Not yet a Member?
HR Magazine is highlighting the next generation of HR leaders.
Is your employee handbook ready for the New Year? With SHRM’s Employee Handbook Builder get peace of mind that your handbook is up-to-date.
Get the HR education you need without travel expenses or time out of the office.
Join us in Chicago for the latest trends and technology in talent management, and what to expect in the future.
With over 680 security breaches reported so far in 2016, more employers are being forced to confront the issue of how to respond to a breach.
All states except Alabama, North Dakota and New Mexico now require notification when information commonly maintained by employers, such as Social Security numbers and driver's license numbers, is compromised.
While many of these breach notification laws were initially modeled after California's pioneering 2002 breach notification statute, more and more states are amending their notice laws in different ways, increasing the complexity of security incident response for multistate employers.
Following on amendments by eight states in 2015 (California, Montana, North Dakota, Oregon, Rhode Island, Washington, Connecticut and Nevada.), four states—Illinois, Tennessee, California and Nebraska—reinforced their data breach notification statutes in 2016.
For employers, the net impact of these amendments is an increased number of circumstances in which they must inform employees, customers or other state residents whose personal information has been compromised (and in some cases the state's attorney general) of a data breach.
The following insight highlights the key amendments to these laws in Illinois, Tennessee, California and Nebraska, of which employers should be aware.
Breach of Encrypted Information Can Now Trigger Notification Obligation
Tennessee now requires notification of a breach within 45 days, even if the compromised personal information is encrypted.
In March, Tennessee made its data breach notification law the strictest in the country by requiring Tennessee residents to be informed of a data breach, regardless of whether the compromised information is encrypted. Effective July 1, the Tennessee Code now defines a breach as any "unauthorized acquisition of computerized data that materially compromises the security, confidentiality, or integrity of personal information maintained by the information holder."
Personal information is defined as an individual's first name or first initial and last name, in combination with the individual's:
Prior to this amendment, Tennessee, like all other states with data breach laws, required notification of a data breach only if the compromised personal information was unencrypted.
Tennessee is now the only state in the country that requires notification of a breach of encrypted personal information.
Tennessee coupled this expansion of the notification obligation with a reduction in the period of time in which a Tennessee resident must be informed of a breach. The state now requires notification within 45 days from the discovery of the breach or notification by a service provider that it has discovered a breach. This 45-day period can be tolled to enable law enforcement to complete a criminal investigation.
Lastly, the amendments to the Tennessee Code clarified that its notification requirement encompasses situations where an employee who may have authority to receive or obtain personal information intentionally uses the personal information for an unlawful purpose.
Illinois, California and Nebraska require notification of a breach if the encryption key is disclosed in the breach.
Without going as far as Tennessee, Illinois, California and Nebraska also enacted amendments to their data breach notification laws that limit the ability to avoid notification because the compromised personal information was encrypted or redacted.
Under these states' amended laws, if encrypted or redacted personal information is breached, notification is still required if information needed to unencrypt or unredact the personal information is acquired with the encrypted personal information.
All of these states define "personal information" to include, among other things, an individual's SSN, driver's license number, and information that would permit access to the individual's financial account. This situation could arise, for example, if a hacker obtains a decryption key along with an encrypted file containing personal information.
Illinois and Nebraska Expand Categories of Trigger Data
Illinois and Nebraska join California, Florida, Nevada and Wyoming in deeming login credentials to be personal information, the compromise of which triggers breach notification obligations (trigger data).
In June, Illinois enacted several amendments to its data breach notification law, titled the Personal Information Protection Act (PIPA). Set to take effect on January 1, 2017, the amended version of PIPA expands the categories of trigger data to include:
The amendments to PIPA provide that an entity that suffers a breach involving an Illinois resident's log-in credentials can notify the Illinois resident of the breach in electronic form.
The notice must direct the individual to "promptly change his or her user name or password and security question or answer."
The amendments to Nebraska's data notification statute, titled the Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006, which took effect in July, similarly expands the list of trigger data to include "a user name or email address, in combination with a password or security question and answer that would permit access to an online account."
Nebraska and Illinois Add Obligations to Notify the State's Attorney General
Under the amendments to the Nebraska law, where notification of a breach is required to be given to a Nebraska resident, the entity suffering the breach must also notify Nebraska's attorney general.
However, Nebraska does not require that its residents receive notice of a breach merely because trigger data is disclosed; Nebraska requires notification only when, following an investigation, the organization determines that trigger data "has been or will be used for an unauthorized purpose."
This likelihood of harm standard ensures that employers will not have to notify the Nebraska attorney general of every data security incident that occurs.
Illinois also amended PIPA to require notice to the Illinois attorney general of any data breach that impacts more than 250 Illinois residents. This notice must be provided within the sooner of 45 days of the discovery of the breach or when notification of the breach is sent to Illinois residents. The notification must detail:
Recommendations for Employers
For multistate employers in particular, the continual amendments to data breach notification laws create a complex web of obligations, several of which may need to be followed at the same time in the event of a breach.
Accordingly, employers should periodically review and, if necessary, update their security incident response plan to keep track of breach response requirements in each relevant state.
Employers also should consider doing the following:
Philip Gordon is an attorney with Litter in Denver. Jennifer Mora is an attorney with Littler in Los Angeles, and Kwabena Appenteng is an attorney with Littler in Chicago. © Littler. All rights reserved. Reposted with permission.
You have successfully saved this page as a bookmark.
Please confirm that you want to proceed with deleting bookmark.
You have successfully removed bookmark.
Please log in as a SHRM member before saving bookmarks.
Your session has expired. Please log in again before saving bookmarks.
Please purchase a SHRM membership before saving bookmarks.
An error has occurred
Recommended for you
HR Education in a City Near You
SHRM’s HR Vendor Directory contains over 3,200 companies