BILL ANALYSIS Ó ----------------------------------------------------------------- |SENATE RULES COMMITTEE | AB 1710| |Office of Senate Floor Analyses | | |1020 N Street, Suite 524 | | |(916) 651-1520 Fax: (916) | | |327-4478 | | ----------------------------------------------------------------- THIRD READING Bill No: AB 1710 Author: Dickinson (D) and Wieckowski (D) Amended: 8/19/14 in Senate Vote: 21 SENATE JUDICIARY COMMITTEE : 5-2, 6/24/14 AYES: Jackson, Corbett, Lara, Leno, Monning NOES: Anderson, Vidak ASSEMBLY FLOOR : 43-25, 5/27/14 - See last page for vote SUBJECT : Personal information: privacy SOURCE : Author DIGEST : This bill requires, with respect to the information required to be included in the notification of a data security breach, if the person or business providing the notification was the source of the breach, that the person or business offer to provide appropriate identity theft prevention and mitigation services, if any, to the affected person at no cost for not less than 12 months if the breach exposed or may have exposed specified personal information; expands existing security practice and procedure provisions to businesses that own, license, or maintain personal information about a California resident, as specified; and expands on security procedures and practice provisions that apply to businesses that own, license, or maintain personal information about California residents and prohibit the sale, advertisement for sale, or offer to sell of an individual's social security number (SSN), with exceptions. CONTINUED AB 1710 Page 2 Senate Floor Amendments of 8/19/14 strike provisions that required that the person or business that maintains data to notify consumers and major statewide media following a data breach, and clarify the prohibition on the release of an individual's SSN for marketing purposes. ANALYSIS : Existing law requires a business that owns or licenses personal information about a California resident to implement and maintain reasonable security procedures and practices appropriate to the nature of the information, to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Existing law further provides that a business that discloses personal information about a California resident pursuant to a contract with a nonaffiliated third party shall require by contract that the third party implement and maintain reasonable security procedures and practices appropriate to the nature of the information, to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Existing law requires any agency, person, or business that owns or licenses computerized data that includes personal information to disclose a breach of the security of the system to any California resident whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. The disclosure must be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as specified. Existing law requires any agency, person, or business that maintains computerized data that includes personal information that the agency, person, or business does not own to notify the owner or licensee of the information of any security breach immediately following discovery if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person. Existing law defines "personal information," for purposes of the breach notification statute, to include the individual's first name or first initial and last name in combination with one or CONTINUED AB 1710 Page 3 more of the following data elements, when either the name or the data elements are not encrypted: SSN; driver's license number or California Identification Card number; account number, credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual's financial account; medical information; or health insurance information. "Personal information" does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. This bill applies the above security practices and notification requirements to businesses that maintain personal information. This bill requires, if the person or business providing the notification was the source of the breach, an offer to provide appropriate identity theft prevention and mitigation services, if any, to be provided at no cost to the affected person for not less than 12 months, along with all information necessary to take advantage of the offer to any person whose information was or may have been breached if the breach exposed or may have exposed personal information. Existing law prohibits businesses from requesting or requiring as a condition to accepting a credit card as payment, any personal identification information related to the cardholder, but authorizes a business that accepts credit cards to require, as a condition of accepting the card that the cardholder provides reasonable forms of identification, including, but not limited to, a driver's license or state identification card, provided that the identification is not written or recorded. Existing law prohibits a person or entity from publicly posting or publicly displaying a person's SSN and defines "publicly post" or "publicly display" to mean intentionally communicating or otherwise making available to the general public. Existing law prohibits a person or entity from taking specified actions that might compromise an individual's SSN, including printing an SSN on any card required to access goods or services, requiring a person to transmit an SSN over the Internet without a secure connection or encryption, requiring a person to use his/her SSN to access an Internet Web site, except as specified, or printing an individual's SSN on any materials CONTINUED AB 1710 Page 4 that are mailed to the individual, unless the SSN is required to be on the mailed document by state or federal law. This bill prohibits a person or entity from selling, advertising for sale, or offering to sell an individual's SSN. This bill provides that "sell" does not include the release of an individual's SSN if the release of the SSN is incidental to a larger transaction and is necessary to identify the individual in order to accomplish a legitimate business purpose. Release of an individual's SSN for marketing purposes is not permitted. This bill also provides that "sell" does not include the release of an individual's SSN for a purpose specifically authorized or specifically allowed by federal or state law. This bill clarifies that the release of an SSN for the purpose of marketing is not a legitimate business purpose. Background On December 19, 2013, Target Corporation announced that it had suffered a major data breach. During the height of the Christmas shopping season, hackers infiltrated the retailer's point-of-sale network and stole the debit and credit card information of an estimated 40 million Target shoppers. As forensic investigations into the breach progressed, Target announced that the personally identifying information of approximately 70 million Target customers had also been stolen from the retailer's computer network. According to press reports, it appeared that the hackers behind the breach successfully penetrated and lurked within Target's systems months before the breach occurred, remaining undetected while waiting for the start of the holiday shopping season before striking. The Target data breach - the second largest in United States history - will have wide-ranging impacts on both consumers and industry for a long time to come. In the short-term, an untold number of Californians whose card numbers or personal information was stolen will be at greater risk of identity theft and payment card fraud. Financial institutions have already expended over $170 million to reissue over 17 million credit and debit cards that were compromised by the breach, a number likely CONTINUED AB 1710 Page 5 to grow over time. (See http://www.cbanet.org.) Multiple class-action lawsuits have also been filed in jurisdictions across the country, and the Attorneys General of several states have initiated investigations into the breach. Businesses that were not directly affected by the breach are re-examining their internal security, and many are likely to redouble efforts to protect their networks from similar sorts of intrusions. Both the upscale retailer Neiman Marcus and the craft store Michaels also reported data breaches during the 2013 holiday season. Indeed, in a notification circulated to certain retailers in January, the Federal Bureau of Investigation revealed that the point-of-sale networks of no fewer than twenty retailers were attacked by hackers in 2013. Furthermore, the scope of computer networks targeted by hackers intent on stealing sensitive personal and financial information extends far beyond the retail sector. According to a database of breaches maintained by the Privacy Rights Clearinghouse, nearly 200 different organizations were subject to malicious hacking during the 13 months that began in January 2013. (See http://www.privacyrights.org/data-breach.) Besides retail, the affected organizations spanned across the hospitality, education, health care, telecommunications, news media, social media, financial, and gaming sectors. Since 2005, over 660 million records have been compromised in more than 4,100 publicly acknowledged data breaches. The scale of recent attacks against major retailers has drawn particular attention to the vulnerability of electronic payment systems and to fraud prevention and data security efforts within the retail environment. Fundamentally, electronic payment systems cannot function without the trust of those who use them. Customers want assurances that their personal information is safe when they swipe a credit or debit card at a point-of-sale terminal, or when they provide credit or debit card information to a merchant online. Retailers, card issuers, card networks, and payment processors want assurances that customers who use a card or card number in a transaction actually own or are authorized to use the card. The task of safeguarding consumers' personal and financial information has become a multi-billion dollar industry populated by thousands of participants, each with a slightly different role in a vast and extremely complex payment network. The CONTINUED AB 1710 Page 6 variation and complexity of the payment card space and the multitude of different entities that occupy it cannot and should not be underestimated, but must be understood if policymakers are to ensure the security of sensitive information within the retail environment. On February 25, 2014, the Senate Banking and Financial Institutions Committee and the Senate Judiciary Committee jointly convened an informational hearing titled, "Beyond the Breach: Protecting Consumers' Personal Information in the Retail Environment." That joint hearing reviewed retail electronic payment systems and gave members of the Committees and other interested parties an opportunity to ask experts from across the industry about efforts to combat fraud, prevent data breaches, and keep sensitive personal and financial information safe. The Assembly Banking and Finance Committee and the Assembly Judiciary Committee also held an oversight hearing to discuss the current process for data breaches and how California can improve this process, titled, "Is Our Personal Data Really Safe and Secure: A Review of the Recent Data Breaches." Prior Legislation SB 46 (Corbett, Chapter 396, Statutes of 2013) revised certain data elements included within the definition of personal information under California's Data Breach Notification Law, by adding certain information that would permit access to an online account and imposed additional requirements on the disclosure of a breach of the security of the system or data in situations where the breach involves personal information that would permit access to an online or email account. AB 555 (Salas, Chapter 103, Statutes of 2013) provided an exemption from the prohibition on posting or publicly releasing a person's SSN for an adult state correctional facility, an adult city jail, or an adult county jail, that releases an inmate's SSN, with the inmate's consent and upon request by the county veterans service officer or the United States Department of Veterans Affairs, for the purposes of determining the inmate's status as a military veteran and his/her eligibility for federal, state, or local veterans' benefits or services. SB 24 (Simitian, Chapter 197, Statutes of 2011) required any agency, person, or business that is required to issue a security CONTINUED AB 1710 Page 7 breach notification pursuant to existing law to fulfill certain additional requirements pertaining to the security breach notification, and required any agency, person, or business that is required to issue a security breach notification to more than 500 California residents to electronically submit a single sample copy of that security breach notification to the Attorney General. AB 1950 (Wiggins, Chapter 877, Statutes of 2004) required a business that owns or licenses personal information about a California resident to implement and maintain reasonable security procedures and practices to protect personal information from unauthorized access, destruction, use, modification, or disclosure. AB 1950 also required a business that discloses personal information to a nonaffiliated third party, to require by contract that those entities maintain reasonable security procedures. AB 763 (Liu, Chapter 532, Statutes of 2003) prohibited a SSN that is otherwise permitted to be mailed from being printed, in whole or in part, on a postcard or other mailer or visible on the envelope or without the envelope having been opened. SB 1936 (Peace, Chapter 915, Statutes of 2002) enacted California's Data Breach Notification Law and required a state agency, or a person or business that conducts business in California, that owns or licenses computerized data that includes personal information to disclose any breach of the security of the data to California's residents whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. SB 1936 permitted notifications to be delayed if a law enforcement agency determines that it would impede a criminal investigation, and required an agency, person, or business that maintains computerized data that includes personal information owned by another to notify the owner or licensee of the information of any breach of security of the data. SB 168 (Bowen, Chapter 720, Statutes of 2001) prohibited any person or entity, not including a state or local agency, from using an individual's SSN in certain ways, including posting it publicly or requiring it for access to products or services. FISCAL EFFECT : Appropriation: No Fiscal Com.: No Local: CONTINUED AB 1710 Page 8 No SUPPORT : (Verified 8/20/14) American Civil Liberties Union Consumer Attorneys of California Consumer Federation of California Consumer Watchdog Privacy Rights Clearinghouse ARGUMENTS IN SUPPORT : The author writes: AB 1710 stems from the recent mega data breaches affecting specified retailers. Following these mega data breaches, the Assembly Banking and Finance Committee and the Assembly Judiciary Committee held an oversight hearing to discuss the current process for data breaches and how California can improve this process, titled, "Is Our Personal Data Really Safe and Secure: A Review of the Recent Data Breaches." AB 1710 addresses the issues raised at this hearing and reflects the areas of law that need clarification. The recent examples of mega data breaches emphasized the importance of disclosure and accountability. All too often, data breaches happen and consumers receive a notice in the mail from a financial institution stating their personal information may have been breached. The consumer is not made aware where the personal information was compromised and might interpret the letter to believe the breach occurred at the financial institution. Under existing law, financial institutions are considered the owners of personal information and therefore must provide the notification, although the breach most often did not occur at a bank or credit union. AB 1710 will provide clarity to consumers because it will require the maintainers of personal information which could be a retailer to disclose to a consumer that a breach occurred and their personal information may have been breached. This allows a consumer to: (1) be proactive by contacting their financial institution and/or credit reporting agency; and (2) have the option to not shop at a retail establishment that may not maintain personal information in a safe and secure manner. ASSEMBLY FLOOR : 43-25, 5/27/14 AYES: Alejo, Ammiano, Bloom, Bocanegra, Bonilla, Bonta, Bradford, Ian Calderon, Campos, Chau, Chesbro, Cooley, CONTINUED AB 1710 Page 9 Dababneh, Dickinson, Fong, Garcia, Gatto, Gomez, Gonzalez, Gordon, Gray, Hall, Roger Hernández, Holden, Jones-Sawyer, Levine, Lowenthal, Mullin, Nazarian, Perea, John A. Pérez, Quirk, Rendon, Ridley-Thomas, Rodriguez, Skinner, Stone, Ting, Weber, Wieckowski, Williams, Yamada, Atkins NOES: Achadjian, Allen, Bigelow, Chávez, Conway, Dahle, Donnelly, Fox, Beth Gaines, Gorell, Grove, Hagman, Harkey, Jones, Linder, Logue, Maienschein, Mansoor, Melendez, Muratsuchi, Nestande, Olsen, Wagner, Waldron, Wilk NO VOTE RECORDED: Brown, Buchanan, Daly, Eggman, Frazier, Medina, Pan, Patterson, V. Manuel Pérez, Quirk-Silva, Salas, Vacancy AL:e 8/20/14 Senate Floor Analyses SUPPORT/OPPOSITION: SEE ABOVE **** END **** CONTINUED