<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public">
	<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>114 S177 IS: Data Security and Breach Notification Act of 2015</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2015-01-13</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
		<distribution-code display="yes">II</distribution-code>
		<congress>114th CONGRESS</congress><session>1st Session</session>
		<legis-num>S. 177</legis-num>
		<current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber>
		<action>
			<action-date date="20150113">January 13, 2015</action-date>
			<action-desc><sponsor name-id="S282">Mr. Nelson</sponsor> introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSCM00">Committee on Commerce, Science, and Transportation</committee-name></action-desc>
		</action>
		<legis-type>A BILL</legis-type>
		<official-title>To protect consumers by requiring reasonable security policies and procedures to protect data
			 containing personal information, and to provide for nationwide notice in
			 the event of a breach of security.</official-title>
	</form>
	<legis-body>
 <section id="S1" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Data Security and Breach Notification Act of 2015</short-title></quote>.</text></section><section id="ID2F9F6095226D4F16BDE823633C022F2B"><enum>2.</enum><header>Requirements
		for information security</header><subsection id="ID8BB27423AD9841ECB467F5D1747643C2"><enum>(a)</enum><header>General
 security policies and procedures</header><paragraph id="ID3461B1F785854C4EA117FAEEF0EFB644"><enum>(1)</enum><header>Regulations</header><text>Not later than 1 year after the date of enactment of this Act, the Commission shall promulgate regulations under section 553 of title 5, United States Code, to require each covered entity that owns or possesses data containing personal information, or contracts to have any third-party entity maintain or process such data for such covered entity, to establish and implement policies and procedures regarding information security practices for the treatment and protection of personal information taking into consideration—</text><subparagraph id="ID8B8720F282C34CF5B02A13B44430452E"><enum>(A)</enum><text>the size of, and the nature, scope, and complexity of the activities engaged in by such covered entity;</text></subparagraph><subparagraph id="IDC25F9849B3BF4E7A966C6C6364A76CEE"><enum>(B)</enum><text>the current state of the art in administrative, technical, and physical safeguards for protecting such information;</text></subparagraph><subparagraph id="IDC33AF0A24249499CA965D2E368715309"><enum>(C)</enum><text>the cost of implementing the safeguards under subparagraph (B); and</text></subparagraph><subparagraph id="id0FC966564D834DFBA3E871919791769B"><enum>(D)</enum><text>the impact on small businesses and nonprofits.</text></subparagraph></paragraph><paragraph id="IDA111CFB609B647EEB007524C86FD313E"><enum>(2)</enum><header>Requirements</header><text>The regulations shall require the policies and procedures to include the following:</text><subparagraph id="IDD14A009FF20E4C298EEABE4892CF9675"><enum>(A)</enum><text>A security policy with respect to the collection, use, sale, other dissemination, and maintenance of personal information.</text></subparagraph><subparagraph id="IDF56B3B2CA22E4EB08C7D0F0F28A276D6"><enum>(B)</enum><text>The identification of an officer or other individual as the point of contact with responsibility for the management of information security.</text></subparagraph><subparagraph id="IDF492D61D9C434C51856776B6C6F99119"><enum>(C)</enum><text>A process for identifying and assessing any reasonably foreseeable vulnerabilities in each system maintained by the covered entity that contains such personal information, including regular monitoring for a breach of security of each such system.</text></subparagraph><subparagraph id="ID8F2A44B305DD42E3A596B5DF70369958"><enum>(D)</enum><text>A process for taking preventive and corrective action to mitigate any vulnerabilities identified in the process required by subparagraph (C), that may include implementing any changes to information security practices and the architecture, installation, or implementation of network or operating software.</text></subparagraph><subparagraph id="ID76C2B598AC28442DAFD7484CFC7A6A8D"><enum>(E)</enum><text>A process for disposing of data in electronic form containing personal information by destroying, permanently erasing, or otherwise modifying the personal information contained in such data to make such personal information permanently unreadable or indecipherable.</text></subparagraph><subparagraph id="ID95A0178313B54F4AAB3A130B46072BF7"><enum>(F)</enum><text>A standard method or methods for the destruction of paper documents and other non-electronic data containing personal information.</text></subparagraph></paragraph></subsection><subsection id="idB5649FAFDBBF449DB14699C91A63DAFA"><enum>(b)</enum><header>Limitations</header><paragraph id="idDF36111281354CB185E8CEDA907AE05F"><enum>(1)</enum><header>Covered
 entities subject to the Gramm-Leach-Bliley Act</header><text>A financial institution that is subject to title V of the Gramm-Leach-Bliley Act (<external-xref legal-doc="usc" parsable-cite="usc/15/6801">15 U.S.C. 6801 et seq.</external-xref>) and is in compliance with information security requirements under that Act shall be deemed in compliance with this section.</text></paragraph><paragraph id="idFC83DD0CBAC248F4912198D878AC77A3"><enum>(2)</enum><header>Applicability
 of other information security requirements</header><text>A person who is subject to, and in compliance with, the information security requirements of section 13401 of the Health Information Technology for Economic and Clinical Health Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17931">42 U.S.C. 17931</external-xref>) or of section 1173(d) of title XI, part C of the Social Security Act (<external-xref legal-doc="usc" parsable-cite="usc/42/1320d-2">42 U.S.C. 1320d–2(d)</external-xref>) shall be deemed in compliance with this section with respect to any data governed by section 13401 of the Health Information Technology for Economic and Clinical Health Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17931">42 U.S.C. 17931</external-xref>) or by the Health Insurance Portability and Accountability Act of 1996 Security Rule (45 C.F.R. 160.103 and part 164).</text></paragraph><paragraph id="IDD8A194CBFBE7469EA6F116817AB6F93D"><enum>(3)</enum><header>Certain service
 providers</header><text>Nothing in this section shall apply to a service provider for any electronic communication by a third party to the extent that the service provider is engaged in the transmission, routing, or temporary, intermediate, or transient storage of that communication.</text></paragraph></subsection></section><section id="IDC91C6C5507754FE0B4C61A051CC610AB"><enum>3.</enum><header>Notification
		of breach of security</header><subsection id="ID3CA694EA7CE7436D8F06EFFD455A56FF"><enum>(a)</enum><header>Nationwide
 notification</header><text>A covered entity that owns or possesses data in electronic form containing personal information, following the discovery of a breach of security of the system maintained by the covered entity that contains such data, shall notify—</text><paragraph id="id5B85BA0325BE4A6AAEAB9892A7FA1D9E"><enum>(1)</enum><text>each individual who is a citizen or resident of the United States and whose personal information was or is reasonably believed to have been acquired or accessed from the covered entity as a result of the breach of security; and</text></paragraph><paragraph id="id133CAFE2EA514BD7A2D1C15161E2B350"><enum>(2)</enum><text>the Commission, unless the covered entity has notified the designated entity under section 4.</text></paragraph></subsection><subsection id="ID74302D61DEA84142835184D1AEE0474E"><enum>(b)</enum><header>Special
		notification requirements</header><paragraph id="IDB2FC36DAFDE44A789DF76B2F573E41B6"><enum>(1)</enum><header>Third-party
 entities</header><text>In the event of a breach of security of a system maintained by a third-party entity that has been contracted to maintain or process data in electronic form containing personal information on behalf of any other covered entity who owns or possesses such data, the third-party entity shall notify the covered entity of the breach of security. Upon receiving notification from the third party entity, such covered entity shall provide the notification required under subsection (a).</text></paragraph><paragraph id="ID11F90C4FAA9440D495F9FA32623C583E"><enum>(2)</enum><header>Service
 providers</header><text>If a service provider becomes aware of a breach of security of data in electronic form containing personal information that is owned or possessed by another covered entity that connects to or uses a system or network provided by the service provider for the purpose of transmitting, routing, or providing intermediate or transient storage of such data, the service provider shall notify of the breach of security only the covered entity who initiated such connection, transmission, routing, or storage if such covered entity can be reasonably identified. Upon receiving the notification from the service provider, the covered entity shall provide the notification required under subsection (a).</text></paragraph><paragraph id="ID3A37F2194BE645A2B88280225EC0B24B"><enum>(3)</enum><header>Coordination of
 notification with credit reporting agencies</header><text>If a covered entity is required to provide notification to more than 5,000 individuals under subsection (a)(1), the covered entity also shall notify each major credit reporting agency of the timing and distribution of the notices, except when the only personal information that is the subject of the breach of security is the individual’s first name or initial and last name, or address, or phone number, in combination with a credit or debit card number, and any required security code. Such notice shall be given to each credit reporting agency without unreasonable delay and, if it will not delay notice to the affected individuals, prior to the distribution of notices to the affected individuals.</text></paragraph></subsection><subsection id="IDD380D3F705FD47D3917BD1665FC5B630"><enum>(c)</enum><header>Timeliness of
 notification</header><text>Notification under subsection (a) shall be made—</text><paragraph id="id181B11CA89AD4E44AE30DFA8A68F41EE"><enum>(1)</enum><text>not later than 30 days after the date of discovery of a breach of security; or</text></paragraph><paragraph id="idCC0801A2B9A047119443957575F087B4"><enum>(2)</enum><text>as promptly as possible if the covered entity providing notice can show that providing notice within the timeframe under paragraph (1) is not feasible due to circumstances necessary—</text><subparagraph id="idABD7D6C43FC247D2BDE5FED3AC67812C"><enum>(A)</enum><text>to accurately identify affected consumers;</text></subparagraph><subparagraph id="id039A8AB941C7481A9224F83A952B2EC7"><enum>(B)</enum><text>to prevent further breach or unauthorized disclosures; or</text></subparagraph><subparagraph id="idAB664E35499E43BEBF1E74A3EFEFD62B"><enum>(C)</enum><text>to reasonably restore the integrity of the data system.</text></subparagraph></paragraph></subsection><subsection id="IDF69F32F95E6F4CC4967D7CF0D8CEBB21"><enum>(d)</enum><header>Method and
		content of notification</header><paragraph id="IDB04F55456A6B4A1EAE386DC01F8816AF"><enum>(1)</enum><header>Direct
		notification</header><subparagraph id="IDB3ABB9E2A4024BD693ACBAB2A2AB7BB5"><enum>(A)</enum><header>Method of
 direct notification</header><text>A covered entity shall be in compliance with the notification requirement under subsection (a)(1) if—</text><clause id="id98476004947E4A15A48B4D23A1F07FF5"><enum>(i)</enum><text>the covered entity provides conspicuous and clearly identified notification—</text><subclause id="ID4ECEFAEA494947BD9D57C619111B4BCE"><enum>(I)</enum><text>in writing; or</text></subclause><subclause id="ID9049048CEA2A4549864CFA519034B7B2"><enum>(II)</enum><text>by e-mail or other electronic means if—</text><item id="ID8C852B1875934DA4B8A193E5560590CD"><enum>(aa)</enum><text>the covered entity's primary method of communication with the individual is by e-mail or such other electronic means; or</text></item><item id="ID430ACE7855994BCEABDCB19F10342F56"><enum>(bb)</enum><text>the individual has consented to receive notification by e-mail or such other electronic means and such notification is provided in a manner that is consistent with the provisions permitting electronic transmission of notices under section 101 of the Electronic Signatures in Global and National Commerce Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7001">15 U.S.C. 7001</external-xref>); and</text></item></subclause></clause><clause id="id352B6B56B421486AA4DB4F1AE1D37E6E"><enum>(ii)</enum><text>the method of notification selected under clause (i) can reasonably be expected to reach the intended individual.</text></clause></subparagraph><subparagraph id="idD051CD1B02DB47CAB2523CFD06C36EED"><enum>(B)</enum><header>Content of
 direct notification</header><text>Each method of direct notification under subparagraph (A) shall include—</text><clause id="id97E023E3756147C8B5DF5037FBA4F4E6"><enum>(i)</enum><text>the date, estimated date, or estimated date range of the breach of security;</text></clause><clause id="id25A34F7D0FFE4E018990A1A5E62B30ED"><enum>(ii)</enum><text>a description of each type of personal information that was or is reasonably believed to have been acquired or accessed as a result of the breach of security;</text></clause><clause id="ID569886A47E924ED98DAA3385952D274C"><enum>(iii)</enum><text>a telephone number that an individual can use at no cost to the individual to contact the covered entity to inquire about the breach of security or the information the covered entity maintained or possessed about that individual;</text></clause><clause id="ID70DB333590F44402AE0151AFCFE36234"><enum>(iv)</enum><text>notice that the individual may be entitled to consumer credit reports under subsection (e)(1);</text></clause><clause id="idC503471AEA134A41A5A40A70EF11FA86"><enum>(v)</enum><text>instructions how an individual can request consumer credit reports under subsection (e)(1);</text></clause><clause id="id697C908035E24919B4CAB9B3D9C04F61"><enum>(vi)</enum><text>a telephone number, that an individual can use at no cost to the individual, and an address to contact each major credit reporting agency; and</text></clause><clause id="idA49B52100A6447098C92B79C0AB5C12B"><enum>(vii)</enum><text>a telephone number, that an individual can use at no cost to the individual, and an Internet Web site address to obtain information regarding identity theft from the Commission.</text></clause></subparagraph></paragraph><paragraph id="IDF5C4DFD0B79342D7B5FAFC41A2B169A3"><enum>(2)</enum><header>Substitute
		notification</header><subparagraph id="ID9A6BD0B3245F4B8BBE2EE5462DEA752A"><enum>(A)</enum><header>Circumstances
 giving rise to substitute notification</header><text>A covered entity required to provide notification under subsection (a)(1) may provide substitute notification instead of direct notification under paragraph (1)—</text><clause id="ID269721D970E24FA1AF7E8080E158F9E8"><enum>(i)</enum><text>if direct notification is not feasible due to a lack of sufficient contact information for the individual required to be notified; or</text></clause><clause id="id9859BE5DE80E465E9D6155FF7ED7C260"><enum>(ii)</enum><text>if the covered entity owns or possesses data in electronic form containing personal information of fewer than 10,000 individuals and direct notification is not feasible due to excessive cost to the covered entity required to provide such notification relative to the resources of such covered entity, as determined in accordance with the regulations issued by the Commission under paragraph (3)(A).</text></clause></subparagraph><subparagraph id="ID437493171A7E47759E6AF6379DFD39B6"><enum>(B)</enum><header>Method of
 substitute notification</header><text>Substitute notification under this paragraph shall include—</text><clause id="ID7719F9C9FA6F485083EFF940F4D74AAA"><enum>(i)</enum><text>conspicuous and clearly identified notification by e-mail to the extent the covered entity has an e-mail address for an individual who is entitled to notification under subsection (a)(1);</text></clause><clause id="IDEA9E8B1D60CB466AABB761AB8482A1B9"><enum>(ii)</enum><text>conspicuous and clearly identified notification on the Internet Web site of the covered entity if the covered entity maintains an Internet Web site; and</text></clause><clause id="IDB8D8084731524B55A45F887FBC0EF1B0"><enum>(iii)</enum><text>notification to print and to broadcast media, including major media in metropolitan and rural areas where the individuals whose personal information was acquired reside.</text></clause></subparagraph><subparagraph id="ID308BB3C627B14464AED2465A87F7D8C2"><enum>(C)</enum><header>Content of
 substitute notification</header><text>Each method of substitute notification under this paragraph shall include—</text><clause commented="no" id="id41DBD631E8764CB49EE81AC3BC8312FB"><enum>(i)</enum><text>the date, estimated date, or estimated date range of the breach of security;</text></clause><clause commented="no" id="idD90704D6F52A485382C5ED41E9DE9CE5"><enum>(ii)</enum><text>a description of each type of personal information that was or is reasonably believed to have been acquired or accessed as a result of the breach of security;</text></clause><clause id="ID8B4C02D911F74D748797BB4AA25271C1"><enum>(iii)</enum><text>notice that an individual may be entitled to consumer credit reports under subsection (e)(1);</text></clause><clause id="id3951AA15AC154761B2756CBB63FC34CD"><enum>(iv)</enum><text>instructions how an individual can request consumer credit reports under subsection (e)(1);</text></clause><clause id="ID95EED68D5FA246429894EB2C0BD6F33B"><enum>(v)</enum><text>a telephone number that an individual can use at no cost to the individual to contact the covered entity to inquire about the breach of security or the information the covered entity maintained or possessed about that individual;</text></clause><clause id="IDB0A0844D3CAB43B980FC83A7A00B5E0D"><enum>(vi)</enum><text>a telephone number, that an individual can use at no cost to the individual, and an address to contact each major credit reporting agency; and</text></clause><clause id="ID75335A725F4A47DC98EF2422D30F60CF"><enum>(vii)</enum><text>a telephone number, that an individual can use at no cost to the individual, and an Internet Web site address to obtain information regarding identity theft from the Commission.</text></clause></subparagraph></paragraph><paragraph id="IDF4D4874E63004CE9A5F3DBDCE28A042C"><enum>(3)</enum><header>Regulations and
 guidance</header><subparagraph id="IDC534C7A33ACF4E38B4A92619DE5A0182"><enum>(A)</enum><header>Regulations</header><text>Not later than 1 year after the date of enactment of this Act, the Commission, by regulation under section 553 of title 5, United States Code, shall establish criteria for determining circumstances under which substitute notification may be provided under paragraph (2), including criteria for determining if direct notification under paragraph (1) is not feasible due to excessive costs to the covered entity required to provide such notification relative to the resources of such covered entity. The regulations may also identify other circumstances where substitute notification would be appropriate, including circumstances under which the cost of providing direct notification exceeds the benefits to consumers.</text></subparagraph><subparagraph id="ID0CDC83C9721D4576AD12FAE715C295EE"><enum>(B)</enum><header>Guidance</header><text>In addition, the Commission, in consultation with the Small Business Administration, shall provide and publish general guidance with respect to compliance with this subsection. The guidance shall include—</text><clause id="IDDF590D14B0FF4F5D99F8EB4323E3357E"><enum>(i)</enum><text>a description of written or e-mail notification that complies with paragraph (1); and</text></clause><clause id="ID3328D26C70CE41BC8DB944F7A7DE2069"><enum>(ii)</enum><text>guidance on the content of substitute notification under paragraph (2), including the extent of notification to print and broadcast media that complies with paragraph (2)(B)(iii).</text></clause></subparagraph></paragraph></subsection><subsection id="ID2DFE6A8200CC455B8657914E654B9CF5"><enum>(e)</enum><header>Other
		obligations following breach</header><paragraph id="IDD31CDD0E271145ACBF3B1D70FD789737"><enum>(1)</enum><header>In
 general</header><text>Not later than 60 days after the date of request by an individual who received notification under subsection (a)(1) and quarterly thereafter for 2 years, a covered entity required to provide notification under subsection (a)(1) shall provide, or arrange for the provision of, to the individual at no cost, consumer credit reports from at least 1 major credit reporting agency.</text></paragraph><paragraph id="ID5C886BB2C6B7448990010747AEABC52E"><enum>(2)</enum><header>Limitation</header><text>This subsection shall not apply if the only personal information that is the subject of the breach of security is the individual's first name or initial and last name, or address, or phone number, in combination with a credit or debit card number, and any required security code.</text></paragraph><paragraph id="ID309FA25BBE914D88A8E0008E785F1CB4"><enum>(3)</enum><header>Rulemaking</header><text>The Commission's rulemaking under subsection (d)(3) shall include—</text><subparagraph id="ID33B01465DE7344FCAD9A15D3A2527EC7"><enum>(A)</enum><text>determination of the circumstances under which a covered entity required to provide notification under subsection (a)(1) must provide or arrange for the provision of free consumer credit reports; and</text></subparagraph><subparagraph id="ID2DE092D182294EDE80E1B46C094B9307"><enum>(B)</enum><text>establishment of a simple process under which a covered entity that is a small business or small nonprofit organization may request a full or a partial waiver or a modified or an alternative means of complying with this subsection if providing free consumer credit reports is not feasible due to excessive costs relative to the resources of such covered entity and relative to the level of harm, to affected individuals, caused by the breach of security.</text></subparagraph></paragraph></subsection><subsection id="id7323d4e1-f809-49bb-b1d8-036315fc558c"><enum>(f)</enum><header>Delay of
		Notification Authorized for National Security and Law Enforcement
		Purposes</header><paragraph id="id63000f0f-6759-4174-8273-a15334cf5776"><enum>(1)</enum><header>In
 general</header><text>If the United States Secret Service or the Federal Bureau of Investigation determines that notification under this section would impede a criminal investigation or a national security activity, notification shall be delayed upon written notice from the United States Secret Service or the Federal Bureau of Investigation to the covered entity that experienced the breach of security. Written notice from the United States Secret Service or the Federal Bureau of Investigation shall specify the period of delay requested for national security or law enforcement purposes.</text></paragraph><paragraph commented="no" id="id43d03d1f-0d10-482f-a1fa-3b89fb39ca63"><enum>(2)</enum><header>Subsequent
		delay of notification</header><subparagraph commented="no" id="id1BD4884677054B90AED05C6490FE74B0"><enum>(A)</enum><header>In
 general</header><text>A covered entity shall provide notification under this section not later than 30 days after the day that the delay was invoked unless a Federal law enforcement or intelligence agency provides subsequent written notice to the covered entity that further delay is necessary.</text></subparagraph><subparagraph commented="no" id="IDd9054f81135d4ed2a96dfc4992456898"><enum>(B)</enum><header>Written
		justification requirements</header><clause commented="no" id="id302D02595B9D4B32AACD21BA1B0E662E"><enum>(i)</enum><header>United States
 Secret Service</header><text>If the United States Secret Service instructs a covered entity to delay notification under this section beyond the 30-day period under subparagraph (A) (referred to in this clause as <quote>subsequent delay</quote>), the United States Secret Service shall submit written justification for the subsequent delay to the Secretary of Homeland Security before the subsequent delay begins.</text></clause><clause commented="no" id="ID995bb96da7ef4d97b186ed0253ee2c82"><enum>(ii)</enum><header>Federal Bureau
 of Investigation</header><text>If the Federal Bureau of Investigation instructs a covered entity to delay notification under this section beyond the 30-day period under subparagraph (A) (referred to in this clause as <quote>subsequent delay</quote>), the Federal Bureau of Investigation shall submit written justification for the subsequent delay to the Attorney General before the subsequent delay begins.</text></clause></subparagraph></paragraph><paragraph id="id52f8b5f1-31f0-4fe2-9354-c06ab286dd09"><enum>(3)</enum><header>Law
 enforcement immunity</header><text>No cause of action shall lie in any court against any Federal agency for acts relating to the delay of notification for national security or law enforcement purposes under this Act.</text></paragraph></subsection><subsection id="IDF32D9949AD44428BA4329EFE6454C389"><enum>(g)</enum><header>General
		Exemption</header><paragraph id="IDDEE3ACDC36C54AFBA2A3116C95AFA37F"><enum>(1)</enum><header>In
 general</header><text>A covered entity shall be exempt from the requirements under this section if, following a breach of security, the covered entity reasonably concludes that there is no reasonable risk of identity theft, fraud, or other unlawful conduct.</text></paragraph><paragraph id="ID7D90DA8F361841C3BFD4A04080FE73C4"><enum>(2)</enum><header>Presumption</header><subparagraph id="idCB076D3E201447CE863FE012683BC31E"><enum>(A)</enum><header>In
 general</header><text>There shall be a presumption that no reasonable risk of identity theft, fraud, or other unlawful conduct exists following a breach of security if—</text><clause id="id3F8EB59FAE954E51A930A67A58DACA3B"><enum>(i)</enum><text>the data is rendered unusable, unreadable, or indecipherable through a security technology or methodology; and</text></clause><clause id="id5E6834B45B634AD18954E8CBC05D8873"><enum>(ii)</enum><text>the security technology or methodology under clause (i) is generally accepted by experts in the information security field.</text></clause></subparagraph><subparagraph id="idE7855CC7A4A8443EA155A9E01AB050C0"><enum>(B)</enum><header>Rebuttal</header><text>The presumption under subparagraph (A) may be rebutted by facts demonstrating that the security technology or methodology in a specific case has been or is reasonably likely to be compromised.</text></subparagraph></paragraph><paragraph id="IDB125CFAF23B842E3973EE65251AB0D3A"><enum>(3)</enum><header>Technologies or
 Methodologies</header><text>Not later than 1 year after the date of enactment of this Act, and biennially thereafter, the Commission, after consultation with the National Institute of Standards and Technology, shall issue rules (pursuant to section 553 of title 5, United States Code) or guidance to identify each security technology and methodology under paragraph (2). In identifying each such security technology and methodology, the Commission and the National Institute of Standards and Technology shall—</text><subparagraph id="id2B0751244F6F4C50A377DB263351CE95"><enum>(A)</enum><text>consult with relevant industries, consumer organizations, data security and identity theft prevention experts, and established standards setting bodies; and</text></subparagraph><subparagraph id="idF7B68CD73346487482F9EF5B736B3DF1"><enum>(B)</enum><text>consider whether and in what circumstances a security technology or methodology currently in use, such as encryption, complies with the standards under paragraph (2).</text></subparagraph></paragraph><paragraph id="ID63B0EEDA1F3C41DFBBC1228968308DCA"><enum>(4)</enum><header>Commission
 guidance</header><text>Not later than 1 year after the date of enactment of this Act, the Commission, after consultation with the National Institute of Standards and Technology, shall issue guidance regarding the application of the exemption under paragraph (1).</text></paragraph></subsection><subsection id="id496cce26-2b1f-4ed5-98b3-6737ca5694d7"><enum>(h)</enum><header>Exemptions
		for national security and law enforcement purposes</header><paragraph id="id96ed7ecb-7d26-40e2-8065-d68fc663e5d6"><enum>(1)</enum><header>In
 general</header><text>A covered entity shall be exempt from the requirements under this section if—</text><subparagraph id="id5BE6576E52E243149D245E9B36CB07E4"><enum>(A)</enum><text>a determination is made—</text><clause id="iddea7c15b-86f6-41b7-81e6-b2d928c896b1"><enum>(i)</enum><text>by the United States Secret Service or the Federal Bureau of Investigation that notification of the breach of security could be reasonably expected to reveal sensitive sources and methods or similarly impede the ability of the Government to conduct law enforcement or intelligence investigations; or</text></clause><clause id="idf27b9ef9-36cb-44e5-a80b-022854194673"><enum>(ii)</enum><text>by the Federal Bureau of Investigation that notification of the breach of security could be reasonably expected to cause damage to the national security; and</text></clause></subparagraph><subparagraph id="id73814BDED7604FB5A968C51BF20482A1"><enum>(B)</enum><text>the United States Secret Service or the Federal Bureau of Investigation, as the case may be, provides written notice of its determination under subparagraph (A) to the covered entity.</text></subparagraph></paragraph><paragraph id="idE0CA4ED9FCFD4EADA07390C1A56C8F66"><enum>(2)</enum><header>United States
 Secret Service</header><text>If the United States Secret Service invokes an exemption under paragraph (1), the United States Secret Service shall submit written justification for invoking the exemption to the Secretary of Homeland Security before the exemption is invoked.</text></paragraph><paragraph id="id81E75EA9C9AF44DF850DEA9A8493166E"><enum>(3)</enum><header>Federal Bureau
 of Investigation</header><text>If the Federal Bureau of Investigation invokes an exemption under paragraph (1), the Federal Bureau of Investigation shall submit written justification for invoking the exemption to the Attorney General before the exemption is invoked.</text></paragraph><paragraph id="idd1eb50f9-e644-4214-8bba-34d49adaf59e"><enum>(4)</enum><header>Immunity</header><text>No cause of action shall lie in any court against any Federal agency for acts relating to the exemption from notification for national security or law enforcement purposes under this Act.</text></paragraph><paragraph id="id636F40B67F3A4A3FAEDBFA2CAE6C9C80"><enum>(5)</enum><header>Reports</header><text>Not later than 18 months after the date of enactment of this Act, and upon request by Congress thereafter, the United States Secret Service and Federal Bureau of Investigation shall submit to Congress a report on the number and nature of breaches of security subject to the exemptions for national security and law enforcement purposes under this subsection.</text></paragraph></subsection><subsection id="ide136340f-99d7-4196-9eac-7198a70d0121"><enum>(i)</enum><header>Financial
		fraud prevention exemption</header><paragraph id="id9055a1cd-d24d-4386-bf61-3d6a70b210df"><enum>(1)</enum><header>In
 general</header><text>A covered entity shall be exempt from the requirements under this section if the covered entity utilizes or participates in a security program that—</text><subparagraph id="idec4e6e44-8a13-484e-ba19-6c0f3ebc94fb"><enum>(A)</enum><text>effectively blocks the use of the personal information to initiate an unauthorized financial transaction before it is charged to the account of the individual; and</text></subparagraph><subparagraph id="id9b23b8c3-cd8a-4554-aceb-c5f114fdccf4"><enum>(B)</enum><text>provides notice to each affected individual after a breach of security that resulted in attempted fraud or an attempted unauthorized transaction.</text></subparagraph></paragraph><paragraph id="id5f941d9f-5eb6-4c5c-bc71-e7a7b5a9929b"><enum>(2)</enum><header>Limitations</header><text>An exemption under paragraph (1) shall not apply if—</text><subparagraph id="idf79f09e8-56b1-47ad-979b-de69a32cab58"><enum>(A)</enum><text>the breach of security includes personal information, other than a credit card number or credit card security code, of any type; or</text></subparagraph><subparagraph id="id237b78ee-798f-4134-b446-1d7f492e365a"><enum>(B)</enum><text>the breach of security includes both the individual’s credit card number and the individual’s first and last name.</text></subparagraph></paragraph></subsection><subsection commented="no" id="idA6C54E8FBFEF4DCCB817B7700BD49FF9"><enum>(j)</enum><header>Financial
		institutions regulated by Federal functional regulators</header><paragraph commented="no" id="id36CC5D1023974FBD82CF04B17084B1C2"><enum>(1)</enum><header>In
 general</header><text>A covered financial institution shall be deemed in compliance with this section if—</text><subparagraph commented="no" id="id6D7FF66E214044F7A1FE3480ACB23616"><enum>(A)</enum><text>the Federal functional regulator with jurisdiction over the covered financial institution has issued a standard by regulation or guideline under title V of the Gramm-Leach-Bliley Act (<external-xref legal-doc="usc" parsable-cite="usc/15/6801">15 U.S.C. 6801 et seq.</external-xref>) that—</text><clause commented="no" id="id60AF4A87B54D4F4695AFDBC70479C10E"><enum>(i)</enum><text>requires financial institutions within its jurisdiction to provide notification to individuals following a breach of security; and</text></clause><clause commented="no" id="id8E11C3E7ABD549BA8B86220DF6281221"><enum>(ii)</enum><text>provides protections substantially similar to, or greater than, those required under this Act; and</text></clause></subparagraph><subparagraph commented="no" id="id898C4C423F4C419B89F5D713CA936B1B"><enum>(B)</enum><text>the covered financial institution is in compliance with the standard under subparagraph (A).</text></subparagraph></paragraph><paragraph commented="no" id="id76D74C5E0ADD431A8E505BCD1F76C90A"><enum>(2)</enum><header>Definitions</header><text>In this subsection—</text><subparagraph commented="no" id="id333AC8E8160C444083EA95D4BA37F580"><enum>(A)</enum><text>the term <term>covered financial institution</term> means a financial institution that is subject to—</text><clause commented="no" id="id52A67277FCCF44E892DD247EDF72D6AC"><enum>(i)</enum><text>the data security requirements of the Gramm-Leach-Bliley Act (<external-xref legal-doc="usc" parsable-cite="usc/15/6801">15 U.S.C. 6801 et seq.</external-xref>);</text></clause><clause commented="no" id="idE01D2008B09C440B9BC3AAE06923B7DC"><enum>(ii)</enum><text>any implementing standard issued by regulation or guideline issued under that Act; and</text></clause><clause commented="no" id="id4D634B089D974038BBFC62E0176C5749"><enum>(iii)</enum><text>the jurisdiction of a Federal functional regulator under that Act;</text></clause></subparagraph><subparagraph commented="no" id="idDFEBF00B8BD147B3991D03A6EADC5487"><enum>(B)</enum><text>the term <term>Federal functional regulator</term> has the meaning given the term in section 509 of the Gramm-Leach-Bliley Act (<external-xref legal-doc="usc" parsable-cite="usc/15/6809">15 U.S.C. 6809</external-xref>); and</text></subparagraph><subparagraph commented="no" id="id6EB68A1664E24A6B8293A894B4190B0B"><enum>(C)</enum><text>the term <term>financial institution</term> has the meaning given the term in section 509 of the Gramm-Leach-Bliley Act (<external-xref legal-doc="usc" parsable-cite="usc/15/6809">15 U.S.C. 6809</external-xref>).</text></subparagraph></paragraph></subsection><subsection commented="no" id="IDf7ef149d8a1a40d88061e795d8feae07"><enum>(k)</enum><header>Exemption;
		health privacy</header><paragraph commented="no" id="ID6044a0a3157c42e88b83e213f0effdce"><enum>(1)</enum><header>Covered entity
 or business associate under HITECH Act</header><text>To the extent that a covered entity under this Act acts as a covered entity or a business associate under section 13402 of the Health Information Technology for Economic and Clinical Health Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17932">42 U.S.C. 17932</external-xref>), has the obligation to provide notification to individuals following a breach of security under that Act or its implementing regulations, and is in compliance with that obligation, the covered entity shall be deemed in compliance with this section.</text></paragraph><paragraph commented="no" id="IDe44a483afa5040e88628185307dabbcb"><enum>(2)</enum><header>Entity subject
 to HITECH Act</header><text>To the extent that a covered entity under this Act acts as a vendor of personal health records, a third party service provider, or other entity subject to section 13407 of the Health Information Technology for Economical and Clinical Health Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17937">42 U.S.C. 17937</external-xref>), has the obligation to provide notification to individuals following a breach of security under that Act or its implementing regulations, and is in compliance with that obligation, the covered entity shall be deemed in compliance with this section.</text></paragraph><paragraph commented="no" id="idCF951C35B35C4C14A9B6826ED9865798"><enum>(3)</enum><header>Limitation of
 statutory construction</header><text>Nothing in this Act may be construed in any way to give effect to the sunset provision under section 13407(g)(2) of the Health Information Technology for Economic and Clinical Health Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17937">42 U.S.C. 17937(g)(2)</external-xref>) or to otherwise limit or affect the applicability, under section 13407 of that Act, of the requirement to provide notification to individuals following a breach of security for vendors of personal health records and each entity described in clause (ii), (iii), or (iv) of section 13424(b)(1)(A) of that Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17953">42 U.S.C. 17953(b)(1)(A)</external-xref>).</text></paragraph></subsection><subsection id="ID848D657200CE41C0BC7C01D5A1CB45DE"><enum>(l)</enum><header>Web site notice
 of Federal Trade Commission</header><text>If the Commission, upon receiving notification of any breach of security that is reported to the Commission, finds that notification of the breach of security via the Commission's Internet Web site would be in the public interest or for the protection of consumers, the Commission shall place such a notice in a clear and conspicuous location on its Internet Web site.</text></subsection><subsection id="IDE494638E42624A5299B2377499424DAC"><enum>(m)</enum><header>FTC study on
 notification in languages in addition to English</header><text>Not later than 1 year after the date of enactment of this Act, the Commission shall conduct a study on the practicality and cost effectiveness of requiring the direct notification required by subsection (d)(1) to be provided in a language in addition to English to individuals known to speak only such other language.</text></subsection><subsection id="IDB0988FB2EF4946F3AA5DFBB1782173BC"><enum>(n)</enum><header>General
 rulemaking authority</header><text>The Commission may promulgate regulations necessary under section 553 of title 5, United States Code, to effectively enforce the requirements of this section.</text></subsection></section><section id="id8da3943b-6d12-4a72-8bc7-5507f7b35fa4"><enum>4.</enum><header>Notice to
		law enforcement</header><subsection id="ID1b128642f69f4dedaf722f296a77ca46"><enum>(a)</enum><header>Designation of
 government entity To receive notice</header><text>Not later than 60 days after the date of enactment of this Act, the Secretary of the Department of Homeland Security shall designate a Federal Government entity to receive notice under this section.</text></subsection><subsection id="id9eb01a83-12ae-4b60-916d-be5366d85994"><enum>(b)</enum><header>Notice</header><text>A covered entity shall notify the designated entity of a breach of security if—</text><paragraph id="idcfdf868e-8d5f-4882-a4f5-2b83196fb2c9"><enum>(1)</enum><text>the number of individuals whose personal information was, or is reasonably believed to have been, acquired or assessed as a result of the breach of security exceeds 10,000;</text></paragraph><paragraph id="idf58b9904-649b-4d0a-9b99-c2b6f103e012"><enum>(2)</enum><text>the breach of security involves a database, networked or integrated databases, or other data system containing the personal information of more than 1,000,000 individuals;</text></paragraph><paragraph id="idb5f61215-a532-47f0-baa3-3eaf6b756682"><enum>(3)</enum><text>the breach of security involves databases owned by the Federal Government; or</text></paragraph><paragraph id="idf6805c78-7597-4828-95fb-6341b0366f84"><enum>(4)</enum><text>the breach of security involves primarily personal information of individuals known to the covered entity to be employees or contractors of the Federal Government involved in national security or law enforcement.</text></paragraph></subsection><subsection commented="no" id="IDDB1C37344980484190388EA6F79DD210"><enum>(c)</enum><header>Content of
		notices</header><paragraph commented="no" id="id038088FC1D244601BE08E3D8C9CC6A02"><enum>(1)</enum><header>In
 general</header><text>Each notice under subsection (b) shall contain—</text><subparagraph commented="no" id="IDFD7C1D40DBA7475E858F2E13F9E7A935"><enum>(A)</enum><text>the date, estimated date, or estimated date range of the breach of security;</text></subparagraph><subparagraph commented="no" id="ID09EDA60278B54F09A244D9791FBA04A4"><enum>(B)</enum><text>a description of the nature of the breach of security;</text></subparagraph><subparagraph commented="no" id="id8A45D4DA4FE141E3AFDFE492F1756E76"><enum>(C)</enum><text>a description of each type of personal information that was or is reasonably believed to have been acquired or accessed as a result of the breach of security; and</text></subparagraph><subparagraph commented="no" id="idE53D45BB757541109BE648BE0EFEFEB6"><enum>(D)</enum><text>a statement of each paragraph under subsection (b) that applies to the breach of security.</text></subparagraph></paragraph><paragraph commented="no" id="id57D577A534A64AD9B2B05BB05DC43006"><enum>(2)</enum><header>Construction</header><text>Nothing in this section shall be construed to require a covered entity to reveal specific or identifying information about an individual as part of the notice under paragraph (1).</text></paragraph></subsection><subsection id="IDc78bf5db9444484ab89f3a28cd251273"><enum>(d)</enum><header>Responsibilities
 of the designated entity</header><text>The designated entity shall promptly provide each notice it receives under subsection (b) to—</text><paragraph id="ID4789530476324c308e945fb5a60f5f54"><enum>(1)</enum><text>the United States Secret Service;</text></paragraph><paragraph id="IDebc686cf55c546fe86d5dcf6b59751cd"><enum>(2)</enum><text>the Federal Bureau of Investigation;</text></paragraph><paragraph id="ID88c2736fcc204737a313193df0cc0124"><enum>(3)</enum><text>the Federal Trade Commission;</text></paragraph><paragraph id="ID3551e8f6a9bf438984762379765ded27"><enum>(4)</enum><text>the United States Postal Inspection Service, if the breach of security involves mail fraud;</text></paragraph><paragraph id="ID92cbc11cd08543c1a35d7a3ac9dc7516"><enum>(5)</enum><text>the attorney general of each State affected by the breach of security; and</text></paragraph><paragraph id="ID64e4259eca444c1cbb2791463c190f3b"><enum>(6)</enum><text>as appropriate, other Federal agencies for law enforcement, national security, or data security purposes.</text></paragraph></subsection><subsection id="id35ff640a-2742-415f-8613-5e4654914d91"><enum>(e)</enum><header>Timing of
 notices</header><text>Notice under this section shall be delivered as follows:</text><paragraph id="id6ab0b16c-6121-4469-8365-fc163e7dc371"><enum>(1)</enum><text>Notice under subsection (b) shall be delivered as promptly as possible, but—</text><subparagraph id="id5CB66891D4C5485EB377A2BCD10D3FAB"><enum>(A)</enum><text>not less than 3 business days before notification to an individual under section 3; and</text></subparagraph><subparagraph id="id9F9270D0ED794B5FAD0B88ABE63D9253"><enum>(B)</enum><text>not later than 10 days after the date of discovery of the events requiring notice.</text></subparagraph></paragraph><paragraph id="ide815b376-feec-4171-af39-3abb0fd157a3"><enum>(2)</enum><text>Notice under subsection (d) shall be delivered as promptly as possible, but not later than 1 business day after the date that the designated entity receives notice of a breach of security from a covered entity.</text></paragraph></subsection></section><section id="ID2431CC5DA91642A696CFEA7E1AC4C4EF"><enum>5.</enum><header>Application
		and enforcement</header><subsection id="ID95442AFD630D4A369825F4434AD63EE8"><enum>(a)</enum><header>General
 application</header><text>The requirements of sections 2 and 3 shall apply to—</text><paragraph id="IDBBD02171904D4619B4EC72F9384C2CFD"><enum>(1)</enum><text>those persons, partnerships, or corporations over which the Commission has authority under section 5(a)(2) of the <act-name parsable-cite="FTCA">Federal Trade Commission Act</act-name> (<external-xref legal-doc="usc" parsable-cite="usc/15/45">15 U.S.C. 45(a)(2)</external-xref>); and</text></paragraph><paragraph id="IDB55F22EE74F5463C92B30C92090518DC"><enum>(2)</enum><text>notwithstanding sections 4 and 5(a)(2) of the Federal Trade Commission Act (15 U.S.C. 44 and 45(a)(2)), any nonprofit organization, including any organization described in <external-xref legal-doc="usc" parsable-cite="usc/26/501">section 501(c)</external-xref> of the Internal Revenue Code of 1986 that is exempt from taxation under <external-xref legal-doc="usc" parsable-cite="usc/26/501">section 501(a)</external-xref> of the Internal Revenue Code of 1986.</text></paragraph></subsection><subsection id="id4679CE0F99804E588508A6735FEBBC7D"><enum>(b)</enum><header>Opt-In for
		certain other entities</header><paragraph id="id7AB800CC58B74F59825F3E8ED25E86B9"><enum>(1)</enum><header>In
 general</header><text>Notwithstanding sections 4 and 5(a)(2) of the Federal Trade Commission Act (15 U.S.C. 44 and 45(a)(2)), the requirements of section 3 shall apply to any other covered entity not included under subsection (a) that enters into an agreement with the Commission under which that covered entity would be subject to section 3 with respect to any acts or omissions that occur while the agreement is in effect and that may constitute a violation of section 3, if—</text><subparagraph id="id404003664CAA438BA9BC6FAB6F6720B4"><enum>(A)</enum><text>not less than 30 days prior to entering into the agreement with the person or entity, the Commission publishes notice in the Federal Register of the Commission's intent to enter into the agreement; and</text></subparagraph><subparagraph id="idAA48E8309A5D4503AF70B4F30E20066E"><enum>(B)</enum><text>not later than 14 business days after entering into the agreement with the person or entity, the Commission publishes in the Federal Register—</text><clause id="idF5DACB02BDB54244B351637C2D17A87F"><enum>(i)</enum><text>notice of the agreement;</text></clause><clause id="idC37F299D0FDA4EA9B65D3ADF72DEE4BD"><enum>(ii)</enum><text>the identity of each person covered by the agreement; and</text></clause><clause id="idFC9564760B174FAA9A29FEF42AB74849"><enum>(iii)</enum><text>the effective date of the agreement.</text></clause></subparagraph></paragraph><paragraph id="idB6F017CF941B4993B5FF087694C36CE5"><enum>(2)</enum><header>Construction</header><subparagraph id="idA15851A1DA7B4D18863F213F6B4EF037"><enum>(A)</enum><header>Other Federal
 law</header><text>An agreement under paragraph (1) shall not effect a covered entity's obligation to provide notice of a breach of security or similar event under any other Federal law.</text></subparagraph><subparagraph id="id4C5EED26B8E845F2AF423B4894EF70CC"><enum>(B)</enum><header>No preemption
 prior to valid agreement</header><text>Subsections (a)(2) and (b) of section 7 shall not apply to a breach of security that occurs before a valid agreement under paragraph (1) is in effect.</text></subparagraph></paragraph></subsection><subsection id="IDD0A5DE7D47014F5DB6120A09171A0A6B"><enum>(c)</enum><header>Enforcement by
		the Federal Trade Commission</header><paragraph id="IDE0D559DFE4C841F182E5221448071C1F"><enum>(1)</enum><header>Unfair or
 deceptive acts or practices</header><text>A violation of section 2 or 3 of this Act shall be treated as an unfair and deceptive act or practice in violation of a regulation under section 18(a)(1)(B) of the <act-name parsable-cite="FTCA">Federal Trade Commission Act</act-name> (<external-xref legal-doc="usc" parsable-cite="usc/15/57a">15 U.S.C. 57a(a)(1)(B)</external-xref>) regarding unfair or deceptive acts or practices.</text></paragraph><paragraph id="ID7FBF37EFCB4C47219D9A79E41C48BBA1"><enum>(2)</enum><header>Powers of
 commission</header><text>The Commission shall enforce this Act in the same manner, by the same means, with the same jurisdiction, except as provided in subsections (a)(2) and (b) of this section, and with the same powers and duties as though all applicable terms and provisions of the <act-name parsable-cite="FTCA">Federal Trade Commission Act</act-name> (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41 et seq.</external-xref>) were incorporated into and made a part of this Act. Any covered entity who violates such regulations shall be subject to the penalties and entitled to the privileges and immunities provided in that Act.</text></paragraph><paragraph id="ID12837A20E2C845E8BCA680D08E5A0F8D"><enum>(3)</enum><header>Limitation</header><text>In promulgating rules under this Act, the Commission shall not require the deployment or use of any specific products or technologies, including any specific computer software or hardware.</text></paragraph></subsection><subsection id="ID146156B86CC4446B9A25B11316C3F954"><enum>(d)</enum><header>Enforcement by
		State attorneys general</header><paragraph id="IDB9A8C5C6E99D4BC9B6FAB241626DFFF1"><enum>(1)</enum><header>Civil
 action</header><text>In any case in which the attorney general of a State, or an official or agency of a State, has reason to believe that an interest of the residents of that State has been or is threatened or adversely affected by any covered entity who violates section 2 or section 3 of this Act, the attorney general, official, or agency of the State, as parens patriae, may bring a civil action on behalf of the residents of the State in a district court of the United States of appropriate jurisdiction—</text><subparagraph id="ID24034B64E078488CB94C8CF3D6498337"><enum>(A)</enum><text>to enjoin further violation of such section by the defendant;</text></subparagraph><subparagraph id="ID0CA98FBDDF9A490F9DA22D8DFC1545FB"><enum>(B)</enum><text>to compel compliance with such section; or</text></subparagraph><subparagraph id="IDFD984CA2583945C4A120AB68AD7EA184"><enum>(C)</enum><text>to obtain civil penalties in the amount determined under paragraph (2).</text></subparagraph></paragraph><paragraph id="IDF9182F5D776E4CDA94F3FF8CCD7AA11D"><enum>(2)</enum><header>Civil
		penalties</header><subparagraph id="IDBD55142DF5C0468B9914E6D75AB38F36"><enum>(A)</enum><header>Calculation</header><clause id="ID10BCC1E2B794439D87E79B7F65072DB3"><enum>(i)</enum><header>Treatment of
 violations of section 2</header><text>For purposes of paragraph (1)(C) with regard to a violation of section 2, the amount determined under this paragraph is the amount calculated by multiplying the number of days that a covered entity is not in compliance with such section by an amount not greater than $11,000.</text></clause><clause id="ID1DC82113313A468DA397DDA064AD5433"><enum>(ii)</enum><header>Treatment of
 violations of section 3</header><text>For purposes of paragraph (1)(C) with regard to a violation of section 3, the amount determined under this paragraph is the amount calculated by multiplying the number of violations of such section by an amount not greater than $11,000. Each failure to send notification as required under section 3 to a resident of the State shall be treated as a separate violation.</text></clause></subparagraph><subparagraph id="ID2431BB36EF0B4AE49082107D8AE1C2DC"><enum>(B)</enum><header>Adjustment for
 inflation</header><text>Beginning on the date that the Consumer Price Index is first published by the Bureau of Labor Statistics that is after 1 year after the date of enactment of this Act, and each year thereafter, the amounts specified in clauses (i) and (ii) of subparagraph (A) and in clauses (i) and (ii) of subparagraph (C) shall be increased by the percentage increase in the Consumer Price Index published on that date from the Consumer Price Index published the previous year.</text></subparagraph><subparagraph id="IDE5A3158996DF4D9D97271FC13CFD11E3"><enum>(C)</enum><header>Maximum total
 liability</header><text>Notwithstanding the number of actions which may be brought against a covered entity under this subsection, the maximum civil penalty for which any covered entity may be liable under this subsection shall not exceed—</text><clause id="IDA764A3C21D5D43DD8BAD99F1DABC82A7"><enum>(i)</enum><text>$5,000,000 for each violation of section 2; and</text></clause><clause id="IDD23B4ADEBB674AAE9F97FC5F2238838E"><enum>(ii)</enum><text>$5,000,000 for all violations of section 3 resulting from a single breach of security.</text></clause></subparagraph></paragraph><paragraph id="ID03493A0E4E324CD5B458DACBFF3DFEE8"><enum>(3)</enum><header>Intervention by
		the FTC</header><subparagraph id="ID781458A56F4C41DCBA51451B21908447"><enum>(A)</enum><header>Notice and
 intervention</header><text>The State shall provide prior written notice of any action under paragraph (1) to the Commission and provide the Commission with a copy of its complaint, except in any case in which such prior notice is not feasible, in which case the State shall serve such notice immediately upon commencing such action. The Commission shall have the right—</text><clause id="ID7DCC07B24C754F83B6A6D072CC6D9AC9"><enum>(i)</enum><text>to intervene in the action;</text></clause><clause id="ID4868BE5301FB4CD49FD58CBB196CE3E8"><enum>(ii)</enum><text>upon so intervening, to be heard on all matters arising therein; and</text></clause><clause id="IDE7B036AB0F4647CF9189F70A8A737FBC"><enum>(iii)</enum><text>to file petitions for appeal.</text></clause></subparagraph><subparagraph id="IDC86DC526315147E4BFC3FA3705552986"><enum>(B)</enum><header>Limitation on
 State action while Federal action is pending</header><text>If the Commission has instituted a civil action for violation of this Act, no State attorney general, or official or agency of a State, may bring an action under this subsection during the pendency of that action against any defendant named in the complaint of the Commission for any violation of this Act alleged in the complaint.</text></subparagraph></paragraph><paragraph id="ID2DCE6A5CCDFC4233A0F729195E1C12B6"><enum>(4)</enum><header>Construction</header><text>For purposes of bringing any civil action under paragraph (1), nothing in this Act shall be construed to prevent an attorney general of a State from exercising the powers conferred on the attorney general by the laws of that State—</text><subparagraph id="IDA3BCB40CE36D48509F3B28515FF35933"><enum>(A)</enum><text>to conduct investigations;</text></subparagraph><subparagraph id="ID4F5C79882A2D41D8931FF82506D5A881"><enum>(B)</enum><text>to administer oaths or affirmations; or</text></subparagraph><subparagraph id="IDBCEE31B8BDE145C7A2AA59C506ACAF1A"><enum>(C)</enum><text>to compel the attendance of witnesses or the production of documentary and other evidence.</text></subparagraph></paragraph></subsection><subsection id="idCC76CED9845C4D9FAF3AC833B99C34D2"><enum>(e)</enum><header>Notice to Law
		Enforcement; Civil Enforcement by Attorney General</header><paragraph id="idB4D7B37D769B4F45A88F57DA7EE99AFA"><enum>(1)</enum><header>In
 general</header><text>The Attorney General may bring a civil action in the appropriate United States district court against any covered entity that engages in conduct constituting a violation of section 4.</text></paragraph><paragraph id="id75090E86CEB44EF0B78FDB00FEA2117E"><enum>(2)</enum><header>Penalties</header><subparagraph id="idEC00424B7D284CBEA89360C6938C1C4A"><enum>(A)</enum><header>In
 general</header><text>Upon proof of such conduct by a preponderance of the evidence, a covered entity shall be subject to a civil penalty of not more than $1,000 per individual whose personal information was or is reasonably believed to have been accessed or acquired as a result of the breach of security that is the basis of the violation, up to a maximum of $100,000 per day while such violation persists.</text></subparagraph><subparagraph id="id76231925676E4488AF91B29DD78CAC3B"><enum>(B)</enum><header>Limitations</header><text>The total amount of the civil penalty assessed under this subsection against a covered entity for acts or omissions relating to a single breach of security shall not exceed $1,000,000, unless the conduct constituting a violation of section 4 was willful or intentional, in which case an additional civil penalty of up to $1,000,000 may be imposed.</text></subparagraph><subparagraph id="id1D7F92C0085141E2970D3EBF5AB08B08"><enum>(C)</enum><header>Adjustment for
 inflation</header><text>Beginning on the date that the Consumer Price Index is first published by the Bureau of Labor Statistics that is after 1 year after the date of enactment of this Act, and each year thereafter, the amounts specified in subparagraphs (A) and (B) shall be increased by the percentage increase in the Consumer Price Index published on that date from the Consumer Price Index published the previous year.</text></subparagraph></paragraph><paragraph id="id309745830BAB477AA75D879CFE80654C"><enum>(3)</enum><header>Injunctive
 actions</header><text>If it appears that a covered entity has engaged, or is engaged, in any act or practice that constitutes a violation of section 4, the Attorney General may petition an appropriate United States district court for an order enjoining such practice or enforcing compliance with section 4.</text></paragraph><paragraph id="idB0E9F668E21E4744AD1034D88F24EA23"><enum>(4)</enum><header>Issuance of
 order</header><text>A court may issue such an order under paragraph (3) if it finds that the conduct in question constitutes a violation of section 4.</text></paragraph></subsection><subsection id="IDf2f07baad0044cd2a8526a2e41683d8b"><enum>(f)</enum><header>Concealment of
		breaches of security</header><paragraph id="idEDD872863398443C894BEE8B22FC2D7B"><enum>(1)</enum><header>In
 general</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/47">Chapter 47</external-xref> of title 18, United States Code, is amended by adding at the end the following:</text><quoted-block display-inline="no-display-inline" id="id7576DA6532C4456681465667C3CFA75C" style="USC"><section id="IDb2e96de48bfe4d1f824f0fe387743af6"><enum>1041.</enum><header>Concealment
		  of breaches of security involving personal information</header><subsection id="ID695bb7e91f7e4619aa39f92f4827f005"><enum>(a)</enum><header>In
 general</header><text>Any person who, having knowledge of a breach of security and of the fact that notification of the breach of security is required under the <short-title>Data Security and Breach Notification Act of 2015</short-title>, intentionally and willfully conceals the fact of the breach of security, shall, in the event that the breach of security results in economic harm to any individual in the amount of $1,000 or more, be fined under this title, imprisoned for not more than 5 years, or both.</text></subsection><subsection commented="no" id="ID6a2199e1e201478996fb8c5cd80287fd"><enum>(b)</enum><header>Person
 defined</header><text>For purposes of subsection (a), the term <term>person</term> has the same meaning as in section 1030(e)(12) of this title.</text></subsection><subsection id="ID72f4b649c67a4e439ad8c688773fba09"><enum>(c)</enum><header>Enforcement
		  authority</header><paragraph id="ID34f113750517446593414bf6a9c50a46"><enum>(1)</enum><header>In
 general</header><text>The United States Secret Service and the Federal Bureau of Investigation shall have the authority to investigate offenses under this section.</text></paragraph><paragraph id="ID4ba1e01c74ef4ba2b21c0bda43738a17"><enum>(2)</enum><header>Construction</header><text>The authority granted in paragraph (1) shall not be exclusive of any existing authority held by any other Federal agency.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph id="IDdc04a1c0adb34472954422f55fd99f2b"><enum>(2)</enum><header>Conforming and
 technical amendments</header><text display-inline="yes-display-inline">The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/47">chapter 47</external-xref> of title 18, United States Code, is amended by adding at the end the following:</text><quoted-block display-inline="no-display-inline" id="id9E4CE6C2FDE14FF4A7AF606B506D0A4B" style="OLC"><toc><toc-entry bold="off" level="section">1041. Concealment of breaches of
		  security involving personal
 information.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="IDB61DA131AAB2425BA2277C2181BA4456"><enum>6.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="ID841528D2066049A0AE1162EDDF060D3D"><enum>(1)</enum><header>Breach of security</header><subparagraph id="idDA7FB9B38B114B56AC76F9C6E122D4DD"><enum>(A)</enum><header>In general</header><text>The term <term>breach of security</term> means compromise of the security, confidentiality, or integrity of, or loss of, data in electronic form that results in, or there is a reasonable basis to conclude has resulted in, unauthorized access to or acquisition of personal information from a covered entity.</text></subparagraph><subparagraph id="idBD50ECD97D7E4931A30F8B2F071BE3F3"><enum>(B)</enum><header>Exclusions</header><text>The term <term>breach of security</term> does not include—</text><clause id="idD9EBBEC9726E48698C245CC526CC6E92"><enum>(i)</enum><text>a good faith acquisition of personal information by a covered entity, or an employee or agent of a covered entity, if the personal information is not subject to further use or unauthorized disclosure;</text></clause><clause id="idE97DDCDE829F4B119F6DF45973F9B5F9"><enum>(ii)</enum><text>any lawfully authorized investigative, protective, or intelligence activity of a law enforcement or an intelligence agency of the United States, a State, or a political subdivision of a State; or</text></clause><clause id="idB938C1D8D28F4680A737DFAB49F07D8F"><enum>(iii)</enum><text>the release of a public record not otherwise subject to confidentiality or nondisclosure requirements.</text></clause></subparagraph></paragraph><paragraph id="IDEEC1A663EB864148A27C2F7A312D19BA"><enum>(2)</enum><header>Commission</header><text>The term <term>Commission</term> means the Federal Trade Commission.</text></paragraph><paragraph id="ID21E4CEB3EC2B422D96A90A02AC82E2F5"><enum>(3)</enum><header>Covered
 entity</header><text>The term <term>covered entity</term> means a sole proprietorship, partnership, corporation, trust, estate, cooperative, association, or other commercial entity, and any charitable, educational, or nonprofit organization, that acquires, maintains, or utilizes personal information.</text></paragraph><paragraph id="IDED9D689D6E034A7DA263A708F7DBF4E6"><enum>(4)</enum><header>Data in
 electronic form</header><text>The term <term>data in electronic form</term> means any data stored electronically or digitally on any computer system or other database, including recordable tapes and other mass storage devices.</text></paragraph><paragraph id="idA93B91F3E7DB424C845005E52E8182AA"><enum>(5)</enum><header>Designated
 entity</header><text>The term <term>designated entity</term> means the Federal Government entity designated by the Secretary of Homeland Security under section 4.</text></paragraph><paragraph id="ID37C5A405BEDA4169B3278492F74A3792"><enum>(6)</enum><header>Encryption</header><text>The term <term>encryption</term> means the protection of data in electronic form in storage or in transit using an encryption technology that has been adopted by an established standards setting body which renders such data indecipherable in the absence of associated cryptographic keys necessary to enable decryption of such data. Such encryption must include appropriate management and safeguards of such keys to protect the integrity of the encryption.</text></paragraph><paragraph commented="no" id="ID060E7E105D5E4A8D9A56291E96237E80"><enum>(7)</enum><header>Identity
 theft</header><text>The term <term>identity theft</term> means the unauthorized use of another person's personal information for the purpose of engaging in commercial transactions under the identity of such other person, including any contact that violates section 1028A of title 18, United States Code.</text></paragraph><paragraph id="ID3750ADAF7DD2451287C78F3401EAABE8"><enum>(8)</enum><header>Major credit
 reporting agency</header><text>The term <term>major credit reporting agency</term> means a consumer reporting agency that compiles and maintains files on consumers on a nationwide basis within the meaning of section 603(p) of the <act-name parsable-cite="FCRA">Fair Credit Reporting Act</act-name> (<external-xref legal-doc="usc" parsable-cite="usc/15/1681a">15 U.S.C. 1681a(p)</external-xref>).</text></paragraph><paragraph id="ID5E7C481EE74F40949070842FF769BE33"><enum>(9)</enum><header>Personal
 information</header><subparagraph id="id2ba3ac67-588f-4d9a-ac2b-b6cdcc306b70"><enum>(A)</enum><header>Definition</header><text>The term <term>personal information</term> means any information or compilation of information that includes—</text><clause id="idCB573E04B2A9409994B0B8AFD6D7FAA0"><enum>(i)</enum><text>a non-truncated social security number;</text></clause><clause id="idD59180EAFFE047F6B4880CAFE5E15519"><enum>(ii)</enum><text>a financial account number or credit or debit card number in combination with any security code, access code, or password that is required for an individual to obtain credit, withdraw funds, or engage in a financial transaction; or</text></clause><clause id="id2367a167-714b-4676-9e01-f2ffce4f0097"><enum>(iii)</enum><text>an individual’s first and last name or first initial and last name in combination with—</text><subclause id="ide1f370eb-da87-4b7c-bada-753b20ce84d3"><enum>(I)</enum><text>a driver’s license number, a passport number, or an alien registration number, or other similar number issued on a government document used to verify identity;</text></subclause><subclause id="id43817f41-cd74-4962-b714-366e55ffe4cd"><enum>(II)</enum><text>unique biometric data such as a finger print, voice print, retina or iris image, or any other unique physical representation;</text></subclause><subclause id="id2B4121793C664DA794B882110CB93C95"><enum>(III)</enum><text>a unique account identifier, electronic identification number, user name, or routing code in combination with any associated security code, access code, or password that is required for an individual to obtain money, goods, services, or any other thing of value; or</text></subclause><subclause id="ide1e0d1d2-b793-47b3-9c7a-8063d9c2b392"><enum>(IV)</enum><text>2 of the following:</text><item id="id34b85cd8-8f83-41f9-bb46-54b2cd21a93d"><enum>(aa)</enum><text>Home address or telephone number.</text></item><item id="id9a0b5afb-8b39-42b7-bd9d-69dcac681312"><enum>(bb)</enum><text>Mother’s maiden name, if identified as such.</text></item><item id="id5433edaf-d05b-4260-973f-bc916afe8769"><enum>(cc)</enum><text>Month, day, and year of birth.</text></item></subclause></clause></subparagraph><subparagraph id="IDB581CF8A1C02425FAD23363EDC79000A"><enum>(B)</enum><header>Modified
 definition by rulemaking</header><text>If the Commission determines that the definition under subparagraph (A) is not reasonably sufficient to protect individuals from identity theft, fraud, or other unlawful conduct, the Commission by rule promulgated under section 553 of title 5, United States Code, may modify the definition of <quote>personal information</quote> under subparagraph (A) to the extent the modification will not unreasonably impede interstate commerce.</text></subparagraph></paragraph><paragraph id="IDF12A4FF6D599444AA87B6113D445555C"><enum>(10)</enum><header>Service
 provider</header><text>The term <term>service provider</term> means a person that provides electronic data transmission, routing, intermediate and transient storage, or connections to its system or network, where the person providing such services does not select or modify the content of the electronic data, is not the sender or the intended recipient of the data, and does not differentiate personal information from other information that such person transmits, routes, or stores, or for which such person provides connections. Any such person shall be treated as a service provider under this Act only to the extent that it is engaged in the provision of such transmission, routing, intermediate and transient storage, or connections.</text></paragraph></section><section id="ID094F3B56C9BC4C1D96EB37077963C353"><enum>7.</enum><header>Effect on
		other laws</header><subsection id="IDC2E7B99E8AA840F6800805C80A728133"><enum>(a)</enum><header>Preemption of
 state information security laws</header><paragraph id="id36165BF4D46E495281170DD366607B5F"><enum>(1)</enum><header>Covered entities under section <enum-in-header>5(a)</enum-in-header></header><text>With respect to a covered entity subject to the Act under section 5(a), this Act supersedes any provision of a statute, regulation, or rule of a State or political subdivision of a State that expressly—</text><subparagraph id="IDB323B7E95C0B40989BCEED1553F49E2E"><enum>(A)</enum><text>requires information security practices and treatment of data containing personal information similar to any of those required under section 2; or</text></subparagraph><subparagraph id="ID893F0650F05D41A98B051E25EE2046A7"><enum>(B)</enum><text>requires notification to individuals of a breach of security as defined in section 6.</text></subparagraph></paragraph><paragraph id="idB80EC77253AE48BBBF02B9EAFA95C2A6"><enum>(2)</enum><header>Covered entities under section <enum-in-header>5(b)</enum-in-header></header><text>With respect to a covered entity subject to the Act under section 5(b), this Act supersedes any provision of a statute, regulation, or rule of a State or political subdivision of a State that expressly requires notification to individuals of a breach of security as defined in section 6.</text></paragraph></subsection><subsection id="ID69670A7988674C81B0B82D6411F1E4D5"><enum>(b)</enum><header>Additional
		preemption</header><paragraph id="IDA6CBA7132F03485184F30F34CBB6BAF4"><enum>(1)</enum><header>In
 general</header><text>No person other than a person specified in section 5(d) may bring a civil action under the laws of any State if such action is premised in whole or in part upon the defendant violating any provision of this Act.</text></paragraph><paragraph id="IDEC194A851333493C9093DDD6583FF28E"><enum>(2)</enum><header>Protection of
 consumer protection laws</header><text>Except as provided in subsection (a) of this section, this subsection shall not be construed to limit the enforcement of any State consumer protection law by an attorney general of a State.</text></paragraph></subsection><subsection id="ID44A38B1DD6EE4802BDE822590B433F2F"><enum>(c)</enum><header>Protection of
 certain State laws</header><text>This Act shall not be construed to preempt the applicability of—</text><paragraph id="ID2E2BFAC9A5B44D0EA5A32B766977662F"><enum>(1)</enum><text>State trespass, contract, or tort law; or</text></paragraph><paragraph id="IDC57F2F920E854316AE3F792693BA7973"><enum>(2)</enum><text>any other State laws to the extent that those laws relate to acts of fraud.</text></paragraph></subsection><subsection id="ID36FD5D0ABC6A4155B62C9FE38EB1A085"><enum>(d)</enum><header>Preservation of
 FTC authority</header><text>Nothing in this Act may be construed in any way to limit or affect the Commission's authority under any other provision of law.</text></subsection></section><section id="IDE1D532141A1443FD8B48150301B16E42"><enum>8.</enum><header>Effective
 date</header><text display-inline="no-display-inline">This Act and the amendments made by this Act shall take effect 1 year after the date of enactment of this Act.</text>
		</section></legis-body>
</bill>


