsibility for emergency or national cyber security. The Office would establish and enforce cyber security requirements for civilian nonmilitary and non-intelligence community federal systems to prevent, respond to and recover from cyber attacks and incidents The Act would also require all federal entities to report any cyber incidents on their networks to the Office, which would be required to research each incident and -6-

7 report on the extent of compromise, the attackers, the method of penetration, the ramifications and recommended mitigation activities. In addition, the Office would (a) establish and enforce cyber security requirements for private sector computer networks within covered critical infrastructures; (b) be required to share information regarding cyber security threats, vulnerabilities and proposed mitigations; (c) designate information received and provided to federal agencies and critical infrastructure owners and operatives as sensitive security information and enforce requirements for handling, storage and dissemination; and (d) support research, development, testing, evaluation and transition of cyber security technology relevant to large-scale, high-impact attacks. 4. Executive Cyberspace Coordination Act of 2011 (H.R. 1136). (Introduced 03/16/11 by Rep. James R. Langevin, RI. Referred to House Subcommittee on Cyber security, Infrastructure Protection and Security Technologies 03/25/11. No further action.) Establishes National Office for Cyberspace (NOC) within the Executive Office of the President, to serve as principal office for coordinating cyberspace policies, procedures and information bearing on the cyber security of federal information systems. Requires the NOC Director to (1) develop and update information security policies and procedures; (2) establish a national cyber security education and computer literacy program; (3) review federal agency budgets relating to the protection of information infrastructures; and (4) ensure the operation of a central federal information security incident center. Requires the promulgation of information security standards for federal information systems, a vulnerability assessment for all major information systems, and annual independent audits of each federal agencies information security programs and practices. Requires all federal agency contracts to include requirements for information security. Establishes a Federal Chief Technology Officer position to advise the President and agency officials on significant developments and trends in information technology and best-in-class technologies. Grants the Secretary of Homeland Security primary authority for the protection of the critical information infrastructure. 5. Cyber Security Enhancement Act of 2011 (H.R. 2096). (Introduced 06/02/11 by Reps. McCaul and Lipinski and referred to the Committee on Science, Space and Technology. No further action.) An act amending the Cyber Security Research and Development Act (15 U.S.C. 7401) in order to advance cyber security research, development and technical standards by requiring that the National Science and Technology council, with the assistance of the National Coordination Office, develop -7-

8 within twelve (12) months of the Act s passage a strategic plan based on an overall assessment of cyber security risk to guide the overall direction of federal cyber security and information assurance R&D for information technology and networking systems. Once every three (3) years after the initial strategic plan is transmitted to Congress, said agencies shall update the plan. The strategic plan will be required to (1) specify near-, mid- and long-term research objectives; (2) focus on innovative, transformational technologies to enhance the digital infrastructure; (3) foster new cyber technologies and applications, including the dissemination of best practices; (4) establish a national research infrastructure for creating, testing and evaluating next generation secure networking and IT systems; (5) facilitate access by academic researchers to the infrastructure and to data; and (6) engage females and minorities in fostering a more diverse cyber workforce. The plan must also include an implementation roadmap (1) specifying the role or each Federal agency in implementation; (2) the amount and source of required funding to implement each major research objective; and (3) estimates of funding required for each major research objective for the following three (3) fiscal years. B. Data Privacy/Breach Response Initiatives Fully two-thirds of the cyber bills currently pending in Washing focus narrowly on setting standards for securing sensitive personal information and responding to data breaches involving such data. Around the edges of the current legislative session, however, are suggestions of newly emerging legislative themes such as, for example, a growing expressions of concern about, if not outright hostility toward, the tracking and monitoring of individual behavior and consumer preferences by internet service providers and sales outlets. Data Accountability Bills 1. BEST PRACTICES Act (Building Effective Strategies to Promote Responsibility, Accountability, Choice Transparency, Innovation, Consumer Expectations and Safeguards Act)(H.R. 611). (Introduced 02/10/11 by Rep. Bobby L. Rush, IL. Referred 02/18/11 to House Subcommittee on Commerce, Manufacturing and Trade. No further action.) This bill addresses the growing concern over the collection, storage and commercial use by internet service providers of sensitive individual information, often without transparent notice. The bill constrains the commercial conduct of covered entities, defined as persons engaged in commerce that collect or store date containing covered/sensitive information (excluding (1) governments; (2) persons storing covered information from or about fewer than 15,000 individuals); -8-

9 (3) persons collecting covered information from or about fewer than 10,000 individuals during any 12-month period); and (4) persons who do not use covered information to monitor or analyze the behavior of individuals as the person s primary business. The bill would require covered entities to make available to individuals whose information it collects or maintains information the details of its privacy practices and an individual s options with regard to such practices, including (1) the covered entity s identity; (2) a description of the purpose for and potential for information disclosure; (3) the individual s means to access the information, limit its collection, use and disclosure, and submit questions or complaints regarding the covered entities practices. The bill also prohibits covered entities from (1) collecting, using or disclosing information except in easy-to-understand notices consistent with FTC regulations; (2) collecting or using information without the individual s consent (either affirmative or failure to decline to consent); and (3) disclosing information to a third party without affirmative consent. Covered entities are required in addition to assure information accuracy, security, integrity and confidentiality and to provide individuals with information access and dispute resolution procedures. The bill creates certain exemptions for covered entities participating in one of the FTC s self-regulatory programs (Choice Program), and provides for FTC, state and private rights of enforcement. 2. The Commercial Privacy Bill of Rights Act of 2011 (S. 799). (Introduced 04/12/11 by Sen. John F. Kerry, MA. Read twice and referred 04/12/11 to Senate Committee on Commerce, Science and Technology. No further action.) This bill would require the FTC to initiate various rulemakings to further secure covered information, defined as (1) personally identifiable information; (2) unique identifier information; and (3) any information collected, used or stored is such manner as may reasonably be used to identify a specific individual. One rulemaking would proscribe the security measures to be carried out by covered entities collecting, using, transferring or storing certain personal information of 5,000 or more individuals in any 12-month period. A second rulemaking would proscribe the notification, consent, inaccuracy correction, deidentification and stop use rights of individuals whose data has been collected. The bill also limits information collection to restricted purposes for which it is reasonably necessary, sets out specific contract provisions required to use a service provider or to transfer personal information to a third party, and provides for FTC and attorneys general enforcement (but no private right of action), civil penalties and safe harbor programs. -9-

10 3. Data Accountability and Trust Act (H.R. 1707). (Related Bill S. 1207). (Introduced 05/04/11 by Rep. Bobby L. Rush, IL. Referred 05/06/11 to House Subcommittee on Commerce, Manufacturing and Trade. No further action.) A second bill directed to the FTC which prescribes largely the same requirements as those detailed in DATA 2011 below, except also (1) requires that the FTC be notified of information security breaches (including method and timeliness requirements); (2) exempts from notification requirements situations where the information broker determines there is no reasonable risk of identity theft, fraud or other unlawful conduct; and (3) preempts all state information security laws. 4. Data Accountability and Trust Act (DATA) of 2011 (H.R. 1841). (Introduced 05/11/11 by Rep. Cliff Stearns, FL. Referred 05/13/11 to House Subcommittee on Commerce, Manufacturing and Trade. No further action.) A third bill directed to the FTC, this one requiring the agency to promulgate regulations requiring persons engaged in interstate commerce who own or possess electronic data containing personal information to (1) establish security policies and procedures, (2) submit those policies to the FTC in connection with a breach or on FTC request; (3) establish procedures to verify the accuracy of information identifying individuals; (4) establish procedures permitting individuals whose personal information has been collected to request access, review and correct inaccurate information; (5) establish measures permitting the auditing or retracing of access to or transmission of electronic personal information; and (6) not obtain or disclose information through pretexting. The bill also authorizes the FTC to proscribe a standard method(s) for destroying obsolete nonelectronic data and for notifying the FTC of security breaches, including special notification requirements for contractors maintaining or processing personal information, breaches involving telecommunications and computer services, and health information. Data Breach Notification Bills A principle theme underlying the 2011 crop of data privacy and cyber security legislative initiatives is the need to create a uniform national standard for when to require notice to individuals of a breach of their sensitive, personal information. Among the issues defining the debate is disagreement as to the risk of harm trigger for imposing the burden of notice on government and business entities collecting such information. Specifically, triggers that include a reasonable belief of breach or a showing of no significant risk of harm from a breach are being debated as setting too low a threshold and thus likely to result in -10-

11 over-notification of individuals and a subsequent desensitization of the public to the importance of such notices. The competing standard that has been voiced is significant risk of harm arising from the identity theft. Bills Pending Before the Senate Judiciary Committee 5. Personal Data Privacy and Security Act of 2011 (S. 1151). (Related Bill S. 1535). (Introduced 06/07/11 by Sen. Patrick J. Leahy, VT. Read twice and referred to the Senate Judiciary Committee (Leahy Chair). Hearing held by the Judiciary Committee 09/07/11. Business meeting of the Judiciary Committee to consider S.1151 held on 09/15/11. Two amendments to the bill were adopted and four held over. Consideration ongoing.) This bill aims squarely at preventing and mitigating identity theft, ensuring privacy, providing notice of security breaches and enhancing criminal penalties, law enforcement assistance, and other protections against security breaches, fraudulent and misuse of personally identifiable information. Specifically, the bill amends the federal criminal code to (1) make fraud in connection with unauthorized access of personally identifiable information (electronic or digital) a predicate for racketeering charges; (2) prohibit concealment of security breaches involving sensitive personally identifiable information; and (3) set penalties for attempts and conspiracies to commit fraud in connection with computers. In addition, the bill establishes standards for developing and implementing safeguards to protect sensitive personal information, imposes civil penalties for violating such standards, and proposes a national breach notification standard requiring that notifications be given to (1) individuals whose data has been compromised; (2) all nationwide consumer reporting agencies if more than 5,000 individuals require notification; and (3) the United States Secret Service and the FBI if more than 10,000 individuals are affected. The bill authorizes the Attorney General and state attorneys general to bring civil actions against violators of the Act and requires the GSA, in awarding contracts of $500,000 or more, to take into account the data privacy and security capabilities and track record of a data broker. Further, the bill requires federal information security programs to evaluate and audit the practices of their contractors or other business entities supporting their systems or operations involving personally identifiable information and to address discovered deficiencies. It also requires federal agencies to conduct privacy impact assessments before buying personally identifiable information from any data broker. Finally, this bill requires data brokers (that is business entities that collect, transmit or provide access to sensitive personally identifiable information on more than 5,000 individuals who are not customers or employees of that -11-

12 business in order to give the information to non-affiliated third parties on an interstate basis) to (1) disclose to individuals the personal electronic records maintained for disclosure to third parties; (2) disclose adverse actions by third parties as to the individuals; and (3) maintain procedures for correcting inaccurate or incomplete records. At an executive business meeting held on September 15, 2011, the Senate Judiciary Committee approved two amendments to this bill, one "common sense" amendment clarifying that the definition of "exceeds authorized access" in the Computer Fraud and Abuse Act does not include violations of internet terms of service agreements or non-government employment agreements restricting computer access and the second making a variety of technical changes to the CFAA amendment. 5 The bill was held over for further consideration, with four additional proposed amendments still pending. 6. Data Breach Notification Act of 2011 (S. 1408). (Related Bills S and S. 1535). (Introduced 07/22/11 by Sen. Diane Feinstein, CA. Referred to the Senate Judiciary Committee. Hearing held by the Judiciary Committee 09/07/11. Business meeting of the Judiciary Committee to consider S held on 09/15/11. Consideration ongoing.) This bill is Senator Feinstein s fifth attempt since 2003 to secure passage of a federal breach notification bill. The Senator s most recent data breach initiative would require Federal agencies, and persons engaged in interstate commerce, in possession of data containing sensitive, personally identifiable information, to disclose any breach of such information. Committee on the Judiciary Notice of Hearing. The bill requires federal agencies and business entities engaged in interstate commerce that use, access or collect sensitive, personally identifiable information to notify United States residents whose information may have been accessed or acquired and the owner or licensee of any such information (if not the agency or business itself). Exempted from the notification requirement are breaches implicating national security or law enforcement issues, breaches certified by the Secret Service as having no significant risk of harm, and business entities utilizing security programs that block personally identifiable information and provide notice of breach. The act also requires that certain specified breaches be reported to 5 The CFAA is a recent focus of arch criticisms in view of the Justice Department s efforts to expand the meaning of exceeds authorized access to include violations and breaches of terms of use policies and to make such violations felonies. -12-

13 the Secret Service, FBI, Postal Inspection Service and state attorneys general. This bill would also amend the Fair Credit Reporting Act (FCRA) to require consumer reporting agencies to include a fraud alert in the file of a consumer that submits evidence of compromised financial information. Civil enforcement actions for violations would lie with both the United States and state attorneys general. 7. Personal Data Protection and Breach Accountability Act of 2011 (S. 1535). (Related Bills S and S. 1408). (Introduced 09/08/11 by Sen. Richard Blumenthal, CT. Read twice and referred to the Senate Judiciary Committee. Business meeting of the Judiciary Committee to consider S held on 09/15/11. Consideration ongoing.) Senator Blumenthal s bill would also preempt the existing breach notification laws in 46 states and the District of Columbia and create a uniform national data breach notification standard. The Blumenthal standard would require federal agencies and businesses to provide notice to individuals, without any unreasonable delay after discovery, if the breach presents a significant risk of harm or fraud to any individual. The bill also specifies the form of notice to include a writing, e- mail, by telephone, by posting a public notice on the breached entity s website, or (in the event of breaches affecting 5,000 or more individuals) by posting notice in major media outlets. Notice must also be given in the event of breaches impacting 5,000 or more individuals, a federal database or national security to the Secret Service and the FBI. Remedies for individuals would include free credit monitoring services for two years and the right to bring civil lawsuits for up to $20 million in damages, including punitives. The United States and state attorneys general would be authorized to enforce the data security and breach notification requirements of the bill. The bill would also charge the United States attorney general with establishing a post-breach technical analysis clearinghouse so that covered entitled can share information to assist in mitigating against future breaches. Additional provisions in this wide-ranging bill would (1) require the GSA to impose data security requirements on government contracts of more than $500,000; (2) require all federal agencies to audit the safeguards of their contractors; (3) bar ISPs from using personal information willfully to bypass a user s search engine results to redirect them to another website for economic gain; (4) ban the installation of spyware and key-logging software without consent; (5) criminalize the intentional concealment of a data breach that causes economic harm or substantial emotional distress personal to even one person; and (6) criminalize the sending of a breach notification in an attempt to defraud. -13-

14 Bills Pending Before the Senate Commerce Committee 8. Data Security and Breach Notification Act of 2011 (S. 1207). (Related Bill S. 1434). (Introduced 06/15/11 by Sen. John D. Rockefeller, W.Va., Commerce Committee Chair, and Sen. Mark Pryor, D. Ark., Insurance Subcommittee Chair. Read twice and referred to the Senate Committee on Commerce, Science and Transportation.) This bill is Sens. Rockefeller s and Pryor s second attempt in as many years to secure passage of a bill authorizing the FTC to set national data breach security standards and issue regulations requiring certain businesses to notify individuals in the event of a breach of their electronic personal information. This bill also proposes to preempt the 47 state and District of Columbia breach notice laws and contains a risk of harm trigger, relieving covered entities from having to provide notice if, after investigation, there is no reasonable risk of identity theft, fraud or other unlawful conduct stemming from the compromise of electronic records. The bill also empowers the FTC to post information on its website about reported breaches if in the public interest and to enforce the breach notification provisions, including by imposing up to $5MM total damages ($11,000 per person) per single breach incident for failures of notice. Covered entities would also have to give two years of free credit monitoring. The bill singles out for attention data brokers, which would be required to submit their data security policies to the FTC for approval, improve their processes for allowing individuals to access and correct their personal information, and bar them from seeking personal information through false pretenses. State attorneys general, but not individuals, would enforce the law. 9. Data Security Act of 2011 (S. 1434). (Related Bills S and S. 1408). (Introduced 07/28/11 by Sen. Thomas R. Carper, CT. Read twice and referred to the Senate Committee on Banking, Housing and Urban Affairs.) Senator Carper s fourth attempt since 2006 to secure passage of this bill (modeled after the data security provisions of Gramm-Leach-Bliley) requiring federal agencies and businesses to adopt measures to implement information security safeguards (principally for personal financial information) and investigate security breaches, and mandating breach notification requirements. This bill too would preempt state data security laws. Unique features of this bill include an exemption from notification requirements if the protected information is maintained in a form not usable to commit identity theft or to make fraudulent transactions, or is sent in encrypted, redacted, coded or some other masked form. The bill also contains a risk of harm threshold, requiring notification only if an -14-

15 investigation of a breach demonstrates that the purloined information is likely to be misused in a manner causing substantial harm or inconvenience, measured in terms of material financial loss. Enforcement of this law would be by the FTC. 10. SAFE Data Act (Secure and Fortify Electronic Data Act) (H.R. 2577). (Introduced 07/18/11 by Rep. Bono Mack. Referred to the House Energy and Commerce Committee. No further action.) This bill aims to protect consumers by requiring the promulgation of reasonable security policies and procedures to protect data containing personal information and to provide nationwide notice in the event of a security breach. The bill would require all persons engaged in interstate commerce that own or possess data containing personal information related to the commercial activity, including information brokers, to establish such policies and procedures within one (1) year of the bill s passage. Such policies and procedures must include, in addition to rules regarding the collection, use, sale, other dissemination and maintenance of the information, vulnerability assessment systems, preventive and corrective action requirements, and processes for disposing such information. The bill would also require that businesses minimize the amount of such data maintained. Intermediate and transient storage service providers would be exempted from the bills requirements. Enforcement would be by the FTC and state attorneys general, with the financial penalties echoing those of the Data Security and Breach Notification Act of

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s

More information

The National Security Act of 1947 - A Review

The National Security Act of 1947 - A Review PENDING FEDERAL INITIATIVES TO FURTHER REGULATE DATA PRIVACY AND CYBER SECURITY As of Prepared for the June 14, 2012 ACSC Technical Exchange Meeting Assembled by Colin Zick and Michele Whitham czick@foleyhoag.com

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity

More information

Global Privacy Japan Sets its Rules for Personal Data

Global Privacy Japan Sets its Rules for Personal Data Global Privacy Japan Sets its Rules for Personal Data Global companies must comply with differing privacy rules. The great divide between the EU and the USA is well-known. See Global Privacy Protection

More information

Cyber Legislation & Policy Developments 2014

Cyber Legislation & Policy Developments 2014 Cyber Legislation & Policy Developments 2014 SESSION ID: LAW-Fo2 Michael A. Aisenberg, Esq. Chair, ABA Information Security Committee Policy Task Force ABA Section on Science & Technology Law Principal

More information

Shipman & Goodwin LLP. HIPAA Alert STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS

Shipman & Goodwin LLP. HIPAA Alert STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS Shipman & Goodwin LLP HIPAA Alert March 2009 STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS The economic stimulus package, officially named the American Recovery and Reinvestment Act of 2009

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Data Security. Updated April, 2006. CCIM Institute 430 N. Michigan Avenue Chicago, IL 60611 (312) 321-4460

Data Security. Updated April, 2006. CCIM Institute 430 N. Michigan Avenue Chicago, IL 60611 (312) 321-4460 Data Security Updated April, 2006 CCIM Institute 430 N. Michigan Avenue Chicago, IL 60611 (312) 321-4460 Background As technology has evolved and become vital for businesses, a growing number of public

More information

114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS

114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS 114 th Congress March, 2015 Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS On January 13, 2015, the Administration wrote a letter to Congress urging

More information

Government Focus on Cybersecurity Elevates Data Breach Legislation. by Experian Government Relations and Experian Data Breach Resolution

Government Focus on Cybersecurity Elevates Data Breach Legislation. by Experian Government Relations and Experian Data Breach Resolution Government Focus on Cybersecurity Elevates Data Breach Legislation by Experian Government Relations and Experian Data Breach Resolution Will Congress pass data breach legislation in 2015/2016? Recent high-profile

More information

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel todd.bertoson@dentons.com

More information

Privacy Risks and Public Benefits of Big Data Federal Proposals Regarding Data Security and Privacy Regulation

Privacy Risks and Public Benefits of Big Data Federal Proposals Regarding Data Security and Privacy Regulation Privacy Risks and Public Benefits of Big Data Federal Proposals Regarding Data Security and Privacy Regulation Presented by: Francine E. Friedman (202) 887-4143 ffriedman@akingump.com January 30, 2013

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

Public Law 113 283 113th Congress An Act

Public Law 113 283 113th Congress An Act PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it

More information

Legislative Language

Legislative Language Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting

More information

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable Steven J. Fox (sjfox@postschell.com) Peter D. Hardy (phardy@postschell.com) Robert Brandfass (BrandfassR@wvuh.com) (Mr. Brandfass

More information

Legislative Language. Law Enforcement Provisions Related to Computer Security

Legislative Language. Law Enforcement Provisions Related to Computer Security Legislative Language Law Enforcement Provisions Related to Computer Security Part 1: Specific Criminalization of Damaging Critical Infrastructure Computers Title 18, United States Code, is amended to add

More information

Preservation of longstanding, roles and missions of civilian and intelligence agencies

Preservation of longstanding, roles and missions of civilian and intelligence agencies Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto

More information

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the

More information

When Can We Expect a Federal Data Breach Notification Law?

When Can We Expect a Federal Data Breach Notification Law? When Can We Expect a Federal Data Breach Notification Law? The Trials and Tribulations of Getting a DBN Bill through Congress. Alexi Madon Director of State Government Affairs, Midwest Cybersecurity Overview

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act International Life Sciences Arbitration Health Industry Alert If you have questions or would like additional information on the material covered in this Alert, please contact the author: Brad M. Rostolsky

More information

Special Report The HITECH Act

Special Report The HITECH Act Special Report The HITECH Act Privacy and Data Breach Notification Provision An Overview of the HITECH Act On February 17, 2009, President Obama signed into law the $787 billion stimulus package known

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

MEMORANDUM MEMBERS OF THE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION

MEMORANDUM MEMBERS OF THE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION MEMORANDUM TO: FROM: MEMBERS OF THE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION REPUBLICAN COMMITTEE STAFF DATE: FEBRUARY 3, 2015 RE: SUBCOMMITTEE HEARING ON GETTING IT RIGHT ON DATA SECURITY

More information

Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States

Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States Introduction When it comes to Personally Identifiable Information (PII), privacy laws and regulations

More information

Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence

Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence December 6, 2012 Michael Greenberger Professor of Law Founder and Director, CHHS Legislative Proposals Maryland

More information

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. SECTION-BY-SECTION Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. Section 2. Definitions. Section 2 defines terms including commercial information technology product,

More information

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq. The HITECH Act: Implications to HIPAA Covered Entities and Business Associates Linn F. Freedman, Esq. Introduction and Overview On February 17, 2009, President Obama signed P.L. 111-05, the American Recovery

More information

SECTION-BY-SECTION ANALYSIS

SECTION-BY-SECTION ANALYSIS INTRODUCED BY CONGRESSMAN RANDY NEUGEBAUER (R-TX) AND CONGRESSMAN JOHN CARNEY (D-DE) SECTION-BY-SECTION ANALYSIS Section 1: Short Title The Data Security Act of 2015. Section 2: Purposes The purposes of

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013 Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He

More information

Tape Vaulting Audit And Encryption Usage Analysis

Tape Vaulting Audit And Encryption Usage Analysis Tape Vaulting Audit And Encryption Usage Analysis Prepared for Public Presentation (includes SB 1386, Gramm Leach Bliley, and Personal Data Protection and Security Act of 2005 Customer Information Protection

More information

Exhibit B. State-By-State Data Security Overview

Exhibit B. State-By-State Data Security Overview Exhibit B State-By-State Data Security Overview Michele A. Whitham Partner, Founding Co-Chair Security & Privacy Practice Group Foley Hoag LLP 155 Seaport Boulevard Boston, MA 02210 State Statute Citation

More information

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote

More information

One Hundred Thirteenth Congress of the United States of America

One Hundred Thirteenth Congress of the United States of America S. 2519 One Hundred Thirteenth Congress of the United States of America AT THE SECOND SESSION Begun held at the City of Washington on Friday, the third day of January, two thous fourteen An Act To codify

More information

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost 2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost With passage of HR 2622, the Fair and Accurate Credit Transactions Act, Congress significantly amended the Fair Credit

More information

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs This presentation is not meant to serve as a substitute for

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

Summary of Social Security Account Number Privacy Legislation Under Active Consideration in House and Senate (as of Sept. 5, 2007)

Summary of Social Security Account Number Privacy Legislation Under Active Consideration in House and Senate (as of Sept. 5, 2007) Summary of Social Security Account Number Privacy Legislation Under Active Consideration in House and Senate (as of Sept. 5, 2007) H.R. 3046, the Social Security Number Privacy and Identity Theft Protection

More information

Re: Big Data Request for Information

Re: Big Data Request for Information March 31, 2014 Attn: Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue NW Washington, D.C. 20502 Ladies and Gentlemen: Re: Big Data Request

More information

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule HEALTHCARE October 2009 Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule This HIPAA Update provides a detailed description of the new breach notification requirements for HIPAA

More information

Data Breach, Electronic Health Records and Healthcare Reform

Data Breach, Electronic Health Records and Healthcare Reform Data Breach, Electronic Health Records and Healthcare Reform (This presentation is for informational purposes only and it is not intended, and should not be relied upon, as legal advice.) Overview of HIPAA

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Issue Brief. Arizona State Senate IDENTITY THEFT AND CONSUMER PROTECTION INTRODUCTION IDENTITY THEFT. September 17, 2015.

Issue Brief. Arizona State Senate IDENTITY THEFT AND CONSUMER PROTECTION INTRODUCTION IDENTITY THEFT. September 17, 2015. Arizona State Senate Issue Brief September 17, 2015 Note to Reader: The Senate Research Staff provides nonpartisan, objective legislative research, policy analysis and related assistance to the members

More information

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity

More information

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998 INTERNAL REVENUE SERVICE UIL: 9999.92-00 Number: 199911041 Release Date: 3/19/1999 CTMonica January 22, 1999 MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) FROM: Barry J. Finkelstein Assistant

More information

S. 2519 AN ACT. To codify an existing operations center for cybersecurity.

S. 2519 AN ACT. To codify an existing operations center for cybersecurity. TH CONGRESS D SESSION S. 1 AN ACT To codify an existing operations center for cybersecurity. 1 Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

More information

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt

More information

DATA BREACH CHARTS (Current as of December 31, 2015)

DATA BREACH CHARTS (Current as of December 31, 2015) DATA BREACH CHARTS (Current as of December 31, 2015) The charts below provide summary information about data breach notification statutes across the country. California adopted the first data breach notification

More information

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats

More information

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:

More information

Fair and Accurate Credit Transactions Act: More Protection for Consumers

Fair and Accurate Credit Transactions Act: More Protection for Consumers Fair and Accurate Credit Transactions Act: More Protection for Consumers Businesses must heed FACTA requirements for protecting consumers credit records or face criminal or monetary consequences Stacey

More information

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its

More information

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK SECURITY AND THEFT OF DATA COVERAGE APPLICATION Name of Insurance Company to which application is made NOTICE: THIS POLICY PROVIDES CLAIMS MADE COVERAGE.

More information

Cybersecurity Issues for Community Banks

Cybersecurity Issues for Community Banks Eastern Massachusetts Compliance Network Cybersecurity Issues for Community Banks Copyright 2014 by K&L Gates LLP. All rights reserved. Sean P. Mahoney sean.mahoney@klgates.com K&L Gates LLP State Street

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference

More information

Responding to New Identity Theft Laws

Responding to New Identity Theft Laws Responding to New Identity Theft Laws March 2011 Privacy Expectations Today, there is increasing recognition that an individual has a legitimate interest in controlling the collection, use and disclosure/dissemination

More information

How To Pass Cybersecurity Legislation

How To Pass Cybersecurity Legislation Privacy & Cybersecurity Update January 14, 2015 Learn More If you have any questions regarding the matters discussed in this memorandum, please contact the attorneys listed on Page 5, or your regular Skadden

More information

January 2007. An Overview of U.S. Security Breach Statutes

January 2007. An Overview of U.S. Security Breach Statutes January 2007 An Overview of U.S. Security Breach Statutes An Overview of U.S. Security Breach Statutes Jeffrey M. Rawitz and Ryan E. Brown 1 This Jones Day White Paper summarizes what is generally entailed

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (this Agreement ), effective as of May 1, 2014 (the Effective Date ), by and between ( Covered Entity ) and Orchard Software Corporation,

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

Privacy Issues Airports

Privacy Issues Airports Privacy and Data Breaches A GROWING AIRPORT CONCERN Dominic Nessi Los Angeles World Airports Privacy in General There is none Google and other search engines, cookies Growth of on-line commerce Social

More information

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on

More information

Fair Credit Reporting Act Compliance Guide

Fair Credit Reporting Act Compliance Guide Fair Credit Reporting Act Compliance Guide FAIR CREDIT REPORTING ACT TABLE OF CONTENTS Page I. INTRODUCTION...1 A. Increased Applicant and Employee Rights...1 B. What is a "Consumer Report?"...1 C. What

More information

Signed into law on February 17, 2009, the Stimulus Package known

Signed into law on February 17, 2009, the Stimulus Package known Stimulus Package Expands HIPAA Privacy and Security and Adds Federal Data Breach Notification Law Marcy Wilder, Donna A. Boswell, and BarBara Bennett The authors discuss provisions of the Stimulus Package

More information

KRS Chapter 61. Personal Information Security and Breach Investigations

KRS Chapter 61. Personal Information Security and Breach Investigations KRS Chapter 61 Personal Information Security and Breach Investigations.931 Definitions for KRS 61.931 to 61.934. (Effective January 1, 2015).932 Personal information security and breach investigation procedures

More information

Before the FEDERAL TRADE COMMISSION Washington, DC 20580. In re Maricopa Community College District

Before the FEDERAL TRADE COMMISSION Washington, DC 20580. In re Maricopa Community College District Before the FEDERAL TRADE COMMISSION Washington, DC 20580 In the Matter of ) ) Maricopa County Community College District ) ) ) Complaint, Request for Investigation, Injunction, and Other Relief Submitted

More information

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally

More information

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010 New HIPAA Breach Notification Rule: Know Your Responsibilities Loudoun Medical Group Spring 2010 Health Information Technology for Economic and Clinical Health Act (HITECH) As part of the Recovery Act,

More information

Information Security Law: Control of Digital Assets.

Information Security Law: Control of Digital Assets. Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security

More information

Last Approval Date: May 2008. Page 1 of 12 I. PURPOSE

Last Approval Date: May 2008. Page 1 of 12 I. PURPOSE Page 1 of 12 I. PURPOSE The purpose of this policy is to comply with the requirements in Section 6032 of the Deficit Reduction Act of 2005 (the DRA ), which amends Section 1902(a) of the Social Security

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee

More information

51ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, 2013

51ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, 2013 SENATE BILL 1ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, INTRODUCED BY Joseph Cervantes 1 ENDORSED BY THE COURTS, CORRECTIONS AND JUSTICE COMMITTEE AN ACT RELATING TO CIVIL ACTIONS; CLARIFYING

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University

More information

S. ll IN THE SENATE OF THE UNITED STATES A BILL

S. ll IN THE SENATE OF THE UNITED STATES A BILL TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information

More information

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY

More information

Data security: A growing liability threat

Data security: A growing liability threat Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars

More information

BUSINESS AND COMMERCE CODE PERSONAL IDENTITY INFORMATION UNAUTHORIZED USE OF IDENTIFYING INFORMATION

BUSINESS AND COMMERCE CODE PERSONAL IDENTITY INFORMATION UNAUTHORIZED USE OF IDENTIFYING INFORMATION BUSINESS AND COMMERCE CODE TITLE 11. PERSONAL IDENTITY INFORMATION SUBTITLE B. IDENTITY THEFT CHAPTER 521. UNAUTHORIZED USE OF IDENTIFYING INFORMATION SUBCHAPTER A. GENERAL PROVISIONS Sec. 521.001.AASHORT

More information

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development 7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing

More information

New Privacy Laws Impacting the Health Care Work Place

New Privacy Laws Impacting the Health Care Work Place New Privacy Laws Impacting the Health Care Work Place Presented by Thomas E. Jeffry, Jr., Esq. Arent Fox LLP Washington, DC New York, NY Los Angeles, CA November 12 & 19, 2009 Overview 1. Overview of California

More information

Privacy Legislation and Industry Security Standards

Privacy Legislation and Industry Security Standards Privacy Legislation and Issue No. 3 01010101 01010101 01010101 Information is generated about and collected from individuals at an unprecedented rate in the ordinary course of business. In most cases,

More information

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January 2015 1

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January 2015 1 Data Breach Response Basic Principles Under U.S. State and Federal Law ABA Litigation Section Core Knowledge January 2015 1 I. Introduction Data breaches have become an unfortunate reality for many of

More information

HIPAA Privacy Breach Notification Regulations

HIPAA Privacy Breach Notification Regulations Technical Bulletin Issue 8 2009 HIPAA Privacy Breach Notification Regulations On August 24, 2009 Health and Human Services (HHS) issued interim final regulations implementing the HIPAA Privacy Breach Notification

More information

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE

More information

THE WHITE HOUSE Office of the Press Secretary

THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly

More information

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Submitted via email: cyberframework@nist.gov April 8, 2013 Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Developing a Framework

More information

Use & Disclosure of Protected Health Information by Business Associates

Use & Disclosure of Protected Health Information by Business Associates Applicability: Policy Title: Policy Number: Use & Disclosure of Protected Health Information by Business Associates PP-12 Superseded Policy(ies) or Entity Policy: N/A Date Established: January 31, 2003

More information

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015 Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas

More information

HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations

HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations Health Care Litigation Webinar Series March 22, 2012 Spence Pryor Paula Stannard Jason Popp 1 HIPAA/HITECH

More information

M E M O R A N D U M. Definitions

M E M O R A N D U M. Definitions M E M O R A N D U M DATE: November 10, 2011 TO: FROM: RE: Krevolin & Horst, LLC HIPAA Obligations of Business Associates In connection with the launch of your hosted application service focused on practice

More information

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the retail sector of the Fortune 1000.

More information

Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate

Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate Privacy, Data Security & Information Use September 16, 2010 Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate by John L. Nicholson and Meighan E. O'Reardon Effective

More information

Business Associates and HIPAA

Business Associates and HIPAA Business Associates and HIPAA What BAs need to know to comply with HIPAA privacy and security rules by Dom Nicastro White paper The lax days of complying with privacy and security laws are over for business

More information

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106

More information

Privacy Law Basics and Best Practices

Privacy Law Basics and Best Practices Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?

More information