Breach Based on Harm Threshold: YES
Deadline for Consumer Notice: Most expedient time possible without unreasonable delay but no later than 45 days
Government Notification Required: YES
Scope of this Summary
First name or first initial and last name, plus: Social Security number; driver's license or nondriver identification card number, individual taxpayer identification number, passport number, military identification number; or other identification number that originates from a government identification document that is commonly used to verify identity for a commercial transaction; financial account, credit or debit card number, if number could be used without additional identifying information, access codes, or passwords; or account passwords or personal identification numbers or other access codes for a financial account; unique biometric data generated from measurements or technical analysis of human body characteristics used by the owner or licensee of the data to identify or authenticate the consumer, such as a fingerprint, retina or iris image, or other unique physical representation or digital representation of biometric data; genetic information; and health records or records of a wellness program or similar program of health promotion or disease prevention, a health care professional's medical diagnosis or treatment of the consumer, or health insurance policy number.
Form of Covered Info
Encryption Safe Harbor
Timing: Must be made in the most expedient time possible and without unreasonable delay but no later than 45 days after discovery of breach, consistent with any measures to determine scope of the breach and to restore the reasonable integrity, security and confidentiality of the system.
Content: Notice must be clear and conspicuous and include description of: incident in general terms; type of covered info subject to the breach; general acts taken to protect the covered info from further security breach; a telephone number (toll-free, if available) that can be called for further info and assistance; advice to remain vigilant by reviewing account statements and monitoring free credit reports; and approximate date of the security breach. Additional requirements apply to electronic notice.
Method: By written notice, telephone notice (if directly contact the resident via a live call), or electronic notice (if primary method of communication with resident or is consistent with E-SIGN). Substitute notice available if certain criteria are satisfied.