|
paragraph A indicates that the security breach has resulted in | fraud or unauthorized transactions, but do not necessarily | require notice in other circumstances; and |
|
| C.__Are subject to examination for compliance with the | requirements of this chapter by one or more federal | functional regulators, as defined in the federal Gramm- | Leach-Bliley Act, 15 United States Code, Section 6809(2), or | by the Department of Professional and Financial Regulation, | Office of Consumer Credit Regulation with respect to the | operation of the security program and the notification | procedures. |
|
| | 5.__Security breach.__"Security breach" means the compromise | of the security, confidentiality or integrity of computerized | data that results in unauthorized acquisition of and access to | personal information maintained by a business or that creates a | reasonable basis for the conclusion that such acquisition has | occurred.__"Security breach" does not include the good faith | acquisition of personal information by an employee or agent of a | business for the purposes of that business if the personal | information is not used or subject to further unauthorized | disclosure. |
|
| | 6.__Subject person.__"Subject person" means a resident of this | State whose personal information is stored by a business that has | suffered a security breach resulting in the disclosure or | possible disclosure of the resident's personal information. |
|
| | 7.__Substitute notice.__"Substitute notice" means: |
|
| A.__An e-mail notice, if the business has the e-mail | addresses of its customers; |
|
| B.__A conspicuous posting of the notice on a publicly | accessible website of the business; or |
|
| C.__Publication in major media, including newspapers of | general circulation. |
|
| | 8.__System.__"System" means a computerized data storage system | containing personal information. |
|
| §1348.__Database security |
|
| | 1.__Disclosure of security breach to subject person.__A | business that owns or licenses electronic data containing | personal information, following the discovery of a security | breach, shall notify the subject person whose unencrypted | personal information was, or is reasonably believed to have been, | acquired by an unauthorized person. |
|
|