Proposed Personal Data Notification & Protection Act

Forty-seven U.S. states, three U.S. territories, D.C., and New York City have their own data breach notification laws. In January 2015, President Obama proposed the Personal Data Notification and Protection Act with the intention of creating a uniform national standard for data breach notification. A key feature of the bill is its preemption clause, which ensures uniformity by overriding existing laws in the states, territories and cities that currently possess them.

This interactive feature shows the components of these existing state and territorial and city laws that are stricter than the proposed bill and would still be overridden by the preemption clause.

For a rigorous analysis of the proposed bill relative to the existing system, see Study: Examining the President’s Proposed National Data Breach Notification Standard Against Existing Legislation.

About this guide

Select a state, city or territory on the below map to see the components of its current law that are stricter than the corresponding components of the proposed uniform standard.

Note: A listed component is not necessarily the full text of that provision in the current law; likewise, the absence of a component does not necessarily indicate that the region lacks such a provision, only that the provision—if the region has it—is not stricter than that of the President’s proposed standard.

Also, the territories and cities are listed at the top and are not clickable on the map.

Proposed Uniform Standard

Definition of Covered Entity

Any business entity engaged in or affecting interstate commerce that uses, accesses, transmits, stores, disposes of or collects sensitive personally identifiable information about more than 10,000 individuals during any 12-month period.

Excludes entities covered by the HITECH Act.

Definition of Security Breach

Compromise of computerized data that results in or may be reasonably concluded to have resulted in an unauthorized acquisition of sensitive personally identifiable information or access to sensitive personally identifiable information that is for an unauthorized purpose or in excess of authorization.

Definition of Personal Information

Sensitive Personally Identifiable Information (SPII): any information in electronic or digital form that includes:

  1. an individual’s first and last name or first initial and last name in combination with any two of the following data elements:
    • home address or telephone number;
    • Mother’s maiden name;
    • month, day, and year of birth;
  2. a non-truncated social security number, driver’s license number, passport number, or alien registration number or other government-issued unique identification number;
  3. unique biometric data;
  4. a unique account identifier, including a financial account number or credit or debit card number, electronic identification number, user name, or routing code;
  5. a user name or electronic mail address, in combination with a password or security question and answer that would permit access to an online account; or
  6. any combination of the following data elements:
    • an individual’s first and last name or first initial and last name;
    • a unique account identifier, including a financial account number or credit or debit card number, electronic identification number, user name, or routing code; or
    • any security code, access code, or password, or source code that could be used to generate such codes or passwords.

Timing of Notification to Individuals

Notification shall be made without unreasonable delay, not exceeding 30 days, unless necessary for law enforcement or with an extension granted by the FTC of up to 30 days.

If a business entity requires additional time, it shall provide the FTC with records or other evidence of the reasons necessitating delay.

Terms of (Encryption) Safe Harbor

A business entity is exempted from notice requirements if a risk assessment concludes that there is no reasonable risk of harm to the affected individuals.

Encryption: If the data at issue was rendered unusable, unreadable or indecipherable through an industry standard security technology or methodology, then no harm is presumed unless facts demonstrate that technology was also compromised.

Risk assessment must be submitted to FTC within 30 days.

Allowable Methods of Notice

  1. INDIVIDUAL NOTICE — Notice to individuals by one of the following means:
    • written notification to the last known home mailing address of the individual in the records of the business entity;
    • telephone notice to the individual personally;
    • e-mail notice, if the individual has consented to receive such notice.
  2. MEDIA NOTICE — If the number of affected residents of a State exceeds 5,000, notice to media reasonably calculated to reach them.

Required Content of Notice

Regardless of the method of notification, notice shall include, to the extent possible:

  1. a description of the categories of SPII that was breached;
  2. a toll-free number to contact the business entity or its representative and to learn what types of SPII the entity maintained about that individual;
  3. the toll-free contact telephone numbers and addresses for the major credit reporting
  4. agencies and the FTC;
  5. identification of the business entity that has a direct business relationship with the individual;
  6. any information regarding victim protection assistance as provided for by that State (this is the exemption to the bill's preemption clause).

Required Coordination with Credit Reporting Agencies (CRAs)

If notification is required to more than 5,000 individuals, the business entity shall also notify all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis within 30 days (and prior to the notices of affected individuals if doing so will not delay notice to invidividuals), unless granted an extension by law enforcement or the FTC.

Notice to CRAs shall include the timing and distribution of the breach notifications to affected individuals.

Obligations to Data Owner

The breached entity is required to notify affected individuals even if it does not own or license the data. Any covered entity that does not own or license the data affected by a breach shall notify the data owner or licensee that a breach has occured following the discovery of the breach unless there is no reasonable risk of harm or fraud. An entity obliged to give notice shall be relieved of such obligation if the owner/licensee or other designated third party provides the required notification. Contractual agreements redistributing the notification obligation are permitted.

Notice to Law Enforcement

Notify an entity designated by DHS to receive reports and information about security incidents, threats and vulnerabilities "as promptly as possible"—within 72 hours before notifying individuals or 10 days after the discovery of the incident, whichever is sooner.

Enforcement Provisions

FTC: rulemaking authority and enforcement authority under Section 5.

State Attorneys General: civil actions with penalties of not more than $1000 per day per affected individual up to $1m per violation unless found to be willful or intentional; must notify U.S. Attorney General and FTC.

Definition of Covered Entity

Proposed Uniform Standard

Any business entity engaged in or affecting interstate commerce that uses, accesses, transmits, stores, disposes of or collects sensitive personally identifiable information about more than 10,000 individuals during any 12-month period.

Excludes entities covered by the HITECH Act.

Current Law

Definition of covered entity contains no record minimum.

Definition of Security Breach

Proposed Uniform Standard

Compromise of computerized data that results in or may be reasonably concluded to have resulted in an unauthorized acquisition of sensitive personally identifiable information or access to sensitive personally identifiable information that is for an unauthorized purpose or in excess of authorization.

Current Law

Definition of Security Breach extends to breach of information in any form (e.g. paper or electronic).

Definition of Security Breach includes breach of computerized data transferred to another format.

Definition of Personal Information

Proposed Uniform Standard

Sensitive Personally Identifiable Information (SPII): any information in electronic or digital form that includes:

  1. an individual’s first and last name or first initial and last name in combination with any two of the following data elements:
    • home address or telephone number;
    • Mother’s maiden name;
    • month, day, and year of birth;
  2. a non-truncated social security number, driver’s license number, passport number, or alien registration number or other government-issued unique identification number;
  3. unique biometric data;
  4. a unique account identifier, including a financial account number or credit or debit card number, electronic identification number, user name, or routing code;
  5. a user name or electronic mail address, in combination with a password or security question and answer that would permit access to an online account; or
  6. any combination of the following data elements:
    • an individual’s first and last name or first initial and last name;
    • a unique account identifier, including a financial account number or credit or debit card number, electronic identification number, user name, or routing code; or
    • any security code, access code, or password, or source code that could be used to generate such codes or passwords.

Current Law

Medical information is considered personal information.

Medical information and health insurance information are considered personal information.

Health information is considered personal information.

Medical history and health insurance information are considered personal information.

A health insurance number is considered personal information.

An electronic signature is considered personal information.

Medical information, health insurance information, a birth/death/marriage certificate, and an electronic signature are considered personal information.

A DNA profile is considered personal information.

Medical information and work-related evaluations are considered personal information.

Timing of Notification to Individuals

Proposed Uniform Standard

Notification shall be made without unreasonable delay, not exceeding 30 days, unless necessary for law enforcement or with an extension granted by the FTC of up to 30 days.

If a business entity requires additional time, it shall provide the FTC with records or other evidence of the reasons necessitating delay.

Current Law

Department of Legal Affairs may grant a one-time 15-day extension.

Notification may be delayed until 20 days after law enforcement determines notice will no longer impede investigation or jeopardize national security.

Notification shall be made no more than 7 days after law enforcement determines delay is unnecessary/no longer necessary.

Within a non-extendable term of 10 days after the discovery of the incident, entity must notify Dep. Consumer Affairs, which shall make a public announcement within 24 hours of receipt.

Terms of (Encryption) Safe Harbor

Proposed Uniform Standard

A business entity is exempted from notice requirements if a risk assessment concludes that there is no reasonable risk of harm to the affected individuals.

Encryption: If the data at issue was rendered unusable, unreadable or indecipherable through an industry standard security technology or methodology, then no harm is presumed unless facts demonstrate that technology was also compromised.

Risk assessment must be submitted to FTC within 30 days.

Current Law

A company must retain its risk assessment documentation for five years.

Required Content of Notice

Proposed Uniform Standard

Regardless of the method of notification, notice shall include, to the extent possible:

  1. a description of the categories of SPII that was breached;
  2. a toll-free number to contact the business entity or its representative and to learn what types of SPII the entity maintained about that individual;
  3. the toll-free contact telephone numbers and addresses for the major credit reporting
  4. agencies and the FTC;
  5. identification of the business entity that has a direct business relationship with the individual;
  6. any information regarding victim protection assistance as provided for by that State (this is the exemption to the bill's preemption clause).

Current Law

Notice must include a general description of the incident; the timing of the incident, and whether notice was delayed for law enforcement purposes.

Notice must include a description of the incident in general terms; the general acts of the business or government agency to protect the personal information from further unauthorized access, and advice that directs the person to remain vigilant by reviewing account statements and monitoring free credit reports.

Notice must include a description of the incident and its approximate date and advice to report suspected identity theft to local law enforcement or state AG.

Notice must include consumer's right to obtain a police report and how to request a security freeze.

Notice must include a general description of the breach; a general description of what has been done to protect against future breaches, and a reminder to remain vigilant against identity theft and fraud.

Notice must include general description of incident and approximate date.

Notice must include a general description of incident and any acts performed by the entity to protect information from future breaches.

Notice must include general description of incident; approximate date of breach, and advice to report suspected ID theft to law enforcement.

Notice must include, if known to the entity, a general description of the inicident and approximate date; a general description of actions taken to prevent future breaches, and advice to remain vigilent.

Notice must include general description of the incident; actions taken to prevent future breaches, and advice to remain vigilent.

Required Coordination with Credit Reporting Agencies (CRAs)

Proposed Uniform Standard

If notification is required to more than 5,000 individuals, the business entity shall also notify all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis within 30 days (and prior to the notices of affected individuals if doing so will not delay notice to invidividuals), unless granted an extension by law enforcement or the FTC.

Notice to CRAs shall include the timing and distribution of the breach notifications to affected individuals.

Current Law

Coordination with CRAs applies when notification is required to more than 1,000 state residents.

Coordination with CRAs applies when notification is required to more than 1,000 individuals.

CRAs must also receive notice about the content of individual notification.

Coordination with CRAs applies when notification is required to more than 1,000 individuals.

CRAs must also receive notice about the date of the breach and an estimate of the number of affected individuals.

Coordination with CRAs applies when notification is required to more than 500 individuals. Notification to CRAs must be within 48 hours of notifying individuals.

CRAs must also receive notice about the content of individual notification.

Obligations to Data Owner

Proposed Uniform Standard

The breached entity is required to notify affected individuals even if it does not own or license the data. Any covered entity that does not own or license the data affected by a breach shall notify the data owner or licensee that a breach has occured following the discovery of the breach unless there is no reasonable risk of harm or fraud. An entity obliged to give notice shall be relieved of such obligation if the owner/licensee or other designated third party provides the required notification. Contractual agreements redistributing the notification obligation are permitted.

Current Law

Breached entity must provide notice to data owner within 10 days of discovery of breach.

Breached entity must notify data owner within 24 hours of discovery of breach.

Contractors of state agencies must notify contracting agency within 72 hours of discovery.

Enforcement Provisions

Proposed Uniform Standard

FTC: rulemaking authority and enforcement authority under Section 5.

State Attorneys General: civil actions with penalties of not more than $1000 per day per affected individual up to $1m per violation unless found to be willful or intentional; must notify U.S. Attorney General and FTC.

Current Law

Current law offers a private right of action.

Current law provides that if MA AG finds violation of consumer protection laws, MA consumers may seek damages under Chapter 93A.

Current law offers a private right of action for actual damages.

Current law offers a private right of action in case of actual injury.

State can order compensation for consumers.