S IN THE SENATE OF THE UNITED STATES
|
|
|
- Moses Fitzgerald
- 9 years ago
- Views:
Transcription
1 II TH CONGRESS ST SESSION S. To require certain entities that collect and maintain personal information of individuals to secure such information and to provide notice to such individuals in the case of a breach of security involving such information, and for other purposes. IN THE SENATE OF THE UNITED STATES JUNE, Mr. TOOMEY (for himself, Mr. KING, Mr. THUNE, Mr. HELLER, Mr. BLUNT, Mr. RUBIO, Mr. COATS, and Mr. ROBERTS) introduced the following bill; which was read twice and referred to the Committee on Commerce, Science, and Transportation A BILL To require certain entities that collect and maintain personal information of individuals to secure such information and to provide notice to such individuals in the case of a breach of security involving such information, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION. SHORT TITLE. This Act may be cited as the Data Security and smartinez on DSKTPTVNPROD with BILLS Breach Notification Act of. VerDate Mar 0: Jun, Jkt 00 PO Frm 0000 Fmt Sfmt E:\BILLS\S.IS S
2 S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 0000 Fmt Sfmt E:\BILLS\S.IS S SEC.. REQUIREMENTS FOR INFORMATION SECURITY. Each covered entity shall take reasonable measures to protect and secure data in electronic form containing personal information. SEC.. NOTIFICATION OF INFORMATION SECURITY BREACH. (a) NOTIFICATION. () IN GENERAL. A covered entity that owns or licenses data in electronic form containing personal information shall give notice of any breach of security following discovery by the covered entity of the breach of security to each individual who is a citizen or resident of the United States whose personal information was or that the covered entity reasonably believes to have been accessed and acquired by an unauthorized person and that the covered entity reasonably believes has caused or will cause identity theft or other actual financial harm. () LAW ENFORCEMENT. A covered entity shall notify the Secret Service or the Federal Bureau of Investigation of the fact that a breach of security has occurred if the number of individuals whose personal information the covered entity reasonably believes to have been accessed and acquired by an unauthorized person exceeds,000. (b) SPECIAL NOTIFICATION REQUIREMENTS.
3 S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 0000 Fmt Sfmt E:\BILLS\S.IS S () THIRD-PARTY AGENTS. (A) IN GENERAL. In the event of a breach of security of a system maintained by a third-party entity that has been contracted to maintain, store, or process data in electronic form containing personal information on behalf of a covered entity who owns or possesses such data, such third-party entity shall notify such covered entity of the breach of security. (B) COVERED ENTITIES WHO RECEIVE NO- TICE FROM THIRD PARTIES. Upon receiving notification from a third party under subparagraph (A), a covered entity shall provide notification as required under subsection (a). (C) EXCEPTION FOR SERVICE PRO- VIDERS. A service provider shall not be considered a third-party agent for purposes of this paragraph. () SERVICE PROVIDERS. (A) IN GENERAL. If a service provider becomes aware of a breach of security involving data in electronic form containing personal information that is owned or possessed by a covered entity that connects to or uses a system or network provided by the service provider for the
4 purpose of transmitting, routing, or providing intermediate or transient storage of such data, such service provider shall notify the covered entity who initiated such connection, trans- mission, routing, or storage if such covered en- tity can be reasonably identified. (B) COVERED ENTITIES WHO RECEIVE NO- TICE FROM SERVICE PROVIDERS. Upon receiv- ing notification from a service provider under subparagraph (A), a covered entity shall provide notification as required under subsection (a). (c) TIMELINESS OF NOTIFICATION. () IN GENERAL. Unless subject to a delay authorized under paragraph (), a notification required under subsection (a) with respect to a breach of security shall be made as expeditiously as practicable and without unreasonable delay. () REASONABLE DELAY. For purposes of paragraph (), a delay for the purpose of allowing the covered entity time to determine the scope of the breach of security, to identify individuals affected by the breach of security, and to restore the reasonable integrity of the data system that was breached, shall be considered reasonable. S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 0000 Fmt Sfmt E:\BILLS\S.IS S
5 S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 0000 Fmt Sfmt E:\BILLS\S.IS S () DELAY OF NOTIFICATION AUTHORIZED FOR LAW ENFORCEMENT OR NATIONAL SECURITY PUR- POSES. (A) LAW ENFORCEMENT. If a Federal law enforcement agency determines that the notification required under subsection (a) would interfere with a civil or criminal investigation, such notification shall be delayed upon the written request of the law enforcement agency for any period which the law enforcement agency determines is reasonably necessary. A law enforcement agency may, by a subsequent written request, revoke such delay or extend the period set forth in the original request made under this subparagraph by a subsequent request if further delay is necessary. (B) NATIONAL SECURITY. If a Federal national security agency or homeland security agency determines that the notification required under this section would threaten national or homeland security, such notification may be delayed upon the written request of the national security agency or homeland security agency for any period which the national security agency or homeland security agency determines is rea-
6 sonably necessary. A Federal national security agency or homeland security agency may revoke such delay or extend the period set forth in the original request made under this subparagraph by a subsequent written request if further delay is necessary. (d) METHOD AND CONTENT OF NOTIFICATION. () DIRECT NOTIFICATION. (A) METHOD OF NOTIFICATION. A covered entity required to provide notification to an individual under subsection (a) shall be in compliance with such requirement if the covered entity provides such notice by one of the following methods: (i) Written notification, sent to the postal address of the individual in the records of the covered entity. (ii) Telephone. (iii) or other electronic means. (B) CONTENT OF NOTIFICATION. Regard- less of the method by which notification is provided to an individual under subparagraph (A) with respect to a breach of security, such notification, to the extent practicable, shall include S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 0000 Fmt Sfmt E:\BILLS\S.IS S
7 (i) the date, estimated date, or esti- mated date range of the breach of security; (ii) a description of the personal infor- mation that was accessed and acquired, or reasonably believed to have been accessed and acquired, by an unauthorized person as a part of the breach of security; and (iii) information that the individual can use to contact the covered entity to in- quire about (I) the breach of security; or (II) the personal information the covered entity maintained about that individual. () SUBSTITUTE NOTIFICATION. (A) CIRCUMSTANCES GIVING RISE TO SUB- STITUTE NOTIFICATION. A covered entity required to provide notification to an individual under subsection (a) may provide substitute notification in lieu of the direct notification required by paragraph () if such direct notification is not feasible due to (i) excessive cost to the covered entity required to provide such notification rel- S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 0000 Fmt Sfmt E:\BILLS\S.IS S
8 ative to the resources of such covered enti- ty; or (ii) lack of sufficient contact informa- tion for the individual required to be noti- fied. (B) FORM OF SUBSTITUTE NOTIFICA- TION. Such substitute notification shall include at least one of the following: (i) A conspicuous notice on the Internet website of the covered entity (if such covered entity maintains such a website). (ii) Notification in print and to broadcast media, including major media in metropolitan and rural areas where the individuals whose personal information was acquired reside. (e) TREATMENT OF PERSONS GOVERNED BY OTHER FEDERAL LAW. Except as provided in section (b), a covered entity who is in compliance with any other Federal law that requires such covered entity to provide notification to individuals following a breach of security shall be deemed to be in compliance with this section. SEC.. APPLICATION AND ENFORCEMENT. (a) GENERAL APPLICATION. The requirements of sections and apply to S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 0000 Fmt Sfmt E:\BILLS\S.IS S
9 () those persons, partnerships, or corporations over which the Commission has authority pursuant to section (a)() of the Federal Trade Commission Act ( U.S.C. (a)()); and () notwithstanding section (a)() of the Fed- eral Trade Commission Act ( U.S.C. (a)()), common carriers subject to the Communications Act of ( U.S.C. et seq.). (b) APPLICATION TO CABLE OPERATORS, SATELLITE OPERATORS, AND TELECOMMUNICATIONS CARRIERS. Sections,, and of the Communications Act of ( U.S.C.,, and ), and any regulations promulgated thereunder, shall not apply with respect to the information security practices, including practices relating to the notification of unauthorized access to data in electronic form, of any covered entity otherwise subject to those sections. (c) ENFORCEMENT BY FEDERAL TRADE COMMIS- SION. () UNFAIR OR DECEPTIVE ACTS OR PRAC- TICES. A violation of section or shall be treated as an unfair or deceptive act or practice in violation of a regulation under section (a)()(b) of the Federal Trade Commission Act ( U.S.C. S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 0000 Fmt Sfmt E:\BILLS\S.IS S
10 a(a)()(b)) regarding unfair or deceptive acts or practices. () POWERS OF COMMISSION. (A) IN GENERAL. Except as provided in subsection (a), the Commission shall enforce this Act in the same manner, by the same means, and with the same jurisdiction, powers, and duties as though all applicable terms and provisions of the Federal Trade Commission Act ( U.S.C. et seq.) were incorporated into and made a part of this Act. (B) PRIVILEGES AND IMMUNITIES. Any person who violates section or shall be subject to the penalties and entitled to the privileges and immunities provided in such Act. () MAXIMUM TOTAL LIABILITY. Notwithstanding the number of actions which may be brought against a covered entity under this subsection, the maximum civil penalty for which any covered entity may be liable under this subsection for all actions shall not exceed (A) $00,000 for all violations of section resulting from the same related act or omission; and S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 000 Fmt Sfmt E:\BILLS\S.IS S
11 (B) $00,000 for all violations of section resulting from a single breach of security. (d) NO PRIVATE CAUSE OF ACTION. Nothing in this Act shall be construed to establish a private cause of action against a person for a violation of this Act. SEC.. DEFINITIONS. In this Act: () BREACH OF SECURITY. The term breach of security means unauthorized access and acquisition of data in electronic form containing personal information. () COMMISSION. The term Commission means the Federal Trade Commission. () COVERED ENTITY. (A) IN GENERAL. The term covered entity means a sole proprietorship, partnership, corporation, trust, estate, cooperative, association, or other commercial entity that acquires, maintains, stores, or utilizes personal information. (B) EXEMPTIONS. The term covered entity does not include the following: (i) Financial institutions subject to title V of the Gramm-Leach-Bliley Act ( U.S.C. 0 et seq.). S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 000 Fmt Sfmt E:\BILLS\S.IS S
12 (ii) An entity covered by the regula- tions issued under section (c) of the Health Insurance Portability and Account- ability Act of (Public Law ) to the extent that such entity is subject to the requirements of such regulations with respect to protected health information. () DATA IN ELECTRONIC FORM. The term data in electronic form means any data stored electronically or digitally on any computer system or other database and includes recordable tapes and other mass storage devices. () PERSONAL INFORMATION. (A) IN GENERAL. The term personal information means an individual s first name or first initial and last name in combination with any or more of the following data elements for that individual: (i) Social Security number. (ii) Driver s license number, passport number, military identification number, or other similar number issued on a government document used to verify identity. (iii) Financial account number or credit or debit card number, in combina- S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 000 Fmt Sfmt E:\BILLS\S.IS S
13 tion with any required security code, access code, or password that is necessary to per- mit access to an individual s financial ac- count. (B) EXCLUSIONS. (i) PUBLIC RECORD INFORMATION. Personal information does not include information obtained about an individual which has been lawfully made publicly available by a Federal, State, or local government entity or widely distributed by media. (ii) ENCRYPTED, REDACTED, OR SE- CURED DATA. Personal information does not include information that is encrypted, redacted, or secured by any other method or technology that removes elements that personally identify an individual or that otherwise renders the information unusable. () SERVICE PROVIDER. The term service provider means an entity that provides electronic data transmission, routing, intermediate, and transient storage, or connections to its system or network, where such entity providing such services does S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 000 Fmt Sfmt E:\BILLS\S.IS S
14 not select or modify the content of the electronic data, is not the sender or the intended recipient of the data, and does not differentiate personal information from other information that such entity transmits, routes, stores, or for which such entity provides connections. Any such entity shall be treated as a service provider under this Act only to the extent that it is engaged in the provision of such transmission, routing, intermediate and transient storage, or connections. SEC.. EFFECT ON OTHER LAWS. This Act preempts any law, rule, regulation, requirement, standard, or other provision having the force and effect of law of any State, or political subdivision of a State, relating to the protection or security of data in electronic form containing personal information or the notification of a breach of security. SEC.. EFFECTIVE DATE. This Act shall take effect on the date that is year after the date of enactment of this Act. Æ smartinez on DSKTPTVNPROD with BILLS S IS VerDate Mar 0: Jun, Jkt 00 PO Frm 000 Fmt Sfmt 0 E:\BILLS\S.IS S
SECTION-BY-SECTION ANALYSIS
INTRODUCED BY CONGRESSMAN RANDY NEUGEBAUER (R-TX) AND CONGRESSMAN JOHN CARNEY (D-DE) SECTION-BY-SECTION ANALYSIS Section 1: Short Title The Data Security Act of 2015. Section 2: Purposes The purposes of
H. R. 5402 IN THE HOUSE OF REPRESENTATIVES
I 11TH CONGRESS D SESSION H. R. 0 To amend the Clayton Act and the Federal Trade Commission Act to provide that the Federal Trade Commission shall exercise authority with respect to mergers only under
H. R. ll IN THE HOUSE OF REPRESENTATIVES A BILL
F:\BJY\SEC\INSIDER\HIMES_0C.XML TH CONGRESS ST SESSION... (Original Signature of Member) H. R. ll To amend the Securities Exchange Act of to prohibit certain securities trading and related communications
Internal Revenue Code Amending Bill Introduced
II TH CONGRESS ST SESSION S. To amend the Internal Revenue Code of to permit the Secretary of the Treasury and the Commissioner of the Social Security Administration to disclose certain return information
NATIONAL CYBERSECURITY PROTECTION ACT OF 2014
PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128
How To Codify A Cybersecurity Operations Center
II 11TH CONGRESS D SESSION S. 19 To codify an existing operations center for cybersecurity. IN THE SENATE OF THE UNITED STATES JUNE, 01 Mr. CARPER (for himself and Mr. COBURN) introduced the following
2005 -- H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.
00 -- H 11 SUBSTITUTE A AS AMENDED LC0/SUB A/ STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 00 A N A C T RELATING TO IDENTITY THEFT PROTECTION Introduced By: Representatives Gemma, Sullivan,
S. 1903. To provide greater fee disclosures for consumers who have prepaid cards, and for other purposes. IN THE SENATE OF THE UNITED STATES
II 11TH CONGRESS D SESSION S. 190 To provide greater fee disclosures for consumers who have prepaid cards, and for other purposes. IN THE SENATE OF THE UNITED STATES JANUARY 9, 01 Mr. WARNER introduced
Suspend the Rules and Pass the Bill, H.R. 1123, with an Amendment. (The amendment strikes all after the enacting clause and inserts a new text)
F:\SLS\SUS\H_SUS.XML Suspend the Rules and Pass the Bill, H.R., with an Amendment (The amendment strikes all after the enacting clause and inserts a new text) TH CONGRESS D SESSION H. R. To promote consumer
TITLE I 911 SERVICES AND IP ENABLED VOICE SERVICE PROVIDERS
122 STAT. 2620 PUBLIC LAW 110 283 JULY 23, 2008 July 23, 2008 [H.R. 3403] New and Emerging Technologies 911 Improvement Act of 2008. 47 USC 609 note. Public Law 110 283 110th Congress An Act To promote
S. 217 IN THE SENATE OF THE UNITED STATES
II 11TH CONGRESS 1ST SESSION S. 7 To amend the National Labor Relations Act to ensure the right of employees to a secret ballot election conducted by the National Labor Relations Board. IN THE SENATE OF
H. R. ll IN THE HOUSE OF REPRESENTATIVES A BILL
F:\M\BARLET\BARLET_0.XML TH CONGRESS ST SESSION... (Original Signature of Member) H. R. ll To amend the Homeland Security Act of 00 to enhance the partnership between the Department of Homeland Security
S. 1977 IN THE SENATE OF THE UNITED STATES
II TH CONGRESS ST SESSION S. To provide family members and close associates of an individual who they fear is a danger to himself, herself, or others new tools to prevent gun violence. IN THE SENATE OF
H. R. 1383 [Report No. 112 81]
IB Union Calendar No. 42 112TH CONGRESS 1ST SESSION H. R. 1383 [Report No. 112 81] To temporarily preserve higher rates for tuition and fees for programs of education at non-public institutions of higher
S. 1063. [Report No. 109 211] To promote and enhance public safety and to encourage the rapid deployment of IP-enabled voice services.
II TH CONGRESS 1ST SESSION S. Calendar No. [Report No. ] To promote and enhance public safety and to encourage the rapid deployment of IP-enabled voice services. IN THE SENATE OF THE UNITED STATES MAY
TITLE I STANDARDS DEVELOPMENT ORGANIZATION ADVANCEMENT ACT OF 2004
118 STAT. 661 Public Law 108 237 108th Congress An Act To encourage the development and promulgation of voluntary consensus standards by providing relief under the antitrust laws to standards development
S. ll IN THE SENATE OF THE UNITED STATES A BILL
TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
January 2007. An Overview of U.S. Security Breach Statutes
January 2007 An Overview of U.S. Security Breach Statutes An Overview of U.S. Security Breach Statutes Jeffrey M. Rawitz and Ryan E. Brown 1 This Jones Day White Paper summarizes what is generally entailed
DATA BREACH CHARTS (Current as of December 31, 2015)
DATA BREACH CHARTS (Current as of December 31, 2015) The charts below provide summary information about data breach notification statutes across the country. California adopted the first data breach notification
2015 -- S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D
0 -- S 01 SUBSTITUTE B LC000/SUB B/ S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 0 A N A C T RELATING TO CRIMINAL OFFENSES - IDENTITY THEFT PROTECTION Introduced By: Senators
S. 2282 IN THE SENATE OF THE UNITED STATES
II TH CONGRESS ST SESSION S. To amend the Public Health Service Act to reauthorize the C.W. Bill Young Cell Transplantation Program and the National Cord Blood Inventory, and for other purposes. IN THE
H. R. 6135. To increase transparency and reduce students burdens related to transferring credits between institutions of higher education.
I 1TH CONGRESS 2D SESSION H. R. 1 To increase transparency and reduce students burdens related to transferring credits between institutions of higher education. IN THE HOUSE OF REPRESENTATIVES JULY 17,
H. R. 2418. To promote and enhance public safety and to encourage the rapid deployment of IP-enabled voice services. IN THE HOUSE OF REPRESENTATIVES
I TH CONGRESS 1ST SESSION H. R. 1 To promote and enhance public safety and to encourage the rapid deployment of IP-enabled voice services. IN THE HOUSE OF REPRESENTATIVES MAY 1, 00 Mr. GORDON (for himself,
Michie's Legal Resources. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence Act of 1999. [Acts 1999, ch. 201, 2.
http://www.michie.com/tennessee/lpext.dll/tncode/12ebe/13cdb/1402c/1402e?f=templates&... Page 1 of 1 47-18-2101. Short title. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence
H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
S. 611. [Report No. 114 346] IN THE HOUSE OF REPRESENTATIVES. JUNE 10, 2015 Referred to the Committee on Energy and Commerce
ID 114TH CONGRESS 1ST SESSION S. 611 Union Calendar No. 264 [Report No. 114 346] IN THE HOUSE OF REPRESENTATIVES JUNE 10, 2015 Referred to the Committee on Energy and Commerce NOVEMBER 19, 2015 Committed
KRS Chapter 61. Personal Information Security and Breach Investigations
KRS Chapter 61 Personal Information Security and Breach Investigations.931 Definitions for KRS 61.931 to 61.934. (Effective January 1, 2015).932 Personal information security and breach investigation procedures
H. R. ll IN THE HOUSE OF REPRESENTATIVES A BILL
F:\M\MCCAUL\MCCAUL_0.XML TH CONGRESS ST SESSION... (Original Signature of Member) H. R. ll To amend the Homeland Security Act of 00 to enhance multi-directional sharing of information related to cybersecurity
S. 2847 IN THE SENATE OF THE UNITED STATES
II 0TH CONGRESS D SESSION S. To amend the Federal Home Loan Bank Act to allow Federal home loan banks to invest surplus funds in student loan securities and make advances for student loan financing, and
H. R. 2739 IN THE HOUSE OF REPRESENTATIVES A BILL
I TH CONGRESS ST SESSION H. R. To amend the Public Health Service Act to require group and individual health insurance coverage and group health plans to provide for coverage of oral anticancer drugs on
S. 607. [Report No. 113 lll] To improve the provisions relating to the privacy of electronic communications. IN THE SENATE OF THE UNITED STATES
II TH CONGRESS ST SESSION S. 0 Calendar No. ll [Report No. lll] To improve the provisions relating to the privacy of electronic communications. IN THE SENATE OF THE UNITED STATES MARCH, Mr. LEAHY (for
Legislative Language. Law Enforcement Provisions Related to Computer Security
Legislative Language Law Enforcement Provisions Related to Computer Security Part 1: Specific Criminalization of Damaging Critical Infrastructure Computers Title 18, United States Code, is amended to add
How To Clarify The Disclosure Of Information From Prohibited Personnel Practices
PUBLIC LAW 112 199 NOV. 27, 2012 126 STAT. 1465 Public Law 112 199 112th Congress An Act To amend chapter 23 of title 5, United States Code, to clarify the disclosures of information protected from prohibited
S. 2244 IN THE SENATE OF THE UNITED STATES
II TH CONGRESS D SESSION S. Calendar No. To extend the termination date of the Terrorism Insurance Program established under the Terrorism Risk Insurance Act of 00, and for other purposes. IN THE SENATE
Public Law 108 330 108th Congress An Act
PUBLIC LAW 108 330 OCT. 16, 2004 118 STAT. 1275 Public Law 108 330 108th Congress An Act To amend title 31, United States Code, to improve the financial accountability requirements applicable to the Department
2d Session 109 489 TRUTH IN CALLER ID ACT OF 2006
109TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 109 489 TRUTH IN CALLER ID ACT OF 2006 JUNE 6, 2006. Committed to the Committee of the Whole House on the State of the Union and ordered to
[DISCUSSION DRAFT] H. R. ll. To provide for the streamlining and acceleration of the historical
1TH CONGRESS 1ST SESSION [DISCUSSION DRAFT] H. R. ll To provide for the streamlining and acceleration of the historical review of broadband facilities and for the streamlining and acceleration of the preparation
H. R. 4348. To increase transparency and reduce students burdens related to transferring credits between institutions of higher education.
I TH CONGRESS D SESSION H. R. To increase transparency and reduce students burdens related to transferring credits between institutions of higher education. IN THE HOUSE OF REPRESENTATIVES APRIL, 0 Mr.
Comparison of US State and Federal Security Breach Notification Laws. Current through August 26, 2015
Comparison of US State and Federal Security Breach Notification Laws Current through August 26, 2015 Alaska...2 Arizona...6 Arkansas...9 California...11 Colorado...19 Connecticut...21 Delaware...26 District
H. R. 6663 IN THE HOUSE OF REPRESENTATIVES
I 0TH CONGRESS D SESSION H. R. To amend title 1, United States Code, to provide additional clarification with regard to the implementation of the Unlawful Internet Gambling Enforcement Act of 00, and for
CLASS ACTION FAIRNESS ACT OF 2005
PUBLIC LAW 109 2 FEB. 18, 2005 CLASS ACTION FAIRNESS ACT OF 2005 VerDate 14-DEC-2004 04:23 Mar 05, 2005 Jkt 039139 PO 00002 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL002.109 BILLW PsN: PUBL002 119 STAT.
