New MO Breach Notice Law: Encryption Safe Harbor? Yes. Encryption Def Good? No!

On July 9, 2009 the Missouri governor signed House Bill No. 62 into law, and it included section 407.1500, which is the requirement for giving privacy breach notice.
Since I’m focusing this week on encryption laws, I want to take a moment and point out the horrible way in which encryption is defined within this new Missouri law..


“(4) “Encryption”, the use of an algorithmic process to transform data into a form in which the data is rendered unreadable or unusable without the use of a confidential process or key;”


Who writes these definitions? Obviously no one with an information security or IT background or knowledge.
Why don’t lawmakers talk with some infosec and IT folks before writing laws that infosec and IT folks have to implement?
Talk about being open to interpretation! What is meant by a “confidential process” or “key”? It could mean many things. And I’m sure many different lawyers are interpreting it to the favor of doing whatever is easiest and least expensive for their organizations.
A huge problem is that the definition of “encryption” is inconsistent within all the 48 U.S. state and territory breach notice laws.
Why can’t the laws be consistent, including those at the federal level, and require a recognized minimum encryption standard? For example, if they indicated that an encryption solution must be one that, at a minimum, would meet the requirements of a NIST standard, such as FIPS 140-1 or FIPS 140-2, it would remove a lot of the subjective interpretation in addition to ensuring that strong encryption was really being used.
It’s important to note that there are MANY different encryption solutions that meet NIST requirements.
And many of them are very reasonably priced; similar to anti-virus and personal firewall solutions. Requiring a minimum standard would not be putting any unreasonable demands upon organizations, of any size, who have been entrusted with handling and/or storing personally identifiable information (PII).
Using strong encryption should be seen as being a necessity by businesses, just as using anti-malware and firewall solutions now are considered to be necessary.
Here is the full text of the Missouri breach notice law, section 407.1500 of HB 62:

407.1500. 1. As used in this section, the following terms mean:
(1) “Breach of security” or “breach”, unauthorized access to and unauthorized acquisition of personal information maintained in computerized form by a person that compromises the security, confidentiality, or integrity of the personal information. Good faith acquisition of personal information by a person or that person’s employee or agent for a legitimate purpose of that person is not a breach of security, provided that the personal information is not used in violation of applicable law or in a manner that harms or poses an actual threat to the security, confidentiality, or integrity of the personal information;
(2) “Consumer”, an individual who is a resident of this state;
(3) “Consumer reporting agency”, the same as defined by the federal Fair Credit Reporting Act, 15 U.S.C. Section 1681a;
(4) “Encryption”, the use of an algorithmic process to transform data into a form in which the data is rendered unreadable or unusable without the use of a confidential process or key;
(5) “Health insurance information”, an individual’s health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual;
(6) “Medical information”, any information regarding an individual’s medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional;
(7) “Owns or licenses” includes, but is not limited to, personal information that a business retains as part of the internal customer account of the business or for the purpose of using the information in transactions with the person to whom the information relates;
(8) “Person”, any individual, corporation, business trust, estate, trust, partnership, limited liability company, association, joint venture, government, governmental subdivision, governmental agency, governmental instrumentality, public corporation, or any other legal or commercial entity;
(9) “Personal information”, an individual’s first name or first initial and last name in combination with any one or more of the following data elements that relate to the individual if any of the data elements are not encrypted, redacted, or otherwise altered by any method or technology in such a manner that the name or data elements are unreadable or unusable:
(a) Social Security number;
(b) Driver’s license number or other unique identification number created or collected by a government body;
(c) Financial account number, credit card number, or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account;
(d) Unique electronic identifier or routing code, in combination with any required security code, access code, or password that would permit access to an individual’s financial account;
(e) Medical information; or
(f) Health insurance information.
“Personal information” does not include information that is lawfully obtained from publicly available sources, or from federal, state, or local government records lawfully made available to the general public;
(10) “Redacted”, altered or truncated such that no more than five digits of a social security number or the last four digits of a driver’s license number, state identification card number, or account number is accessible as part of the personal information.
2. (1) Any person that owns or licenses personal information of residents of Missouri or any person that conducts business in Missouri that owns or licenses personal information in any form of a resident of Missouri shall provide notice to the affected consumer that there has been a breach of security following discovery or notification of the breach. The disclosure notification shall be:
(a) Made without unreasonable delay;
(b) Consistent with the legitimate needs of law enforcement, as provided in this section; and
(c) Consistent with any measures necessary to determine sufficient contact information and to determine the scope of the breach and restore the reasonable integrity, security, and confidentiality of the data system.
(2) Any person that maintains or possesses records or data containing personal information of residents of Missouri that the person does not own or license, or any person that conducts business in Missouri that maintains or possesses records or data containing personal information of a resident of Missouri that the person does not own or license, shall notify the owner or licensee of the information of any breach of security immediately following discovery of the breach, consistent with the legitimate needs of law enforcement as provided in this section.
(3) The notice required by this section may be delayed if a law enforcement agency informs the person that notification may impede a criminal investigation or jeopardize national or homeland security, provided that such request by law enforcement is made in writing or the person documents such request contemporaneously in writing, including the name of the law enforcement officer making the request and the officer’s law enforcement agency engaged in the investigation. The notice required by this section shall be provided without unreasonable delay after the law enforcement agency communicates to the person its determination that notice will no longer impede the investigation or jeopardize national or homeland security.
(4) The notice shall at minimum include a description of the following:
(a) The incident in general terms;
(b) The type of personal information that was obtained as a result of the breach of security;
(c) A telephone number that the affected consumer may call for further information and assistance, if one exists;
(d) Contact information for consumer reporting agencies;
(e) Advice that directs the affected consumer to remain vigilant by reviewing account statements and monitoring free credit reports.
(5) Notwithstanding subdivisions (1) and (2) of this subsection, notification is not required if, after an appropriate investigation by the person or after consultation with the relevant federal, state, or local agencies responsible for law enforcement, the person determines that a risk of identity theft or other fraud to any consumer is not reasonably likely to occur as a result of the breach. Such a determination shall be documented in writing and the documentation shall be maintained for five years.
(6) For purposes of this section, notice to affected consumers shall be provided by one of the following methods:
(a) Written notice;
(b) Electronic notice for those consumers for whom the person has a valid e-mail address and who have agreed to receive communications electronically, if the notice provided is consistent with the provisions of 15 U.S.C. Section 7001 regarding electronic records and signatures for notices legally required to be in writing;
(c) Telephonic notice, if such contact is made directly with the affected consumers; or
(d) Substitute notice, if:
a. The person demonstrates that the cost of providing notice would exceed one hundred thousand dollars; or
b. The class of affected consumers to be notified exceeds one hundred fifty thousand; or
c. The person does not have sufficient contact information or consent to satisfy paragraphs (a), (b), or (c) of this subdivision, for only those affected consumers without sufficient contact information or consent; or
d. The person is unable to identify particular affected consumers, for only those unidentifiable consumers.
(7) Substitute notice under paragraph (d) of subdivision (6) of this subsection shall consist of all the following:
a. E-mail notice when the person has an electronic mail address for the affected consumer;
b. Conspicuous posting of the notice or a link to the notice on the Internet web site of the person if the person maintains an Internet web site;
and
c. Notification to major statewide media.
(8) In the event a person provides notice to more than one thousand consumers at one time pursuant to this section, the person shall notify, without unreasonable delay, the attorney general’s office and all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis, as defined in 15 U.S.C. Section 1681a(p), of the timing, distribution, and content of the notice.
3. (1) A person that maintains its own notice procedures as part of an information security policy for the treatment of personal information, and whose procedures are otherwise consistent with the timing requirements of this section, is deemed to be in compliance with the notice requirements of this section if the person notifies affected consumers in accordance with its policies in the event of a breach of security of the system.
(2) A person that is regulated by state or federal law and that maintains procedures for a breach of the security of the system pursuant to the laws, rules, regulations, guidances, or guidelines established by its primary or functional state or federal regulator is deemed to be in compliance with this section if the person notifies affected consumers in accordance with the maintained procedures when a breach occurs.
(3) A financial institution that is:
(a) Subject to and in compliance with the Federal Interagency Guidance Response Programs for Unauthorized Access to Customer Information and Customer Notice, issued on March 29, 2005, by the board of governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the Office of the Comptroller of the Currency, and the Office of Thrift Supervision, and any revisions, additions, or substitutions relating to said interagency guidance;
or
(b) Subject to and in compliance with the National Credit Union Administration regulations in 12 CFR Part 748; or
(c) Subject to and in compliance with the provisions of Title V of the Gramm-Leach-Bliley Financial Modernization Act of 1999, 15 U.S.C. Sections 6801 to 6809; shall be deemed to be in compliance with this section.
4. The attorney general shall have exclusive authority to bring an action to obtain actual damages for a willful and knowing violation of this section and may seek a civil penalty not to exceed one hundred fifty thousand dollars per breach of the security of the system or series of breaches of a similar nature that are discovered in a single investigation.

Tags: , , , , , , , , , , , , ,

Leave a Reply