[Senate Report 111-290] [From the U.S. Government Publishing Office] Calendar No. 563 111th Congress Report 2d Session SENATE 111-290 ======================================================================= DATA BREACH NOTIFICATION ACT _______ September 15, 2010.--Ordered to be printed _______ Mr. Leahy, from the Committee on the Judiciary, submitted the following R E P O R T together with ADDITIONAL VIEWS [To accompany S. 139] [Including cost estimate of the Congressional Budget Office] The Committee on the Judiciary, to which was referred the bill (S. 139) to require Federal agencies, and persons engaged in interstate commerce, in possession of data containing sensitive personally identifiable information, to disclose any breach of such information, having considered the same, reports favorably thereon, without amendment, and recommends that the bill do pass. CONTENTS Page I. Background and Purpose of the Data Breach Notification Act.......2 II. History of the Bill and Committee Consideration..................7 III. Section-by-Section Summary of the Bill...........................9 IV. Congressional Budget Office Cost Estimate.......................11 V. Regulatory Impact Evaluation....................................15 VI. Conclusion......................................................15 VII. Additional Views................................................16 VIII.Changes to Existing Law Made by the Bill, as Reported...........20 I. Background and Purpose of the Data Breach Notification Act A. SUMMARY In the first decade of the 21st century, American consumers have borne witness to an explosion in the commerce of digital information. From Government agencies to financial institutions, from doctors' offices to retail stores, entities are collecting and storing sensitive personal information by the gigabyte. Such widespread use of electronic data to identify individuals expedites everyday transactions, with great benefit to consumers: Systems access information faster; businesses conduct individually-tailored transactions more effectively; and Government agencies can now transfer data at lightning speed. Convenience, however, comes hand-in-hand with risks. Cyberspace has become a primary platform for domestic and international crime; data privacy, in turn, is now essential to our individual and collective security. In February of 2009, Director of National Intelligence, Dennis C. Blair provided the following details on the threats, ``spam--unsolicited email that can contain malicious software-- now accounts for 81 percent of all email according to Message Labs (Symantec); the Georgia Tech Information Security Center projects a ten-fold increase in malicious software targeting data in the coming year; and botnets--networks of hijacked computers used to deliver spam or launch distributed denial of service attacks--are expected to compose 15 percent of all online computers in 2009.''\1\ The technology necessary to employ cyber attacks, in other words, is increasingly accessible. It can also be devastatingly dangerous. --------------------------------------------------------------------------- \1\Director of National Intelligence Dennis C. Blair, Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence (Unclassified Version), at 39 (February 12, 2009), available at http://intelligence.senate.gov/090212/blair.pdf. --------------------------------------------------------------------------- Despite the acknowledged threats, however, United States privacy law has failed to keep pace with technological developments. The Data Breach Notification Act aims to enhance data security by ensuring that individuals and law enforcement are notified when sensitive personal information is put at risk and by creating incentives for entities to take steps to secure their data systems. Multiple Federal entities, including the Secret Service, the Federal Trade Commission,\2\ and President George W. Bush's Identity Theft Task Force,\3\ have urged Congress to pass such legislation. It is long past time for Congress to enact a single, national standard for notification in the event of a data breach. --------------------------------------------------------------------------- \2\See Protecting the Privacy of the Social Security Number from Identity Theft: Hearing Before the Subcomm. on Social Security of the H. Comm. on Ways & Means, 110th Cong. 14 (2007) (statement of the Federal Trade Commission), available at http://www.ftc.gov/os/ testimony/P065409socsectest.pdf; Data Breaches and Identity Theft: Hearing Before the S. Comm. on Commerce, Science, and Transportation, 109th Cong. 7 (2005) (statement of the Federal Trade Commission), available at http://www.ftc.gov/os/2005/06/050616databreaches.pdf. \3\President's Identity Theft Task Force, Combating Identity Theft: A Strategic Plan, 34-37 (2007), available at http://www.idtheft.gov/ reports/StrategicPlan.pdf. --------------------------------------------------------------------------- B. INCREASING RISKS FROM DATA BREACHES 1. Identity theft When asked about their daily concerns, consumers in the United States place identity theft at the top of the list. At the Federal Trade Commission, where consumer concerns flood in every day, complaints about identity theft rank above concerns about deceptive advertisements, harassing telemarketing, or unfair credit practices.\4\ In April of 2007, Zogby Interactive Survey found that 91 percent of adult users of the Internet were concerned that their identities might be stolen;\5\ and a September 2009 Unisys Security Index survey found that 65 percent of American respondents were ``seriously concerned'' about misuse of their personal information--more respondents than expressed worry over the H1N1 virus in the headlines at the time.\6\ --------------------------------------------------------------------------- \4\Director of National Intelligence Dennis C. Blair, Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence (Unclassified Version), at 39 (February 12, 2009), available at http://intelligence.senate.gov/090212/blair.pdf. \5\Zogby International, Zogby Poll: Most Americans Worried About Identity Theft, Apr. 3, 2007, www.zogby.com/search/ReadNews.dbm?ID=1275 (last visited Jan. 11, 2010). \6\Unisys Corporation, Unisys Security Index: United States (2009), available at http://www.unisyssecurityindex.com/resources/reports/ US%20Security%20Index%20Oct%2009.pdf. --------------------------------------------------------------------------- Such widespread concerns are not surprising. Security breaches are rampant, and identity theft places a heavy toll on its victims. The Privacy Rights Clearinghouse reports that between 2005 and 2009 security breaches allowed unauthorized access to more than 340 million records containing individuals' sensitive personal information.\7\ --------------------------------------------------------------------------- \7\Privacy Rights Clearinghouse, Chronology of Data Breaches, http://www.privacyrights.org/ar/ChronDataBreaches.htm#CP (last visited Jan. 11, 2010). --------------------------------------------------------------------------- These breaches make clear that vulnerabilities exist across industries, and in entities both public and private. For example, in February 2009, the Federal Aviation Administration announced a breach pursuant to which 45,000 records containing current and former employees' personal information were exposed;\8\ in January 2009, Heartland Payment Systems provided public notice that hackers had installed malicious software on the company's payment processing network and accessed more than 130 million credit card accounts;\9\ in December 2008, Royal Bank of Scotland Group PLC's processing unit, RBS Worldpay, disclosed that a breach of its payment systems had put more than 1.5 million consumers' financial records and more than 1.1 million social security numbers at risk;\10\ earlier that year, State Department officials informed three leading Presidential candidates that contractors had accessed their passport files without authorization;\11\ and in January 2007, TJX Companies, the parent company of retailers Marshalls and TJ Maxx, announced that hackers had accessed information from more than 45 million credit and debit cards.\12\ These breaches present a grave and real threat for consumers, Government, and business entities. --------------------------------------------------------------------------- \8\Joe Davidson, FAA's Latest Security Challenge Is in Cyberspace, Not the Skies, Washington Post, D3 (February 11, 2009). \9\Brian Krebs, Payment Processor Breach May Be Largest Ever, Washington Post Security Fix (January 20, 2009), http:// voices.washingtonpost.com/securityfix/2009/01/ payment_processor_breach_may_b.html. \10\Press Release, RBS WorldPay, RBS WorldPay Announces Compromise of Data Security and Outlines Steps to Mitigate Risks (Dec. 23, 2008), available at http://www.rbsworldpay.us/ RBS_WorldPay_Press_Release_Dec_23.pdf. \11\Amy Schatz, Congress Raises Call for Data Safeguards, Wall Street Journal, A4 (March 30, 2008). \12\TJX Says Theft of Credit Data Involved 45.7 Million Cards, New York Times, C2 (March 30, 2007). --------------------------------------------------------------------------- Once information is obtained, the potential for harm is great. Financial account numbers are sold cheaply on the Internet black market, with a Russian website advertising stolen credit card numbers with limits above $10,000 at the price of $50 for a batch of ten as early as 2004.\13\ Debit card numbers may be used to siphon money globally from automatic teller machines. And sensitive personally identifiable information may be used for acts as various as opening fraudulent credit accounts, leasing property under false names, evading sanctions by providing false identities to law enforcement, and stalking. --------------------------------------------------------------------------- \13\Brian Krebs, Phishing Feeds Internet Black Markets, WashingtonPost.com (November 10, 2004), http://www.washingtonpost.com/ wp-dyn/articles/A59347-2004Nov18.html. --------------------------------------------------------------------------- These immediate harms are not the only concerns. Victims of identity theft who suffer no direct financial loss may find their credit ruined and their lives disrupted as they spend upwards of 80 hours to restore their records.\14\ --------------------------------------------------------------------------- \14\Jon Swartz, Survey: ID Theft Takes Time to Wipe Clean, USA Today, B1 (July 28, 2005). --------------------------------------------------------------------------- Data breaches cost U.S. businesses as well. In 2008, the average cost to private companies was $6.65 million per data breach.\15\ Adding to such direct costs is the revenue lost when consumers decrease purchases based on fear of identity theft. In 2006, 30 percent of consumers polled by the Wall Street Journal said that they limited their online purchases because of such fears, and 24 percent said they had cut back on online banking.\16\ --------------------------------------------------------------------------- \15\Ponemon Institute, Fourth Annual U.S. Cost of Data Breach Survey (2009), available at http://www.ponemon.org/local/upload/ fckjail/generalcontent/18/file/2008- 2009%20US%20Cost%20of%20Data%20Breach%20Report%20Final.pdf. \16\Jennifer Cummings, Substantial Numbers of U.S. Adults Taking Steps to Prevent Identity Theft, Harris Interactive & Wall Street Journal Online, May 18, 2006, http://www.harrisinteractive.com/news/ allnewsbydate.asp?NewsID=1058. --------------------------------------------------------------------------- 2. Organized crime and cybersecurity Today's larger, more carefully targeted, and more sophisticated data breaches are increasingly perpetrated by organized crime rings working across national boundaries. In the past year alone, Federal prosecutors indicted an American and two Russian co-conspirators for installing malicious software in grocers' payment systems to fraudulently obtain more than 4.2 million credit and debit card accounts,\17\ and individuals from Russia, Estonia, and Moldova for using sophisticated hacking techniques to compromise RBS Worldpay's data encryption protection and gain access to over 1.5 million financial accounts and 1.1 million social security numbers.\18\ --------------------------------------------------------------------------- \17\Jerry Harkavy, Illicit Software Placed on Hannaford Servers Blamed for Breach of 4.2 Million Cards, Brattleboro Reformer (March 28, 2008). \18\Press Release, Federal Bureau of Investigation, International Effort Defeats Major Hacking Ring (November 10, 2009), available at http://atlanta.fbi.gov/dojpressrel/pressrel09/atl111009.htm. --------------------------------------------------------------------------- Intrusions by cybercriminals and foreign states have also placed sensitive military information, valuable intellectual property, and essential infrastructure at risk. As documented by the Office of the Director of National Intelligence, nations, including Russia and China, have the technological capability to collect intelligence information from U.S.-based networks and to use such networks to interfere with our national infrastructure, and ``terrorist groups, including al- Qa'ida, HAMAS, and Hizballah, have expressed the desire to use cyber means to target the United States.''\19\ In 2009 alone, we have seen computer technology utilized to penetrate civilian air traffic control networks,\20\ the U.S. electrical grid,\21\ defense projects such as the Pentagon's Joint Strike Fighter project,\22\ and live video feeds from operational U.S. Predator drones.\23\ The United States as a Nation, like each individual American consumer, can no longer afford to take data security for granted. --------------------------------------------------------------------------- \19\Director of National Intelligence Dennis C. Blair, Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence (Unclassified Version), at 39 (Feb. 12, 2009), available at http://intelligence.senate.gov/090212/blair.pdf. \20\Siobhan Gorman, FAA's Air-Traffic Networks Breached by Hackers, Wall Street Journal, A4 (May 7, 2009). \21\Siobhan Gorman, Electricity Grid in U.S. Penetrated by Spies, Wall Street Journal, A1 (April 8, 2009). \22\Siobhan Gorman, August Cole, & Yochi Dreazen, Computer Spies Breach Fighter-Jet Project, Wall Street Journal, A1 (April 11, 2009). \23\Siobhan Gorman, August Cole, & Yochi Dreazen, Insurgents Hack U.S. Drones, Wall Street Journal, A4 (December 17, 2009). --------------------------------------------------------------------------- To track the use of new technologies for disrupting computer networks, to trace profits obtained via technological theft, and to apprehend those responsible for breaches, Federal law enforcement needs information about cyber crimes to effectively safeguard individuals and the national security. C. THE DATA BREACH NOTIFICATION ACT Federal data breach notification legislation is an essential step toward protecting data security in the United States. The Data Breach Notification Act would serve the dual purpose of informing consumers when their personal information is at risk and informing Federal law enforcement when a breach has occurred. The bill provides a single Federal standard--ensuring that U.S. consumers receive notice of a breach wherever they live, that businesses have clear notification standards to follow across State lines, and that Federal law enforcement receives the information it needs to protect public safety and national security. Supporters of the legislation include Consumers Union and the Business Software Alliance. 1. Providing notice to consumers First, S. 139 requires that a business or Government entity that experiences a data breach promptly notify any consumer whose sensitive personally identifiable information has been exposed. In 2002, California led the nation by enacting S.B. 1386, the first State law to require that businesses notify consumers in the event of a breach.\24\ Today, there is national consensus that such notice is necessary to allow consumers to take steps to prevent identity theft. Forty-five States, the District of Columbia, Puerto Rico, and the Virgin Islands currently have laws requiring that consumers receive notice of data breaches. --------------------------------------------------------------------------- \24\Cal. Civ. Code Sec. Sec. 1798.29, .82, .84. --------------------------------------------------------------------------- The bill strikes a careful balance between over- notification and underreporting of data breaches. Section 3(b) provides a safe harbor releasing an entity from the obligation to notify consumers if there is ``no significant risk that a security breach has resulted in, or will result in, harm to the individual.'' This notification trigger recognizes that there are harms other than identity theft that can result from a data breach--harms such as financial crimes and stalking--while simultaneously acknowledging that consumers may not respond to notices if they arrive frequently when there is no risk of harm. The bill provides additional exemptions to the notice requirement when a law enforcement or national security reason counsels against immediate notice and allows reasonable delay for an entity to conduct a risk assessment to determine the threat posed by a breach. The requirements for notice are specific. Individuals must be notified in writing, by telephone, or by email if they have consented to such notice. When a breach places the sensitive personally identifiable information of more than 5,000 residents of a State at risk, notice must also be provided according to Section 4(2) through major media outlets in the State. 2. Increasing law enforcement capabilities to protect and enhance cybersecurity Second, to enhance Federal law enforcement's capabilities in fighting cybercrime, S. 139 mandates that notice immediately be provided to the Secret Service in the event that a breach involves unauthorized access to more than 10,000 individuals' sensitive personally identifiable information or to a database containing the sensitive personally identifiable information of more than 1,000,000 individuals nationwide. The bill also empowers the Secret Service to obtain additional information about the data breach from business entities and requires that it provide further notice to Federal agencies such as the Federal Bureau of Investigation, the U.S. Postal Inspection Service, and State Attorneys General, who may be involved in preventing further harm from the breach or the perpetration of additional breaches. In Congressional testimony, the Department of Justice has specifically urged Congress to require security breach reporting to Federal law enforcement, including both the U.S. Secret Service and the Federal Bureau of Investigation. This law is intended to ensure that law enforcement receives such notice of data breaches.\25\ Additionally, as highlighted in the President's 2009 Cyberspace Policy Review, partnerships among Government agencies, law enforcement, and private industry are essential to addressing cybersecurity-related risks.\26\ The bill is intended to facilitate interagency and public-private cooperation to solve and prevent data breaches. --------------------------------------------------------------------------- \25\Identify Theft: A Victims Bill of Rights: Hearing Before the Subcomm. on Information Policy, Census and National Archives of the H. Comm. on Oversight and Government Reform, 111th Cong. 9 (2009) (statement of Deputy Assistant Attorney General Jason M. Weinstein), available at http://oversight.house.gov/images/stories/documents/ 20090617111143.pdf. \26\Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, at iv (May 29, 2009), available at http://www.whitehouse.gov/assets/documents/ Cyberspace_Policy_Review_final.pdf. --------------------------------------------------------------------------- 3. Enforcement Third, S. 139 contains strong civil enforcement provisions. The bill authorizes State Attorneys General, or the U.S. Attorney General, to bring a civil enforcement action against violators of the bill's notification requirements and to recover a civil penalty of not more than $1,000 per affected individual, per day, and a maximum penalty of $1,000,000 per violation, unless the violation is willful or intentional. It is not uncommon for Congress to authorize both Federal and State entities to enforce Federal consumer protection laws. In fact, Federal antitrust laws, the CAN-SPAM Act (Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003), and the Communications Act of 1934 also authorize State Attorneys General to seek damages or to enjoin further Federal law violations. The State enforcement provisions in S. 139 are modeled after those laws and require cooperation and communication between Federal and State entities to prevent duplication of efforts. The bill authorizes the Secret Service to investigate data security breaches and to provide guidance to companies that have been the victim of a data security breach on their notice obligations under the bill. Since 1984, Congress has provided statutory authority for the Secret Service to investigate a wide range of financial crimes, including offenses under 18 U.S.C. Sec. 1028 (false identification fraud), Sec. 1029 (access device fraud), Sec. 1030 (computer fraud). In the last two decades, the Secret Service has conducted more than 733,000 financial fraud and identity theft investigations involving these statutes, leading to the prosecution of more than 116,000 individuals.\27\ --------------------------------------------------------------------------- \27\United States Secret Service, White Paper: Data Broker Legislation--S.1490 (2007). --------------------------------------------------------------------------- Section 316(b) of the bill expressly requires that the FBI must be notified of any data security breach that involves espionage, foreign counterintelligence, or national security matters. Under title 18, section 1030(d)(1), the Secret Service and FBI have concurrent jurisdiction to investigate violations of section 1030 relating to false identification fraud, access device fraud, and computer fraud. Section 1030 designates the FBI as the primary investigative agency for such offenses if they involve espionage, foreign counterintelligence, or other national security matters. Accordingly, the bill incorporates this requirement in the context of breach notice, so that the FBI is promptly notified of any data breach matters that involve espionage, foreign counterintelligence, or national security. 4. Preemption Fourth, the legislation balances the important role of States as leaders on privacy issues with the recognized need for Federal uniformity in breach notification law. As discussed in the President's Identity Theft Task Force Report of September 2008, ``at present, there is no single data security or breach notification standard that applies in the United States. Rather, there is a patchwork of state laws and sector- specific Federal laws and regulations that are varied and have uneven application.''\28\ The bill preempts State laws on breach notification in order to provide a clear, national standard. The bill also, however, carves out an exception for State laws requiring that consumers be provided with additional information about victim protection assistance available in certain States. Finally, the bill's requirements do not apply to State or local government entities, and the Committee does not intend for the bill to preempt or displace State laws that address obligations of State and local government entities to provide notice of a security breach. --------------------------------------------------------------------------- \28\President's Identity Theft Task Force Report, Combating Identity Theft: A Strategic Plan, 13 (2008), available at http:// www.idtheft.gov/reports/IDTReport2008.pdf. --------------------------------------------------------------------------- II. History of the Bill and Committee Consideration A. INTRODUCTION OF THE BILL Senator Dianne Feinstein introduced the Data Breach Notification Act on January 6, 2009. This legislation is very similar to the Notification of Risk to Personal Data Act of 2007, S. 239, which Senator Feinstein introduced on January 10, 2007, and to the Notification of Risk to Personal Data Act of 2005, S. 751, which Senator Feinstein introduced on April 11, 2005. The Judiciary Committee favorably reported S. 239 on May 3, 2007, by voice vote with an amendment in the nature of a substitute. The legislation is also very similar to Subtitle B of the Personal Data Privacy and Security Act of 2009, S. 1490. The Committee favorably reported S. 1490 on November 5, 2009 with amendments. The Committee has held two hearings directly related to S. 139. On March 21, 2007, the Judiciary Committee's Subcommittee on Terrorism, Technology and Homeland Security held a hearing titled, ``Identity Theft: Innovative Solutions for an Evolving Problem.'' This hearing examined the problem of identity theft and legislative solutions to this problem, and discussed the need for Federal legislation on data breach notification. The following witnesses testified at this hearing: Ronald Tenpas, Associate Deputy Attorney General, United States Department of Justice; Lydia Parnes, Director Bureau of Consumer Protection, Federal Trade Commission; James Davis, Chief Information Officer and Vice Chancellor for Information Technology, University of California, Los Angeles; Joanne McNabb, Chief California Office of Privacy Protection; and Chris Jay Hoofnagle, Senior Staff Attorney, Samuelson Law, Technology & Public Policy Clinic, School of Law (Boalt Hall), University of California, Berkeley. On April 13, 2005, the Judiciary Committee held a hearing titled, ``Securing Electronic Personal Data: Striking a Balance between Privacy and Commercial and Governmental Use.'' This hearing examined the growing problem of breaches of data security and the practices and weaknesses of the rapidly growing data broker industry. The hearing also explored legislative options for ensuring that consumers who were at risk of identity theft could protect their personal data and take steps to prevent the misuse of their private information. The following witnesses testified at this hearing: Deborah Platt Majoras, Chairman of the Federal Trade Commission; Chris Swecker, Assistant Director for the Criminal Investigative Division at the Federal Bureau of Investigation; Larry D. Johnson, Special Agent in Charge of the Criminal Investigative Division of the U.S. Secret Service; William H. Sorrell, President of the National Association of Attorneys General; Douglas C. Curling, President, Chief Operating Office, and Director of ChoicePoint, Inc.; Kurt P. Sanford, President & CEO of the U.S. Corporate & Federal Markets LexisNexis Group; Jennifer T. Barrett, Chief Privacy Officer of Acxiom Corp.; James X. Dempsey, Executive Director of the Center for Democracy & Technology; and Robert Douglas, CEO of PrivacyToday.com. B. COMMITTEE CONSIDERATION On October 23, 2009, S. 139 was placed on the Judiciary Committee's agenda. The Committee considered this legislation on November 5, 2009. No amendments were offered to the bill. The Committee voted to report the Data Breach Notification Act of 2009, without amendment, favorably to the Senate by roll call vote as follows: Tally: 14 Yeas, 3 Nays, Pass 2 Yeas (14): Leahy (D-VT), Kohl (D-WI), Feinstein (D-CA), Feingold (D-WI), Schumer (D-NY), Durbin (D-IL), Cardin (D-MD), Whitehouse (D-RI), Klobuchar (D-MN), Kaufman (D-DE), Specter (D-PA), Franken (D-MN), Hatch (R-UT), Grassley (R-IA). Nays (3): Sessions (R-AL), Graham (R-SC), Coburn (R-OK). Pass (2): Kyl (R-AZ), Cornyn (R-TX). III. Section-by-Section Summary of the Bill Section 1. Short title This section provides that the legislation may be cited as the ``Data Breach Notification Act.'' Section 2. Notice to individuals Section 2 requires that a business entity or Federal agency give notice to an individual whose sensitive personally identifiable information has been, or is reasonably believed to have been, compromised, following the discovery of a data security breach. The notice required under section 2 must be made without unreasonable delay. Section 2 requires that a business entity or Federal agency that does not own or license the information compromised as a result of a data security breach notify the owner or licensee of the data. The owner or licensee of the data would then provide the notice to individuals as required under this section. However, agreements between owners, licensees and third parties regarding the obligation to provide notice under section 2 are preserved. Section 3. Exemptions Section 3 allows a business entity or Federal agency to delay notification by providing a written certification to the U.S. Secret Service that providing such notice would impede a criminal investigation, or damage national security. This provision further requires that the Secret Service must review all certifications from business entities (and may review certifications from agencies) seeking an exemption from the notice requirements based upon national security or law enforcement, to determine if the exemption sought has merit. The Secret Service has 10 business days to conduct this review, which can be extended by the Secret Service if additional information is needed. Upon completion of the review, the Secret Service must provide written notice of its determination to the agency or business entity that provided the certification. If the Secret Service determines that the exemption is without merit, the exemption will not apply. Section 312 also prohibits Federal agencies from providing a written certification to delay notice, to conceal violations of law, prevent embarrassment or restrain competition. Section 3(b) exempts a business entity or agency that conducts a risk assessment after a data breach occurs, and finds no significant risk of harm to the individuals whose sensitive personally identifiable information has been compromised, from the notice requirements of section 2, provided that: (1) the business entity or Federal agency notifies the Secret Service of the results of the risk assessment within 45 days of the security breach; and (2) the Secret Service does not determine within 10 business days of receipt the notification that a significant risk of harm does in fact exist and that notice of the breach should be given. Under section 3(b) a rebuttable presumption exists that the use of encryption technology, or other technologies that render the sensitive personally identifiable information indecipherable, and thus, that there is no significant risk of harm. Section 3(c) also provides a financial fraud prevention exemption from the notice requirement, if a business entity has a program to block the fraudulent use of information--such as credit card numbers--to avoid fraudulent transactions. Debit cards and other financial instruments are not covered by this exemption. Section 4. Methods of notice Section 4 provides that notice to individuals may be given in writing to the individuals last known address, by telephone or via email notice, if the individual has consented to email notice. Media notice is also required if the number of residents in a particular State whose information was, or is reasonably believed to have been, compromised exceeds 5,000 individuals. Section 5. Content of notification Section 5 requires that the notice detail the nature of the personally identifiable information that has been compromised by the data security beach, a toll free number to contact the business entity or Federal agency that suffered the breach, and the toll free numbers and addresses of major credit reporting agencies. Section 5 also preserves the right of States to require that additional information about victim protection assistance be included in the notice. Section 6. Coordination of notification with credit reporting agencies Section 6 requires that, for situations where notice of a data security breach is required for 5,000 or more individuals, a business entity or Federal agency must also provide advance notice of the breach to consumer reporting agencies. Section 7. Notice to law enforcement Section 7 requires that business entities and Federal agencies notify the Secret Service of the fact that a security breach occurred within 14 days of the breach, if the data security breach involves: (1) more than 10,000 individuals; (2) a database that contains information about more than one million individuals; (3) a Federal Government database; or (4) individuals known to be Government employees or contractors involved in national security or law enforcement. The Secret Service is responsible for notifying other Federal law enforcement agencies, including the FBI and the relevant State Attorneys General, within 14 days of receiving notice of a data security breach. Section 8. Enforcement Section 8 allows the Attorney General to bring a civil action to recover penalties for violations of the notification requirements in subtitle B. Violators are subject to a civil penalty of up to $1,000 per day, per individual and a maximum penalty of $1 million per violation, unless the violation is willful or intentional. Section 9. Enforcement by State attorneys general Section 9 allows State attorneys general to bring a civil action in U.S. district court to enforce subtitle B. The attorney general may stay, or intervene in, any State action brought under this subtitle. Section 10. Effect on Federal and State law Section 10 preempts State laws on breach notification, with the exception of State laws regarding providing consumers with information about victim protection assistance that is available to consumers in a particular State. Because the breach notification requirements in the bill do not apply to State and local government entities, this provision does not preempt State or local laws regarding the obligations of State and local government entities to provide notice of a data security breach. Section 11. Authorization of appropriations Section 11 authorizes funds for the Secret Service as may be necessary to carry out investigations and risk assessments of security breaches under the requirements of subtitle B. Section 12. Reporting on risk assessment exemptions Section 12 requires that the Secret Service report to Congress on the number and nature of data security breach notices invoking the risk assessment exemption and the number and nature of data security breaches subject to the national security and law enforcement exemptions. Section 13. Definitions Section 13 defines ``sensitive personally identifiable information'' in a limited manner. Information will qualify if it combines a person's last name and first name or first initial with one of these four categories of personal information: (1) a non-truncated social security number, driver's license number, passport number, or alien registration number; (2) two of: the individual's home address and telephone number, mother's maiden name, or complete birth date; (3) unique biometric data; or (4) a unique account number or electronic identification number in combination with an associated security code. Additionally, a financial account number will qualify as ``sensitive personally identifiable information'' if it is accessed or acquired without the account holder's name but in combination with an associated security code or password. Section 14. Effective date This Act takes effect 90 days after the date of enactment of this Act. IV. Congressional Budget Office Cost Estimate The Committee sets forth, with respect to the bill, S. 139, the following estimate and comparison prepared by the Director of the Congressional Budget Office under section 402 of the Congressional Budget Act of 1974: December 11, 2009. Hon. Patrick J. Leahy, Chairman, Committee on the Judiciary, U.S. Senate, Washington, DC. Dear Mr. Chairman: The Congressional Budget Office has prepared the enclosed cost estimate for S. 139, the Data Breach Notification Act. If you wish further details on this estimate, we will be pleased to provide them. The CBO staff contacts are Mark Grabowicz and Matthew Pickford (for federal costs) and Marin Randall (for the impact on the private sector). Sincerely, Douglas W. Elmendorf. Enclosure. S. 139--Data Breach Notification Act Summary: S. 139 would require most government and business entities that collect, transmit, store, or use sensitive personal information to notify any individuals whose information has been unlawfully accessed through a breach in the security systems designed to protect such information from unauthorized access. The legislation defines sensitive personal information as combinations of an individual's name, address or phone number, and Social Security number, driver's license number, financial account information, or biometric data (that is, finger print, voice print, or retina scan). Under certain circumstances, entities could apply to the Secret Service for exemptions from the notification requirements. In addition, S. 139 would create civil penalties for entities that fail to provide notice to affected individuals. CBO expects that agencies would incur negligible costs to implement the legislation because they already comply with the notification requirements in the bill. Implementing S. 139 could increase collections of civil penalties that would affect revenues, but CBO estimates that any such effect would not be significant in any year. In addition, enacting S. 139 could affect direct spending for notification requirements by agencies not funded through annual appropriations. CBO estimates, however, that any changes in net spending by those agencies would be negligible. Complying with the bill's provisions could increase the expenses of the Secret Service, but CBO estimates that such costs would be less than $500,000 annually and subject to the availability of appropriated funds. S. 139 contains intergovernmental mandates as defined in the Unfunded Mandates Reform Act (UMRA), but CBO estimates that the cost of complying with the requirements would be small and would not exceed the threshold established in UMRA ($69 million in 2009, adjusted annually for inflation). The notification requirements in S. 139 would impose private-sector mandates as defined in UMRA. Because most businesses already comply with similar state requirements, CBO estimates that the incremental cost to comply with the mandates would fall below the annual threshold established in UMRA for private-sector mandate ($139 million in 2009, adjusted annually for inflation). Estimated cost to the Federal Government: Enacting S. 139 could affect both direct spending and revenues, but CBO estimates that any such effects would be negligible. In the event of a security breach, S. 139 would require most government agencies to notify individuals whose personal information has been unlawfully accessed. Notification would be in the form of an individual notice (a written notice to a home mailing address, a telephone call, or an e-mail) as well as through the mass media for breaches involving the sensitive information of 5,000 or more individuals. The legislation also would require the agency to provide affected individuals with a description of the accessed information, a toll-free number to contact the agency, the names and toll-free telephone numbers of the major credit-reporting agencies, and in some instances, information on an individual state's victim protection assistance. This provision would codify the current practice of the federal government regarding notifications of security breaches. While existing laws generally do not require agencies to notify affected individuals of data breaches, this has been the practice of agencies that have experienced such breaches. Therefore, CBO expects that implementing those notification provisions would probably not lead to a significant increase in spending. Nonetheless, the federal government is also one of the largest providers, collectors, consumers, and disseminators of personal information in the United States. Although CBO cannot anticipate the number of security breaches, a significant breach of security involving a major collector of personal information, such as the Internal Revenue Service or the Social Security Administration, could involve millions of individuals, and there would be significant costs to notify individuals of such a security breach. The legislation also would require a business entity or federal agency (under certain circumstances) to notify the Secret Service that a security breach has occurred, but would permit entities or agencies to apply to the Secret Service for exemption from notice under certain circumstances. Based on information from the Secret Service, CBO estimates any additional investigative or administrative costs to that agency would likely total less than $500,000 annually and would be subject to the availability of appropriated funds. Impact on state, local, and tribal governments: S. 139 contains intergovernmental mandates as defined in UMRA. The bill would explicitly preempt laws in at least 45 states regarding the treatment of personal information and would impose notification requirements and limitations on State Attorneys General and state insurance authorities. Because the limits on state authority would impose no duties with costs and because the notification requirements would result in minimal additional spending, CBO estimates the costs of the mandates would be small and would not exceed the threshold established in UMRA ($69 million in 2009, adjusted annually for inflation). Estimated impact on private sector: S. 139 would impose private-sector mandates as defined in UMRA. The bill would require business entities engaged in interstate commerce that use, access, transmit, store, dispose of, or collect sensitive personally identifiable information to notify individuals if a security breach occurs that affects the individuals' sensitive, personally identifiable information. Entities would be able to notify individuals using written letter, the telephone, or email under certain circumstances. The bill also would require those entities to notify the owner or licensee of any such information that the entity does not own or license and would require notice in major media outlets serving a state or jurisdiction for any breach of more than 5,000 residents' records within a particular state. In addition, business entities would be required to notify other entities and agencies in the event of a large security breach. Entities that experience the breach of such data would have to notify the affected victims and consumer reporting agencies if the breach involves more than 5,000 individuals, and the U.S. Secret Service if the breach involves more than 10,000 individuals. The bill, however, would exempt business entities from the notification requirements under certain circumstances. According to industry sources, millions of individuals' sensitive personally identifiable information is breached every year. However, according to those sources, 45 states already have laws requiring notification in the event of a security breach. In addition, it is the standard practice of most businesses to notify individuals if a security breach occurs. CBO therefore estimates that the incremental costs incurred by businesses to comply with the requirements in the bill would fall below the annual threshold established in UMRA for private-sector mandate ($139 million in 2009, adjusted annually for inflation). Previous CBO estimates: On December 2, 2009, CBO transmitted a cost estimate for S. 1490, the Personal Data Privacy and Security Act of 2009, as ordered reported by the Senate Committee on the Judiciary on November 5, 2009. On December 7, 2009, CBO transmitted a cost estimate for H.R. 2221, the Data Accountability and Trust Act, as ordered reported by the House Committee on Energy and Commerce on September 30, 2009. Those bills address security breaches of sensitive personal information and notification requirements for the federal government and private industry. S. 1490 would require agencies to prepare additional reports for the Congress on the security of sensitive personal information held by the federal government. CBO estimates that preparing those reports and other security assessments would cost $25 million over the 2010-2014 period. H.R. 2221 would require the Federal Trade Commission to develop regulations to enforce new notification requirements. CBO estimates that it would cost that agency $5 million over the 2010-2014 period to carry out those activities. CBO determined that S. 1490 and H.R. 2221 also contained intergovernmental mandates, but any costs would be small and would not exceed the threshold established in UMRA ($69 million in 2009, adjusted for inflation). In addition, CBO determined that S. 1490 and H.R. 2221 would impose private-sector mandates that would exceed the annual threshold established in UMRA ($139 million in 2009, adjusted annually for inflation) in at least one of the first five years the mandate are in effect. Estimate prepared by: Federal costs: Mark Grabowicz and Matthew Pickford; Impact on state, local, and tribal governments: Elizabeth Cove Delisle; Impact on the private sector: Marin Randall. Estimate approved by: Theresa Gullo, Deputy Assistant Director for Budget Analysis. V. Regulatory Impact Evaluation In compliance with rule XXVI of the Standing Rules of the Senate, the Committee finds that no significant regulatory impact will result from the enactment of S. 139. VI. Conclusion By providing a Federal standard for notification in the event of a data breach, the Data Breach Notification Act, S. 139, will create a powerful incentive for government and private industry to improve the security of their data systems, will ensure that consumers are notified when their sensitive personally identifiable information is at risk, and will provide Federal law enforcement with critical information in the fight against cyber crime. VII. Additional Views ---------- ADDITIONAL VIEWS FROM SENATORS SESSIONS, KYL AND GRAHAM There is bipartisan agreement on the need for congressional action to confront the growing threat posed by criminals who steal Americans' personal information. There is also a bipartisan consensus on a need for a national standard for notifying consumers and law enforcement in the event of a data breach that compromises individuals' sensitive personal information. Such notice provides law enforcement with valuable leads on how to fight cybercrime, including data and identity theft crimes, which has exploded in recent years, and which is increasingly committed by sophisticated criminal enterprises with global reach. Timely notice of genuine threats to individuals' identity information also gives consumers the opportunity to protect themselves. In order for such consumer protections to be effective, however, it is important that notices be sent after a conscientious assessment of the risk that a breach poses to consumers. If notices are sent for trivial security breaches, consumers may be overwhelmed by inconsequential notices and become more likely to ignore warnings that matter--when their identity information is genuinely at risk. If we are to succeed in our shared goal of protecting consumers, it is critical that Congress strike a careful balance. We are concerned that this bill could lead to excessive (and thus counterproductive) notice to consumers, and so we hope that the right balance can be achieved when this bill comes before the full Senate. To date, 45 states, the District of Columbia, Puerto Rico, and the U.S. Virgin Islands have adopted laws governing notice to individuals whose personal identity information has been compromised. Such protection is important, but the proliferation of state laws has produced a patchwork in which the protections for consumers--and the rules for business--are uneven and at times confusing. We firmly believe that Congress should provide a uniform national standard in this area, and we commend Senator Feinstein's efforts to do so in this bill. We remain committed to the goals underlying this legislation, and we hope to work with our colleagues to craft a bill that best serves our shared interests in assisting law enforcement and protecting consumers. BACKGROUND Identity theft is a major concern for consumers and for businesses, and the threat posed by the increasingly sophisticated criminal enterprises that perpetrate these acts is both serious and growing. Both business and government have spent a great deal of time and effort to understand and combat this crime. Law enforcement agencies at the federal, state and local levels have increased their cooperation, and businesses and governments at all levels have adopted more rigorous internal controls to protect individuals' information. Nevertheless, periodic breaches that compromise sensitive personal information continue to occur, because of inadequate defenses against criminals, or because of negligence in securing sensitive information. Reports this week that the National Archives may have compromised sensitive information, including Social Security numbers, for 250,000 individuals because of a single lost computer hard drive are a sober reminder of the need for better security. Our first priority must be to ensure that consumers have the tools to protect themselves in the event of a data breach. Americans need to be notified when information pertaining to them is compromised in a way that may jeopardize their identities. For such notices to be effective, however, they must be issued only when there are reasonable grounds to do so. We know from the experience of the Gramm-Leach-Bliley Act (GLBA) that over-notification leads to consumer apathy, with the result that consumers are exposed to greater risks. SPECIFIC CONCERNS WITH S.139, THE DATA BREACH NOTIFICATION ACT Although we support the goals of this legislation, we have some specific concerns with S.139 as reported by the Committee, and believe that the bill could be improved in several areas. 1. The scope of protected personal information includes widely publicly-available information The bill defines the protected class of information-- ``sensitive personally identifiable information''--to include widely-available information such as home address, phone number, and date of birth. Such information is frequently available in public records, and release or compromise of such information alone is not sufficient to pose a risk of identity theft. Nor is the release of such information alone sufficiently grave to justify notice to the FBI and the Secret Service. 2. The definition of Security Breach is too broad The bill defines a breach as including unauthorized ``access'' or ``acquisition'' of sensitive personally identifiable information. While ``access'' to such information is a common term used in the criminal code, its use alongside ``acquisition'' implies that ``access'' refers only to instances where the personal data is not ``acquired''--i.e. where the data is not in some way recorded, collected, or taken for future, potentially harmful, use. Thus, the current definition of a ``breach'' would appear to cover instances where information is viewed in passing, or possibly where a person obtains unauthorized access to a computer system that contains personal information, even if the invader never views or downloads the information. Such activity, however, does not threaten individuals whose data was ``accessed'' with any harm. Although the definition of a Security Breach excludes ``the release of a public record'' that is not otherwise protected by confidentiality or nondisclosure rules, the S.139 does not define a ``public record'' and thus the bill could be read to treat release of specific information available in a public record as a Breach while permitting release of a full public record. 3. The ``harm'' standard for notice to consumers is vague One of the most valuable aspects of S. 139 is the requirement that companies who suffer data breaches report those incidents to law enforcement. That reporting requirement will assist our law enforcement agencies to better analyze and defend against the methods of increasingly sophisticated and global criminal enterprises that commonly engage in data theft. In order to avoid desensitizing the public through over- notification of such breaches, however, Congress should provide a clear risk-based standard for requiring companies to take the additional step of notifying individual consumers who might have been affected by the breach. The standard currently in S.139, requires consumer notice unless there is ``no significant risk'' of ``harm to the individual.'' ``Harm'' is undefined, and although the Majority suggests that the ``harm'' in question should cover not only identity theft but also financial crime or threats to a person's safety such as from stalking, judicial interpretations of similar state laws suggest that the current language could encompass not only such serious matters but also less concrete ``harms,'' such as the time a person must spend to expunge negative credit information or even purely reputational ``harms'' that might be suffered from some types of disclosures. A more disciplined approach would be to require notice when there is a risk of ``misuse of the individual's personal information for identity theft, fraud, or other illegal purposes, or financial harm to the individual.'' 4. Consumer notice methods and timing S. 139 requires entities victimized by a Security Breach to send any notice to consumers ``without unreasonable delay.'' While ``reasonable delay'' is defined to include the time necessary to determine the scope of the breach and secure the database from further exploitation, the bill does not currently make clear that notice may be delayed to allow the holder of the data to assess the possible risks to consumers and evaluate the need for a breach notice. More significantly, S. 139 currently requires consumers receive both actual notice of a breach (through mail, telephone, or email) and constructive notice through announcements in major media outlets. Where actual notice is feasible, however, any constructive notice through mass media outlets is duplicative and unnecessary. Congress should follow the example of those states, including California, that call for notice through mass media only as a fall-back alternative when actual notice is impossible or impracticable. In addition, S.139 should allow consumers to be notified through whatever channels they customarily use to communicate with the business or entity whose systems were breached. As currently drafted, the bill would not permit notice via email unless a consumer has specifically consented to such email notice in advance. 5. Other Issues We agree with the sponsors of S. 139 on the need for Congress to set a uniform national standard for breach notification, and we hope that the preemption language in the bill will be reinforced when S. 139 is considered by the full Senate. We also believe that the civil penalty provisions in the bill should be clarified to ensure that the civil penalty cap applies to each incident or breach, so that the damages ceiling for mishandling a breach would not be multiplied by the number of consumers--possibly in the millions--that could be affected in a single incident. In addition, we would suggest that the bill's reference to encryption technology adopted by an ``established standards setting body'' might be strengthened by making clear that the standard-setting body must be widely- accepted or certified by the FTC. CONCLUSION For these reasons, although we share the general goals S. 139 attempts to serve, we urge our colleagues to revisit these policy and drafting issues that remain in this bill. Jeff Sessions. Jon Kyl. Lindsey Graham. VIII. Changes to Existing Law Made by the Bill, as Reported In compliance with paragraph 12 of rule XXVI of the Standing Rules of the Senate, changes in existing law made by S. 139, as reported, are shown as follows (existing law proposed to be omitted is enclosed in black brackets, new matter is printed in italic, and existing law in which no change is proposed is shown in roman): UNITED STATES CODE TITLE 15--COMMERCE AND TRADE * * * * * * * CHAPTER 41--CONSUMER CREDIT PROTECTION * * * * * * * Subchapter III--Credit Reporting Agencies * * * * * * * Sec. 1681c-1. Identity theft prevention; fraud alerts and active duty alerts * * * * * * * (b) Extended Alerts.-- (1) In general.--Upon the direct request of a consumer, or an individual acting on behalf of or as a personal representative of a consumer, who submits an identity theft report, or evidence that the consumer has received notice that the consumer's financial information has or may have been compromised, to a consumer reporting agency described in section 1681a(p) of this title that maintains a file on the consumer, if the agency has received appropriate proof of the identity of the requester, the agency shall-- (A) include a fraud alert in the file of that consumer, and also provide that alert along with any credit score generated in using that file, during the 7-year period beginning on the date of such request, unless the consumer or such representative requests that such fraud alert be removed before the end of such period and the agency has received appropriate proof of the identity of the requester for such purpose; (B) during the 5-year period beginning on the date of such request, exclude the consumer from any list of consumers prepared by the consumer reporting agency and provided to any third party to offer credit or insurance to the consumer as part of a transaction that was not initiated by the consumer, unless the consumer or such representative requests that such exclusion be rescinded before the end of such period; and (C) refer the information regarding the extended fraud alert under this paragraph to each of the other consumer reporting agencies described in section 1681a(p) of this title, in accordance with procedures developed under section 1681s(f) of this title.