With major consumer data breaches making headlines on a semi-regular basis, legislators around the country are starting to hold businesses more accountable for cybersecurity compliance. Industry-specific laws such as HIPAA and the Gramm-Leach-Bliley Act (GLBA) already establish federal data security standards for some companies, and the Federal Trade Commission has taken the position that failure to have reasonable security measures is a violation of the FTC Act (see our DataPoints post here).
From Massachusetts to New Mexico, a handful of state legislatures also have enacted laws that impose data security obligations on companies as part of their identity theft statutes (see, for example, our DataPoints post here). The trend is growing, and North Carolina and South Carolina are the most recent states to signal their intent to jump on the bandwagon, although in very different ways.
North Carolina’s Act to Strengthen Identity Theft Protections
In North Carolina, the state House of Representatives appropriations committee chairman of information technology, Representative Jason Saine (R-Lincoln), and Attorney General Josh Stein (D) have proposed legislation that would enhance companies’ data protection duties and impose severe penalties for violations. While draft legislation is yet to be introduced, Rep. Saine and Attorney General Stein have published a fact sheet highlighting their proposals for a new Act to Strengthen Identity Theft Protections (ASITP).
Although it is short, the fact sheet contains several proposals that should be of concern to companies that collect consumer information in North Carolina. For example:
- The ASITP would broaden the definition of a data security breach to include attacks where personal information is not necessarily acquired (such as ransomware attacks).
- Companies would be required to give notice of a data breach to consumers and the attorney general within 15 days from discovery of the breach, one of the most aggressive notice periods in the country.
- Businesses would have to “implement and maintain reasonable security procedures and practices – appropriate to the nature of the personal information” they own or license.
- Significantly, a company’s failure to have reasonable security measures would constitute, like failure to adhere to the other provisions of the North Carolina Data Breach statute, a violation of North Carolina’s Unfair and Deceptive Trade Practices Act (UDTPA), which includes provisions for recovery of treble damages by private litigants and fines by the government.
We think it is unlikely that the 15-day notice period will survive, although a longer specific period may replace it. Unfortunately, other problems will remain. Without clear guidance on what constitutes a “reasonable” and “appropriate” security measure, businesses in North Carolina will face serious questions regarding the scope of their obligations. Additionally, with the UDTPA’s private-right-of-action provisions, companies could presumably face consumer class action litigation in the event they fall short of their newly imposed data security responsibilities. While the success of any potential class action claims would obviously depend on the scope and nature of any alleged violations, simply facing a class action lawsuit can have significant financial consequences.
South Carolina’s Insurance Data Security Act
In South Carolina, state Senate banking and insurance committee chairman, Senator Ronnie Cromer (R-Newberry) introduced Senate Bill 856, Insurance Data Security Act, on January 9, 2018. Unlike the legislation under consideration in North Carolina, which would potentially apply to all businesses, the bill that is currently in committee in the South Carolina Senate applies only to licensed insurance companies and brokers.
Currently, insurance companies and brokers in the state are already subject to the GLBA’s data security requirements. Based on model legislation from the National Association of Insurance Commissioners (NAIC), the pending bill would replace the GLBA requirements. With respect to data security measures, the proposed legislation raises some of the same concerns as Rep. Saine and Attorney General Stein’s proposal in North Carolina. For example, the bill’s main operative provision states:
“A licensee must develop, implement, and maintain a comprehensive written information security program based on the licensee's risk assessment that contains administrative, technical, and physical safeguards for the protection of nonpublic information and the licensee's information system. The program must be commensurate with the size and complexity of the licensee, the nature and scope of the licensee's activities including its use of third-party service providers, and the sensitivity of the nonpublic information used by the licensee or in the licensee's possession, custody, or control.”
However, unlike the proposed North Carolina legislation, the South Carolina bill has detailed provisions for what data security protections are to be included in the covered entity’s program. In addition, while many companies in North Carolina will need to figure out the scope of and how to implement compliant data security requirements under the proposed ASITP, insurance companies in South Carolina have been subject to similar GLBA data security requirements for years and will have the benefit of NAIC guidance.
We will be monitoring these legislative proposals for further developments. If you have questions about your company’s current data security obligations or the potential implications of any pending legislation, you can contact any member of our Privacy & Data Security practice group for more information.
About Data Points: Privacy & Data Security Blog
The technology and regulatory landscape is rapidly changing, thus impacting the manner in which companies across all industries operate, specifically in the ways they collect, use and secure confidential data. We provide transparent and cutting-edge insight on critical issues and dynamics. Our team informs business decision-makers about the information they must protect, and what to do if/when security is breached.