<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" public-private="public">
	<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>113 S1193 IS: Data Security and Breach Notification Act of 2013</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2013-06-20</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
		<distribution-code display="yes">II</distribution-code>
		<congress>113th CONGRESS</congress>
		<session>1st Session</session>
		<legis-num>S. 1193</legis-num>
		<current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber>
		<action>
			<action-date date="20130620">June 20, 2013</action-date>
			<action-desc><sponsor name-id="S351">Mr. Toomey</sponsor> (for himself,
			 <cosponsor name-id="S363">Mr. King</cosponsor>, <cosponsor name-id="S303">Mr.
			 Thune</cosponsor>, <cosponsor name-id="S352">Mr. Heller</cosponsor>,
			 <cosponsor name-id="S342">Mr. Blunt</cosponsor>, <cosponsor name-id="S350">Mr.
			 Rubio</cosponsor>, <cosponsor name-id="S212">Mr. Coats</cosponsor>, and
			 <cosponsor name-id="S260">Mr. Roberts</cosponsor>) introduced the following
			 bill; which was read twice and referred to the
			 <committee-name committee-id="SSCM00">Committee on Commerce, Science, and
			 Transportation</committee-name></action-desc>
		</action>
		<legis-type>A BILL</legis-type>
		<official-title>To require certain entities that collect and maintain
		  personal information of individuals to secure such information and to provide
		  notice to such individuals in the case of a breach of security involving such
		  information, and for other purposes.</official-title>
	</form>
	<legis-body>
		<section id="S1" section-type="section-one"><enum>1.</enum><header>Short
			 title</header><text display-inline="no-display-inline">This Act may be cited as
			 the <quote><short-title>Data Security and Breach
			 Notification Act of 2013</short-title></quote>.</text>
		</section><section id="id980792aa546941ed9f08b557c026ed0f"><enum>2.</enum><header>Requirements for
			 information security</header><text display-inline="no-display-inline">Each
			 covered entity shall take reasonable measures to protect and secure data in
			 electronic form containing personal information.</text>
		</section><section id="idf761a890744b4e25bebec5eb38c3ab39"><enum>3.</enum><header>Notification of
			 information security breach</header>
			<subsection id="id020ce2183df94dfeb7a45707cdb4cb3d"><enum>(a)</enum><header>Notification</header>
				<paragraph id="id06a6deaca3c241a4985e645d7b4563b2"><enum>(1)</enum><header>In
			 general</header><text>A covered entity that owns or licenses data in electronic
			 form containing personal information shall give notice of any breach of
			 security following discovery by the covered entity of the breach of security to
			 each individual who is a citizen or resident of the United States whose
			 personal information was or that the covered entity reasonably believes to have
			 been accessed and acquired by an unauthorized person and that the covered
			 entity reasonably believes has caused or will cause identity theft or other
			 actual financial harm.</text>
				</paragraph><paragraph id="id94509db776ab4f70a4a2383d06bff95a"><enum>(2)</enum><header>Law
			 enforcement</header><text>A covered entity shall notify the Secret Service or
			 the Federal Bureau of Investigation of the fact that a breach of security has
			 occurred if the number of individuals whose personal information the covered
			 entity reasonably believes to have been accessed and acquired by an
			 unauthorized person exceeds 10,000.</text>
				</paragraph></subsection><subsection id="id279a8bd4beec41c98ff9d191dc317cc8"><enum>(b)</enum><header>Special
			 notification requirements</header>
				<paragraph id="id36a560151a4345d1b2473b41e5e35a45"><enum>(1)</enum><header>Third-party
			 agents</header>
					<subparagraph id="id1DF245020C71488397A127E2853235E5"><enum>(A)</enum><header>In
			 general</header><text>In the event of a breach of security of a system
			 maintained by a third-party entity that has been contracted to maintain, store,
			 or process data in electronic form containing personal information on behalf of
			 a covered entity who owns or possesses such data, such third-party entity shall
			 notify such covered entity of the breach of security.</text>
					</subparagraph><subparagraph id="idCB87451CD2024C959348C36B68EAE0F1"><enum>(B)</enum><header>Covered
			 entities who receive notice from third parties</header><text>Upon receiving
			 notification from a third party under subparagraph (A), a covered entity shall
			 provide notification as required under subsection (a).</text>
					</subparagraph><subparagraph id="id04868FEA5B0E4ABDA743686EDCEBEBA5"><enum>(C)</enum><header>Exception for
			 service providers</header><text>A service provider shall not be considered a
			 third-party agent for purposes of this paragraph.</text>
					</subparagraph></paragraph><paragraph id="idec75bdd5d1494eb6ba95f028ebe15a7f"><enum>(2)</enum><header>Service
			 providers</header>
					<subparagraph id="idC84F95C91DCA46B7A209E207D119F365"><enum>(A)</enum><header>In
			 general</header><text>If a service provider becomes aware of a breach of
			 security involving data in electronic form containing personal information that
			 is owned or possessed by a covered entity that connects to or uses a system or
			 network provided by the service provider for the purpose of transmitting,
			 routing, or providing intermediate or transient storage of such data, such
			 service provider shall notify the covered entity who initiated such connection,
			 transmission, routing, or storage if such covered entity can be reasonably
			 identified.</text>
					</subparagraph><subparagraph id="id417D0E2337954A7AB5B2171EA2AE4539"><enum>(B)</enum><header>Covered
			 entities who receive notice from service providers</header><text>Upon receiving
			 notification from a service provider under subparagraph (A), a covered entity
			 shall provide notification as required under subsection (a).</text>
					</subparagraph></paragraph></subsection><subsection id="ideb505cdcda8d44d2a61e24aba6afc47d"><enum>(c)</enum><header>Timeliness of
			 notification</header>
				<paragraph id="id1379e188517544f09758e32d175b6936"><enum>(1)</enum><header>In
			 general</header><text>Unless subject to a delay authorized under paragraph (3),
			 a notification required under subsection (a) with respect to a breach of
			 security shall be made as expeditiously as practicable and without unreasonable
			 delay.</text>
				</paragraph><paragraph id="idAD1535B2AA1142B890EA086CC81A2115"><enum>(2)</enum><header>Reasonable
			 delay</header><text>For purposes of paragraph (1), a delay for the purpose of
			 allowing the covered entity time to determine the scope of the breach of
			 security, to identify individuals affected by the breach of security, and to
			 restore the reasonable integrity of the data system that was breached, shall be
			 considered reasonable.</text>
				</paragraph><paragraph id="idf5e4e7fe9eaa4cf88eed5b409502f02a"><enum>(3)</enum><header>Delay of
			 notification authorized for law enforcement or national security
			 purposes</header>
					<subparagraph id="id3bac7849ed394f4288ec380ef689a6d6"><enum>(A)</enum><header>Law
			 enforcement</header><text>If a Federal law enforcement agency determines that
			 the notification required under subsection (a) would interfere with a civil or
			 criminal investigation, such notification shall be delayed upon the written
			 request of the law enforcement agency for any period which the law enforcement
			 agency determines is reasonably necessary. A law enforcement agency may, by a
			 subsequent written request, revoke such delay or extend the period set forth in
			 the original request made under this subparagraph by a subsequent request if
			 further delay is necessary.</text>
					</subparagraph><subparagraph id="id7467998b661b4ea09b1087b4db1d59ba"><enum>(B)</enum><header>National
			 security</header><text>If a Federal national security agency or homeland
			 security agency determines that the notification required under this section
			 would threaten national or homeland security, such notification may be delayed
			 upon the written request of the national security agency or homeland security
			 agency for any period which the national security agency or homeland security
			 agency determines is reasonably necessary. A Federal national security agency
			 or homeland security agency may revoke such delay or extend the period set
			 forth in the original request made under this subparagraph by a subsequent
			 written request if further delay is necessary.</text>
					</subparagraph></paragraph></subsection><subsection id="idf10a22b11e3046c782b10541436b5275"><enum>(d)</enum><header>Method and
			 content of notification</header>
				<paragraph id="id87ef701c0c63476da7402bedc8fd9e48"><enum>(1)</enum><header>Direct
			 notification</header>
					<subparagraph id="id982f9d89cf8d44cf99dfbda99918b0d8"><enum>(A)</enum><header>Method of
			 notification</header><text>A covered entity required to provide notification to
			 an individual under subsection (a) shall be in compliance with such requirement
			 if the covered entity provides such notice by one of the following
			 methods:</text>
						<clause id="id62484cedb831466f9d48e9c9ed66c33c"><enum>(i)</enum><text>Written
			 notification, sent to the postal address of the individual in the records of
			 the covered entity.</text>
						</clause><clause id="id469666edbf1b44de86f44a8de870838d"><enum>(ii)</enum><text>Telephone.</text>
						</clause><clause id="ida68259f6ecd749da92f00cae116763ce"><enum>(iii)</enum><text>Email or other
			 electronic means.</text>
						</clause></subparagraph><subparagraph id="id52725c4188714234833eb3d863882287"><enum>(B)</enum><header>Content of
			 notification</header><text>Regardless of the method by which notification is
			 provided to an individual under subparagraph (A) with respect to a breach of
			 security, such notification, to the extent practicable, shall include—</text>
						<clause id="idc6db4384ee6546fbafec041922bbafae"><enum>(i)</enum><text>the
			 date, estimated date, or estimated date range of the breach of security;</text>
						</clause><clause id="id8f1cbf13c0754666a119c182f5ac7536"><enum>(ii)</enum><text>a
			 description of the personal information that was accessed and acquired, or
			 reasonably believed to have been accessed and acquired, by an unauthorized
			 person as a part of the breach of security; and</text>
						</clause><clause id="idee6ff5765c954aca917dc8f48efb5025"><enum>(iii)</enum><text>information
			 that the individual can use to contact the covered entity to inquire
			 about—</text>
							<subclause id="idD99D271DB2234AE6AA27A8C08584C637"><enum>(I)</enum><text>the breach of
			 security; or</text>
							</subclause><subclause id="idC57E109F32D84D63BFC89222723D0B49"><enum>(II)</enum><text>the personal
			 information the covered entity maintained about that individual.</text>
							</subclause></clause></subparagraph></paragraph><paragraph id="id5463c666922740f6b125be2dc3627e22"><enum>(2)</enum><header>Substitute
			 notification</header>
					<subparagraph id="id5d50e61c7ff54cc1a8da695fb2b9d771"><enum>(A)</enum><header>Circumstances
			 giving rise to substitute notification</header><text>A covered entity required
			 to provide notification to an individual under subsection (a) may provide
			 substitute notification in lieu of the direct notification required by
			 paragraph (1) if such direct notification is not feasible due to—</text>
						<clause id="id3cb6719c4d1743df8ac96c93d2f6397e"><enum>(i)</enum><text>excessive cost to
			 the covered entity required to provide such notification relative to the
			 resources of such covered entity; or</text>
						</clause><clause id="idb0777a233e1f4d14b8ceda8553dd5534"><enum>(ii)</enum><text>lack of
			 sufficient contact information for the individual required to be
			 notified.</text>
						</clause></subparagraph><subparagraph id="id8fca0bd168484d9e8042a646868cae55"><enum>(B)</enum><header>Form of
			 substitute notification</header><text>Such substitute notification shall
			 include at least one of the following:</text>
						<clause id="id1ff8036c5b124e2291876e1cd8534195"><enum>(i)</enum><text>A
			 conspicuous notice on the Internet website of the covered entity (if such
			 covered entity maintains such a website).</text>
						</clause><clause id="id00f85bd6709641d3b377cfbcd48301e9"><enum>(ii)</enum><text>Notification in
			 print and to broadcast media, including major media in metropolitan and rural
			 areas where the individuals whose personal information was acquired
			 reside.</text>
						</clause></subparagraph></paragraph></subsection><subsection id="id1ef7d76c717f419c8eff4ddb26b542a2"><enum>(e)</enum><header>Treatment of
			 persons governed by other Federal law</header><text>Except as provided in
			 section 4(b), a covered entity who is in compliance with any other Federal law
			 that requires such covered entity to provide notification to individuals
			 following a breach of security shall be deemed to be in compliance with this
			 section.</text>
			</subsection></section><section id="id6389e1e542a34509bafe6d0998ab88a7"><enum>4.</enum><header>Application and
			 enforcement</header>
			<subsection id="idf2235ea53e76401cb9b417aaa2d1d77c"><enum>(a)</enum><header>General
			 application</header><text>The requirements of sections 2 and 3 apply to—</text>
				<paragraph id="id4f6416778b124e8f881673acbf7f9d71"><enum>(1)</enum><text>those persons,
			 partnerships, or corporations over which the Commission has authority pursuant
			 to section 5(a)(2) of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/45">15 U.S.C. 45(a)(2)</external-xref>);
			 and</text>
				</paragraph><paragraph id="iddb9094ed890b40c8982194ef9ddb35ba"><enum>(2)</enum><text>notwithstanding
			 section 5(a)(2) of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/45">15 U.S.C. 45(a)(2)</external-xref>),
			 common carriers subject to the Communications Act of 1934 (47 U.S.C. 151 et
			 seq.).</text>
				</paragraph></subsection><subsection id="id348fc39cb5b5405cbd2391bf68371f5e"><enum>(b)</enum><header>Application to
			 cable operators, satellite operators, and telecommunications
			 carriers</header><text>Sections 222, 338, and 631 of the Communications Act of
			 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/222">47 U.S.C. 222</external-xref>, 338, and 551), and any regulations promulgated thereunder,
			 shall not apply with respect to the information security practices, including
			 practices relating to the notification of unauthorized access to data in
			 electronic form, of any covered entity otherwise subject to those
			 sections.</text>
			</subsection><subsection id="id1ab212c93f0d4499918516d50375c165"><enum>(c)</enum><header>Enforcement by
			 Federal Trade Commission</header>
				<paragraph id="id6e363d25d1f44816929ad41437aa9028"><enum>(1)</enum><header>Unfair or
			 deceptive acts or practices</header><text>A violation of section 2 or 3 shall
			 be treated as an unfair or deceptive act or practice in violation of a
			 regulation under section 18(a)(1)(B) of the Federal Trade Commission Act (15
			 U.S.C. 57a(a)(1)(B)) regarding unfair or deceptive acts or practices.</text>
				</paragraph><paragraph id="id61b2c733e0f54b66b2f4ea9f19ad6b55"><enum>(2)</enum><header>Powers of
			 commission</header>
					<subparagraph id="id1FEFF68B6E8D4EB9AE7A2E6222517AB6"><enum>(A)</enum><header>In
			 general</header><text>Except as provided in subsection (a), the Commission
			 shall enforce this Act in the same manner, by the same means, and with the same
			 jurisdiction, powers, and duties as though all applicable terms and provisions
			 of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41 et seq.</external-xref>) were incorporated
			 into and made a part of this Act.</text>
					</subparagraph><subparagraph id="idC5114D5766B24B1292E4877CF41A0B35"><enum>(B)</enum><header>Privileges and
			 immunities</header><text>Any person who violates section 2 or 3 shall be
			 subject to the penalties and entitled to the privileges and immunities provided
			 in such Act.</text>
					</subparagraph></paragraph><paragraph id="id56dd4b4acc37405592e1b20baf2a36fe"><enum>(3)</enum><header>Maximum total
			 liability</header><text>Notwithstanding the number of actions which may be
			 brought against a covered entity under this subsection, the maximum civil
			 penalty for which any covered entity may be liable under this subsection for
			 all actions shall not exceed—</text>
					<subparagraph id="idaa85fb5e4e2d46ca9787ee80bb6de661"><enum>(A)</enum><text>$500,000 for all
			 violations of section 2 resulting from the same related act or omission;
			 and</text>
					</subparagraph><subparagraph id="idab8ae24052df427180b5542b22bbb2ba"><enum>(B)</enum><text>$500,000 for all
			 violations of section 3 resulting from a single breach of security.</text>
					</subparagraph></paragraph></subsection><subsection id="iddab6f3ad0b284071a7fed1dba66c1c8f"><enum>(d)</enum><header>No private
			 cause of action</header><text>Nothing in this Act shall be construed to
			 establish a private cause of action against a person for a violation of this
			 Act.</text>
			</subsection></section><section id="id98592eabe0b84899bed3e5ff4e1515bc"><enum>5.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text>
			<paragraph id="idd4cdeb9afe284ab6bb500afbf9b1ec96"><enum>(1)</enum><header>Breach of
			 security</header><text>The term <term>breach of security</term> means
			 unauthorized access and acquisition of data in electronic form containing
			 personal information.</text>
			</paragraph><paragraph id="id73118e991ac54ed3802469eef6c3e11f"><enum>(2)</enum><header>Commission</header><text>The
			 term <term>Commission</term> means the Federal Trade Commission.</text>
			</paragraph><paragraph id="id07fd8f77fb234d33a8106f1025a0d1e7"><enum>(3)</enum><header>Covered
			 entity</header>
				<subparagraph id="idBC1CD8D0D622498D92350F78D8D6EB46"><enum>(A)</enum><header>In
			 general</header><text>The term <term>covered entity</term> means a sole
			 proprietorship, partnership, corporation, trust, estate, cooperative,
			 association, or other commercial entity that acquires, maintains, stores, or
			 utilizes personal information.</text>
				</subparagraph><subparagraph id="id7e8595a5af124adaab9e9249a9e38d42"><enum>(B)</enum><header>Exemptions</header><text>The
			 term <term>covered entity</term> does not include the following:</text>
					<clause id="id490b290f529541b3aac819a1a4149445"><enum>(i)</enum><text>Financial
			 institutions subject to title V of the Gramm-Leach-Bliley Act (15 U.S.C. 6801
			 et seq.).</text>
					</clause><clause id="id48aa687d5d63427b8bccf97e5c634516"><enum>(ii)</enum><text>An
			 entity covered by the regulations issued under section 264(c) of the Health
			 Insurance Portability and Accountability Act of 1996 (<external-xref legal-doc="public-law" parsable-cite="pl/104/191">Public Law 104–191</external-xref>) to
			 the extent that such entity is subject to the requirements of such regulations
			 with respect to protected health information.</text>
					</clause></subparagraph></paragraph><paragraph id="id561d8ab2b5e349d28510633bcc27a4e9"><enum>(4)</enum><header>Data in
			 electronic form</header><text>The term <term>data in electronic form</term>
			 means any data stored electronically or digitally on any computer system or
			 other database and includes recordable tapes and other mass storage
			 devices.</text>
			</paragraph><paragraph id="idcacd6e8de597496bb353229816078881"><enum>(5)</enum><header>Personal
			 information</header>
				<subparagraph id="id89383797b4c64f0395d13de517a5b11d"><enum>(A)</enum><header>In
			 general</header><text>The term <term>personal information</term> means an
			 individual's first name or first initial and last name in combination with any
			 1 or more of the following data elements for that individual:</text>
					<clause id="ida8ecf22e45714083b9cec15bb3a4dba5"><enum>(i)</enum><text>Social Security
			 number.</text>
					</clause><clause id="id084d8f71bac44076b6dced9d83bacb36"><enum>(ii)</enum><text>Driver’s license
			 number, passport number, military identification number, or other similar
			 number issued on a government document used to verify identity.</text>
					</clause><clause id="id60917b887b354f9297faa07f8d90c9c4"><enum>(iii)</enum><text>Financial
			 account number or credit or debit card number, in combination with any required
			 security code, access code, or password that is necessary to permit access to
			 an individual’s financial account.</text>
					</clause></subparagraph><subparagraph id="idd18683c840ac42719e2c71717b2e0096"><enum>(B)</enum><header>Exclusions</header>
					<clause id="id1663483BD9FC488CAE12CCB7DAA7E0D6"><enum>(i)</enum><header>public record
			 information</header><text>Personal information does not include information
			 obtained about an individual which has been lawfully made publicly available by
			 a Federal, State, or local government entity or widely distributed by
			 media.</text>
					</clause><clause id="id5CD371CA8A9D4EB2A755F225CEF27C0A"><enum>(ii)</enum><header>Encrypted,
			 redacted, or secured data</header><text>Personal information does not include
			 information that is encrypted, redacted, or secured by any other method or
			 technology that removes elements that personally identify an individual or that
			 otherwise renders the information unusable.</text>
					</clause></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id3934c4cd121047489c05552fe86eef6a"><enum>(6)</enum><header>Service
			 provider</header><text>The term <term>service provider</term> means an entity
			 that provides electronic data transmission, routing, intermediate, and
			 transient storage, or connections to its system or network, where such entity
			 providing such services does not select or modify the content of the electronic
			 data, is not the sender or the intended recipient of the data, and does not
			 differentiate personal information from other information that such entity
			 transmits, routes, stores, or for which such entity provides connections. Any
			 such entity shall be treated as a service provider under this Act only to the
			 extent that it is engaged in the provision of such transmission, routing,
			 intermediate and transient storage, or connections.</text>
			</paragraph></section><section id="id3b4cf26b3f314132a5a01eba538b8479"><enum>6.</enum><header>Effect on other
			 laws</header><text display-inline="no-display-inline">This Act preempts any
			 law, rule, regulation, requirement, standard, or other provision having the
			 force and effect of law of any State, or political subdivision of a State,
			 relating to the protection or security of data in electronic form containing
			 personal information or the notification of a breach of security.</text>
		</section><section id="idd151fa99f89f4069ae9dd132b9fd6dcc"><enum>7.</enum><header>Effective
			 date</header><text display-inline="no-display-inline">This Act shall take
			 effect on the date that is 1 year after the date of enactment of this
			 Act.</text>
		</section></legis-body>
</bill>


