<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; State Law</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/state-law/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Data breaches – to prepare or not to prepare? The answer is simple.</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/#comments</comments>
		<pubDate>Tue, 17 May 2011 16:00:22 +0000</pubDate>
		<dc:creator>pluehr</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[State Law]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=566</guid>
		<description><![CDATA[All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F17%2Fdata-breaches-%25e2%2580%2593-to-prepare-or-not-to-prepare-the-answer-is-simple%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,healthcare+data+breach,HITECH+Act,PHI,PII,State+Law&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em>Our guest blogger this week is</em><em> Paul Luehr, Managing Director, General Counsel, <a href="http://www.strozfriedberg.com/professionals/xprProfessionalDetails1.aspx?xpST=ProfessionalDetail&amp;professional=11" rel="”nofollow” nofollow" target="_blank" class="broken_link">Stroz Friedberg, LLC</a> -</em> <em>a global digital risk management and investigations firm</em><em>.</em><em></em></p>
<p>All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan. Healthcare institutions especially should heed the call for an incident response plan because it provides the best preventive medicine to minimize financial and reputational risks.  So <strong>PLAN</strong>, keeping in mind:  <strong><span style="text-decoration: underline;">P</span></strong>eople, the <strong><span style="text-decoration: underline;">L</span></strong>aw, and <strong><span style="text-decoration: underline;">A</span></strong>ction, with <strong><span style="text-decoration: underline;">N</span></strong>o time to waste.</p>
<p><strong><span style="text-decoration: underline;">P</span></strong>eople – Define the responsibilities of a coordinated incident response team. Don’t act alone. A good response team should include key internal players (In-house Counsel, IT, Compliance/Security, HR and Public Relations), as well as outside experts who confront data breaches on a regular basis (trusted Attorneys, Forensic Analysts and Fraud Monitors). These external experts can help restore key business functions, preserve crucial forensic evidence, strengthen data security, address victims’ needs, and communicate effectively with regulators and the public.</p>
<p><strong><span style="text-decoration: underline;">L</span></strong>aw – Track fast-changing data breach laws, privacy regulations, and notification mandates <em>before</em> a breach should occur.  This can help your organization identify protected health or personally identifiable information (PHI/PII which may trigger liability), navigate the HITECH Act and state law, understand reporting timelines, and effectively reach select constituents (i.e. Health and Human Services, victims, law enforcement and/or the media).</p>
<p><strong><span style="text-decoration: underline;">A</span></strong>ction – Outline clear action items to accomplish within the first seventy-two hours. One early misstep can destroy crucial evidence, delay an effective response, and trigger government penalties or class-action lawsuits.</p>
<p><strong><span style="text-decoration: underline;">N</span></strong>o time to waste – Remember that time is of the essence. <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">Once a breach is identified</a>, the clock starts ticking and may require immediate notice to regulators and/or notification to individual victims within 60 days.  </p>
<p>A comprehensive preparedness plan can promote extraordinary efficiencies when a breach threatens a healthcare entity. So, <strong>create your PLAN now.</strong></p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Download the free Data Breach Response Guide by Experian!" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_051711_article ">Download your free Data Breach Response Guide!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/&via=Experian_DBR&text=Data breaches – to prepare or not to prepare? The answer is simple.&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data security law in 2011:  States remain the center of attention</title>
		<link>http://www.experian.com/blogs/data-breach/2011/02/17/data-security-law-in-2011-states-remain-the-center-of-attention/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/02/17/data-security-law-in-2011-states-remain-the-center-of-attention/#comments</comments>
		<pubDate>Thu, 17 Feb 2011 17:53:12 +0000</pubDate>
		<dc:creator>cwolf</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[cyber-risk insurance]]></category>
		<category><![CDATA[data breach law]]></category>
		<category><![CDATA[data security law]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[State Law]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=309</guid>
		<description><![CDATA[While state laws requiring “reasonable” data security have had a positive impact, data breach notification laws have had the most profound effect on the improvement of data security.  These laws have motivated companies – through negative incentives – to improve data security to avoid publicity, embarrassment, and the risk of notification. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F02%2F17%2Fdata-security-law-in-2011-states-remain-the-center-of-attention%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber-risk+insurance,data+breach+law,data+security+law,Identity+Theft,State+Law&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em>Our guest blogger this week is Chris Wolf, practice director at Hogan Lovells and co-chair of the <a rel="nofollow" href="http://www.futureofprivacy.org/2008/10/16/about-christopher-wolf/" target="_blank" class="broken_link">Future of Privacy Forum</a>.</em></p>
<p><em>Join us on Thursday, February 24th for a live webinar with panelists, Chris Wolf and Reed Freeman discussing  <a title="Webinar Registration Page" href="http://www.bulldogsolutions.net/ExperianDataBreach/EXT1006/frmRegistration.aspx?bdls=26904" target="_blank" class="broken_link" rel="nofollow">State Legislation Past &amp; Present: The Effects on Data Breach Notification and Resolution</a>.</em></p>
<p>While the talk of 2011 may be the possibility of Congressional action on a privacy bill and/or a single, preemptive federal data security law, states enter the year as the primary enforcer of data security laws in the U.S.   While state laws requiring “reasonable” data security have had a positive impact, data breach notification laws have had the most profound effect on the improvement of data security.  These laws have motivated companies – through negative incentives – to improve data security to avoid publicity, embarrassment, and the risk of notification.  State involvement in data breaches also has extended to the medical space, as states <a href="http://www.healthleadersmedia.com/content/TEC-248748/State-AGs-Stepping-Up-HITECH-Enforcement" class="broken_link" rel="nofollow">have begun to enforce the HITECH Act</a>.</p>
<p>A handful of other states enacted passed data security laws in 2010.  Mississippi became the 46<sup>th</sup> state (plus DC, Puerto Rico, and the Virgin Islands) <a href="http://www.esecurityplanet.com/trends/article.php/3876906/Mississippi-Passes-Data-Breach-Notification-Law.htm" class="broken_link" rel="nofollow">to adopt a breach notification law</a>, leaving Alabama, Kentucky, New Mexico, and South Dakota as the remaining hold-outs.  In a victory for banks, Washington <a href="http://www.insurancejournal.com/news/west/2010/04/08/108868.htm" class="broken_link" rel="nofollow">passed a law</a> that permits financial institutions recoup card reissuing costs from companies and processors whose negligence causes a breach.  The biggest data security law news of 2010, however, may very well have been the comprehensive <a href="http://www.mass.gov/Eoca/docs/idtheft/201CMR1700reg.pdf" class="broken_link" rel="nofollow">Massachusetts data security standards</a>.  These standards, which became effective last March, require any entity that maintains information on a Massachusetts resident to implement a comprehensive written information security program.  Though we have not yet seen any enforcement, the state may wish to make a splash in 2011.</p>
<p>This past year also saw individuals continue to bring lawsuits under state law alleging non-identity-theft-related damages resulting from breaches, despite the lack of success of these suits in the past.  In two cases, the Ninth Circuit, though ruling against the plaintiffs, opened the door for breach victims to sue in federal court and suggested that damages could potentially be found under California due to costs expended on credit monitoring.  In more traditional holdings, the Maine Supreme Court held time spent to prevent future harm is not sufficient to show damages, and an Oregon appellate court held that potential future damages were insufficient to support a negligence class claim for breach of medical data.</p>
<p>With the proliferation of breach laws and their extension to health data, cyber-risk insurance – which generally covers the cost of a data breach and eases compliance burdens – is becoming more popular.  This insurance coverage, however, has extended past the breach context.  For example, Allied World Assurance, a provider of property, casualty, and specialty insurance and reinsurance solutions, has <a href="http://regulatoryandrisk.insurance-business-review.com/news/allied-world-forms-risk-management-alliance-with-hogan-lovells-us-120111" class="broken_link" rel="nofollow">entered into a risk management alliance</a> with my firm, Hogan Lovells, to (among other things) provide breach planning and proactive legal representation to companies looking to avoid data breaches.</p>
<p>Over the past year, state data security laws have driven most of the data security compliance obligations of U.S. companies, and will continue to do so into 2011.  To stay up-to-date on the latest news on compliance obligations under state privacy and data security law, visit and subscribe to our blog at <a href="http://www.hldataprotection.com/" class="broken_link" rel="nofollow">www.hldataprotection.com</a>.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/02/17/data-security-law-in-2011-states-remain-the-center-of-attention/&via=Experian_DBR&text=Data security law in 2011:  States remain the center of attention&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/02/17/data-security-law-in-2011-states-remain-the-center-of-attention/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Helpful tips on data breach notification</title>
		<link>http://www.experian.com/blogs/data-breach/2011/01/04/helpful-tips-on-data-breach-notification/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/01/04/helpful-tips-on-data-breach-notification/#comments</comments>
		<pubDate>Tue, 04 Jan 2011 16:56:17 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Congress]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Notification Law]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[State Law]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=254</guid>
		<description><![CDATA[When a data breach occurs it is important to understand the breach notification laws in your State and what you have to do to abide by them. After contacting your legal counsel, the next stop you can make is the National Conference of State Legislatures which maintains a list of enacted and proposed security breach [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F01%2F04%2Fhelpful-tips-on-data-breach-notification%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Congress,Data+Breach+Notification,Federal+Trade+Commission,Identity+Theft,Notification+Law,Security+Breaches,State+Law&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>When a data breach occurs it is important to understand the breach notification laws in your State and what you have to do to abide by them. After contacting your legal counsel, the next stop you can make is the <a title="National Conference of State Legislatures" href="http://en.wikipedia.org/wiki/National_Conference_of_State_Legislatures" class="broken_link" rel="nofollow">National Conference of State Legislatures</a> which maintains a list of enacted and proposed security breach notification laws.</p>
<p>In general, most state laws follow the <a href="http://www.csoonline.com/article/221322/cso-disclosure-series-data-breach-notification-laws-state-by-state" class="broken_link" rel="nofollow">basic tenets of California&#8217;s original law</a>: Companies must immediately disclose a data breach to customers, usually in writing. California has since broadened its law to include compromised medical and health insurance information.</p>
<p>Some important considerations to these laws include, but are not limited to:</p>
<p>1.       The time allotted to inform consumers of a data breach.</p>
<p>2.       Whether or not there are penalties – civil or criminal – for a failure to disclose.</p>
<p>3.       What kinds of breaches, if any, are exempt from reporting.</p>
<p>4.       Whether or not there is <a href="http://www.securityprivacyandthelaw.com/tags/data-breach-notification-act/" class="broken_link" rel="nofollow"><em>a private right of action</em></a> – or the ability for the consumer or employee to pursue a case on their own.</p>
<p>Federal agencies, such as the Federal Trade Commission, are currently reviewing ways to better protect consumer privacy.  Their findings are likely to influence how state legislature votes on some key data breach notification and privacy acts on the floor in 2011. Some of the proposals include requirements for a reasonable effort to be made to avoid a data breach with the use of encryption, designated individuals to lead privacy departments and education throughout the organization, and data security risk assessments prior to a breach.</p>
<p>With the recession driven boom of cybercrime, identity theft and security breaches that is likely to continue to expand in 2011, Congress will probably enact some version of these proposals sooner rather than later. That being said, it is better to <a href="../../../databreach">be prepared</a> and embrace the current and proposed laws before a data breach occurs.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/01/04/helpful-tips-on-data-breach-notification/&via=Experian_DBR&text=Helpful tips on data breach notification&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F01%2F04%2Fhelpful-tips-on-data-breach-notification%2F&amp;title=Helpful%20tips%20on%20data%20breach%20notification" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/01/04/helpful-tips-on-data-breach-notification/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>