COLORADO HB PROTECTIONS FOR CONSUMER DATA PRIVACY

Size: px
Start display at page:

Download "COLORADO HB PROTECTIONS FOR CONSUMER DATA PRIVACY"

Transcription

1 COLORADO HB PROTECTIONS FOR CONSUMER DATA PRIVACY , 713.5, 716, Guy Mason (NOT AN ATTORNEY) Mile High ARMA June Meeting June 19, 2018

2 WHO? Prime Sponsors Rep. Coel Wist, Rep. Jeff Bridges, Sen. Kent Lambert, Sen. Lois Court Passed unanimously Covered Entities Person that maintains, owns, or licenses Personal Identifying Information in the course of the person s business, vocation, or occupation Governmental Entities Colorado Residents

3 WHAT? Privacy Protection Policies Definitions Destruction Requirements Security Procedures Breach Notification Fines

4 WHEN? Governor Hickenlooper Signed May 29, 2018 Takes Effect September 1, 2018

5 Colorado WHERE?

6 PRIVACY PROTECTION PII What has to be destroyed after no longer needed PI Requires breach notification if disclosed

7 POLICIES Written Policy for the Destruction or Proper Disposal of Paper And Electronic Documents Containing Personal Identifying Information Safeguards for protection

8 PII DEFINITION Personally Identifiable Information (PII) Social Security Number Personal Identification Number Password Passcode Official State or Government-Issued Driver s License or Identification Card Number Government Passport Number Biometric Data (Unique Data from measurements of human body characteristics for identification purposes) Employer, Student, or Military Identification Number Financial Transaction Device (Credit Card / Bank Card / Account Number)

9 PI DEFINITION Personal Information (PI) First Name or First Initial and Last Name Social Security Number Student, Military, Passport ID Driver s License or Identification Card Number Medical Information Health Insurance Identification Number Biometric Data Username or Address Password, Security Questions and Answers Account Number or Credit / Debit Card Number Security Code, Access Code, Password Does not include publicly available information

10 BREACH NOTIFICATION Breaches incidents can involve paper or electronic formats After becoming aware that a security breach may have occurred Affecting 500 Colorado Residents Conduct Investigation (misuse of information likely to occur) Notify within 30 days (unless it will impede criminal investigation) Attorney General Affected residents Covered Entity by Third Party Service Provider (unless it will impede criminal investigation) Consumer Reporting Agencies (1000+ Colorado Residents) Many requirements and specifications for Third Parties and Notification

11 DESTRUCTION REQUIREMENTS WHEN SUCH PAPER OR ELECTRONIC DOCUMENTS ARE NO LONGER NEEDED, THE COVERED ENTITY SHALL DESTROY OR ARRANGE FOR THE DESTRUCTION OF SUCH PAPER AND ELECTRONIC DOCUMENTS WITHIN ITS CUSTODY OR CONTROL THAT CONTAIN PERSONAL IDENTIFYING INFORMATION BY SHREDDING, ERASING, OR OTHERWISE MODIFYING THE PERSONAL IDENTIFYING INFORMATION IN THE PAPER OR ELECTRONIC DOCUMENTS TO MAKE THE PERSONAL IDENTIFYING INFORMATION UNREADABLE OR INDECIPHERABLE THROUGH ANY MEANS. A COVERED ENTITY THAT IS REGULATED BY STATE OR FEDERAL LAW AND THAT MAINTAINS PROCEDURES FOR DISPOSAL OF PERSONAL IDENTIFYING INFORMATION PURSUANT TO THE LAWS, RULES, REGULATIONS, GUIDANCES, OR GUIDELINES ESTABLISHED BY ITS STATE OR FEDERAL REGULATOR IS IN COMPLIANCE WITH THIS SECTION.

12 SECURITY PROCEDURES Reasonable security procedures and practices Encryption If encryption key is breached Contract with recycler or disposal firm does not automatically require proper destruction of PII

13 ENFORCEMENT The Attorney General s office has authority to enforce the new requirements, and may bring an action in law or equity to address violations of the law, and for other relief that may be appropriate to ensure compliance with the law or to recover direct economic damages resulting from the violation, or both. (4) Violations. THE ATTORNEY GENERAL MAY BRING AN ACTION FOR INJUNCTIVE RELIEF TO ENFORCE THE PROVISIONS OF THIS SECTION. (5) Attorney general criminal authority. UPON RECEIPT OF NOTICE PURSUANT TO SUBSECTION (2) OF THIS SECTION, AND WITH EITHER A REQUEST FROM THE GOVERNOR TO PROSECUTE A PARTICULAR CASE OR WITH THE APPROVAL OF THE DISTRICT ATTORNEY WITH JURISDICTION TO PROSECUTE CASES IN THE JUDICIAL DISTRICT WHERE A CASE COULD BE BROUGHT, THE ATTORNEY GENERAL HAS THE AUTHORITY TO PROSECUTE ANY CRIMINAL VIOLATIONS OF SECTION

14 Improve destruction policies and procedures OPPORTUNITIES FOR RECORDS MANAGEMENT Improve inventories and file plans regarding PII / PI Encourage destruction of records with PII / PI that are past retention Shorten retention periods of PII / PI records to what is needed to decrease liability

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0 1 HB410 2 191614-1 3 By Representative Williams (P) 4 RFD: Technology and Research 5 First Read: 13-FEB-18 Page 0 1 191614-1:n:02/13/2018:CMH*/bm LSA2018-168 2 3 4 5 6 7 8 SYNOPSIS: This bill would create

More information

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0 1 SB318 2 192523-5 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENROLLED, An Act, 5 Relating to consumer protection; to require certain 6 entities

More information

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0 1 SB318 2 192523-4 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENGROSSED 5 6 7 A BILL 8 TO BE ENTITLED 9 AN ACT 10 11 Relating to consumer protection;

More information

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008 UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008 Current Laws: A person is guilty of identity fraud when that person:

More information

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL PRIOR PRINTER'S NO. PRINTER'S NO. THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL No. 1 Session of 01 INTRODUCED BY ELLIS, IRVIN, RABB, MILNE, PICKETT, BAKER, DAVIS, QUIGLEY, BOBACK, CHARLTON, O'NEILL,

More information

STATE DATA SECURITY BREACH LEGISLATION SURVEY

STATE DATA SECURITY BREACH LEGISLATION SURVEY STATE DATA SECURITY BREACH LEGISLATION SURVEY State and Timing/ Alaska H.B. 65 Signed into law June 13, 2008. Alaska Stat. Tit. 45, Ch. 48, 10 to 90 Alaska residents. Any person doing business, any person

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

SCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC

SCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC 20036-3465 WWW.SCHWARTZANDBALLEN.COM TELEPHONE FACSIMILE (202) 776-0700 (202) 776-0720 To Our Clients and Friends Re: State Security Breach Laws M E M O R A

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

State Data Breach Notification Laws

State Data Breach Notification Laws State Data Breach Notification Laws Please note that state data breach notification laws change frequently. The recommended actions an entity should take if it experiences a security event, incident or

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information

State Data Breach Notification Laws

State Data Breach Notification Laws State Data Breach Notification Laws This chart should be used for informational purposes only because the recommended actions an entity should take if it experiences a security event, incident, or breach

More information

State Data Breach Law Summary. November 2017

State Data Breach Law Summary. November 2017 November 2017 STATE DATA BREACH LAW SUMMARY To view the requirements for a specific state 1, click on the state name below. Alaska Idaho Minnesota Ohio Washington Arizona Illinois Mississippi Oklahoma

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT. ( BUSINESS ASSOCIATE ) and is effective as of ( Effective Date ). RECITALS

HIPAA BUSINESS ASSOCIATE AGREEMENT. ( BUSINESS ASSOCIATE ) and is effective as of ( Effective Date ). RECITALS HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is entered into by and between the Trustees of the University of Pennsylvania as owner and operator of the University

More information

KANSAS IDENTITY THEFT RANKING BY STATE: Rank 29, 61.0 Complaints Per 100,000 Population, 1694 Complaints (2007) Updated December 15, 2008

KANSAS IDENTITY THEFT RANKING BY STATE: Rank 29, 61.0 Complaints Per 100,000 Population, 1694 Complaints (2007) Updated December 15, 2008 KANSAS IDENTITY THEFT RANKING BY STATE: Rank 29, 61.0 Complaints Per 100,000 Population, 1694 Complaints (2007) Updated December 15, 2008 Current Laws: In Kansas, identity theft is defined as knowingly

More information

State Data Breach Notification Laws

State Data Breach Notification Laws State Data Breach Notification Laws This chart should be used for informational purposes only because the recommended actions an entity should take if it experiences a security event, incident, or breach

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information

State Data Breach Laws

State Data Breach Laws State Data Breach Laws 1 Alaska Personal information means a combination of (A) an individual s name;... and (B) one or more of the following information elements: (i) the individual s social security

More information

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009 NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, 100.1 Complaints Per 100,000 Population, 19319 Complaints (2007) Updated January 25, 2009 Current Laws: A person is guilty of identity theft when he knowingly

More information

Limited Data Set Data Use Agreement

Limited Data Set Data Use Agreement Limited Data Set Data Use Agreement This Agreement is made and entered into by and between (hereinafter Applicant ) and the State of Florida Agency for Health Care Administration, Florida Center for Health

More information

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009 OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009 Current Laws: It is unlawful for any person to willfully and with

More information

Data Breach Charts. November 2017

Data Breach Charts. November 2017 Data Breach Charts November 2017 DATA BREACH CHARTS The following standard definitions of Personal Information and Breach of Security (based on the definition commonly used by most states) are used for

More information

Model Business Associate Agreement

Model Business Associate Agreement Model Business Associate Agreement Instructions: The Texas Health Services Authority (THSA) has developed a model BAA for use between providers (Covered Entities) and HIEs (Business Associates). The model

More information

SERVICE PROVIDER SECURITY AGREEMENT. Clemson University ( Clemson ) and. Vendor Name Here. ( Service Provider )

SERVICE PROVIDER SECURITY AGREEMENT. Clemson University ( Clemson ) and. Vendor Name Here. ( Service Provider ) SERVICE PROVIDER SECURITY AGREEMENT Clemson University ( Clemson ) and Vendor Name Here. ( Service Provider ) This Service Provider Security Agreement (this Agreement ) effective as of (the Effective Date

More information

Nestlé Canada Inc. Privacy Policies and Practices April 13, 2012

Nestlé Canada Inc. Privacy Policies and Practices April 13, 2012 Nestlé Canada Inc. Privacy Policies and Practices April 13, 2012 Glossary of Terms... 3 The Privacy Principles at Nestlé Canada... 5 Accountability... 5 Identifying Purpose... 5 Consent... 6 Obtaining

More information

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 RULES Issued August 19, 2009 Requires Covered Entities to notify individuals of a breach as well as HHS without reasonable delay or within

More information

Chapter PERSONAL INFORMATION PROTECTION ACT. Article 01. BREACH OF SECURITY INVOLVING PERSONAL INFORMATION

Chapter PERSONAL INFORMATION PROTECTION ACT. Article 01. BREACH OF SECURITY INVOLVING PERSONAL INFORMATION Alaska Statute Chapter 45.48. PERSONAL INFORMATION PROTECTION ACT Article 01. BREACH OF SECURITY INVOLVING PERSONAL INFORMATION Sec. 45.48.010. Disclosure of breach of security. (a) If a covered person

More information

GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS

GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS June 2017 Status: Approved Print Date: 6/29/2017 Page 1 of 18 Section 1: Introduction GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS The Election Act requires

More information

(No. 97) (Approved June 19, 2008) AN ACT

(No. 97) (Approved June 19, 2008) AN ACT (H. B. 2130) (No. 97) (Approved June 19, 2008) AN ACT To add a new subsection (d) to Section 2, to amend the first paragraph of Section 3, and to amend the first paragraph of Section 4 of Act No. 111 of

More information

OFFICE OF TEMPORARY AND DISABILITY ASSISTANCE SECURITY OVER PERSONAL INFORMATION. Report 2007-S-78 OFFICE OF THE NEW YORK STATE COMPTROLLER

OFFICE OF TEMPORARY AND DISABILITY ASSISTANCE SECURITY OVER PERSONAL INFORMATION. Report 2007-S-78 OFFICE OF THE NEW YORK STATE COMPTROLLER Thomas P. DiNapoli COMPTROLLER OFFICE OF THE NEW YORK STATE COMPTROLLER DIVISION OF STATE GOVERNMENT ACCOUNTABILITY Audit Objectives... 2 Audit Results Summary... 2 Background... 2 Audit Findings and Recommendations...

More information

ACCESS AND PRIVACY POLICY

ACCESS AND PRIVACY POLICY ACCESS AND PRIVACY POLICY 1.0 Purpose The purpose of this Policy is to set out how the Condominium Authority of Ontario, including the Condominium Authority Tribunal, will effectively protect, and provide

More information

Port Glasgow St Andrew s Data Protection Policy

Port Glasgow St Andrew s Data Protection Policy Port Glasgow St Andrew s Data Protection Policy CONTENTS 1. Overview 2. Data Protection Principles 3. Personal Data 4. Special Category Data 5. Processing 6. How personal data should be processed 7. Privacy

More information

Mannofield Parish Church. Registered Scottish Charity No: SC (the Congregation ) Data Protection Policy

Mannofield Parish Church. Registered Scottish Charity No: SC (the Congregation ) Data Protection Policy Mannofield Parish Church Registered Scottish Charity No: SC 001680 (the Congregation ) Data Protection Policy December 2018 CONTENTS 1. Overview 2. Data Protection Principles 3. Personal Data 4. Special

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Perth: Craigie and Moncreiffe CHARITY NO. SC001330 CONTENTS 1. Overview 2. Data Protection Principles 3. Personal Data 4. Special Category Data 5. Processing 6. How personal data

More information

Security Video Surveillance Policy

Security Video Surveillance Policy Security Video Surveillance Policy Policy Statement The Municipality of Central Elgin (the Municipality) recognizes the need to balance an individual s right to privacy and the need to ensure the safety

More information

The Lawyer s Ethical and Legal Duties to protect Private Information

The Lawyer s Ethical and Legal Duties to protect Private Information The Lawyer s Ethical and Legal Duties to protect Private Information Claude E. Ducloux Attorney At Law Board Certified Texas Board of Legal Specialization Civil Trial Law Civil Appellate Law Director of

More information

Georgia Computer System Protection Act

Georgia Computer System Protection Act Georgia Computer System Protection Act Enacted by the 1991 Georgia General Assembly Effective 1 July 1991 INTRODUCTION The "Georgia Computer Systems Protection Act" is an act enacted by the 1991 Georgia

More information

DATA MATCHING AGREEMENTS ACT 1 B I L L

DATA MATCHING AGREEMENTS ACT 1 B I L L 1 B I L L No. 87 An Act respecting Data Matching Agreements and making consequential amendments to The Freedom of Information and Protection of Privacy Act TABLE OF CONTENTS 1 Short title 2 Definitions

More information

Cumulative Identity Theft Statutes Updated as of July 26, 2011

Cumulative Identity Theft Statutes Updated as of July 26, 2011 State Bill Number Summary Adopted AL SB 68 Classifies all instances of identity theft as Class C felonies and extends the statute of limitations to seven years. AZ SB 1045 Adds to the list of offenses

More information

Condominium Management Regulatory Authority of Ontario Access and Privacy Policy

Condominium Management Regulatory Authority of Ontario Access and Privacy Policy Condominium Management Regulatory Authority of Ontario Access and Privacy Policy 1.0 Purpose and Scope The purpose of this Policy is to set out how the Condominium Management Regulatory Authority of Ontario

More information

HITECH Omnibus Business Associate Agreement DU Hybrid CE ra FINAL

HITECH Omnibus Business Associate Agreement DU Hybrid CE ra FINAL BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ) by and between Drexel University ( Hybrid Entity ), with a principal address at 3141 Chestnut Street, Philadelphia, PA 19104,

More information

Arent Fox LLP Survey of Data Breach Notification Statutes

Arent Fox LLP Survey of Data Breach Notification Statutes Arent Fox LLP Survey of Data Breach Notification Statutes James Westerlind August 2016 Survey Overview This Survey focuses on the data breach notification statutes of the states and territories within

More information

DATA USE AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION

DATA USE AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION DATA USE AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION This Data Use Agreement (the Agreement ) is effective between the Greenville Hospital System and Data User(s) (the Data Users ): 1. (List name

More information

PHYSICAL RECORDS DISPOSITION PROCEDURE

PHYSICAL RECORDS DISPOSITION PROCEDURE PHYSICAL RECORDS DISPOSITION PROCEDURE This procedure is governed by its parent policy. Questions regarding this procedure are to be directed to the identified Procedure Administrator. Functional Category:

More information

PROCEDURE (Essex) / Linked SOP (Kent) Data Protection. Number: W 1011 Date Published: 24 November 2016

PROCEDURE (Essex) / Linked SOP (Kent) Data Protection. Number: W 1011 Date Published: 24 November 2016 1.0 Summary of Changes 1.1 This procedure/sop has had an additional paragraph added at 3.8.6 relating to data processing of information by direct access to Athena. 2.0 What this Procedure/SOP is About

More information

Identity Cards Bill EXPLANATORY NOTES. Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 9 EN.

Identity Cards Bill EXPLANATORY NOTES. Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 9 EN. Identity Cards Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 9 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Mr Secretary Clarke has made

More information

Breach Notification and Enforcement

Breach Notification and Enforcement Breach Notification and Enforcement Sponsored by Health Information and Technology Practice Group June 14, 2012 Presenter: Patricia A. Markus, Esquire, Smith Moore Leatherwood LLP, Raleigh, NC, Trish.Markus@smithmoorelaw.com

More information

GUIDELINE FOR PROTECTION OF PERSONAL INFORMATION

GUIDELINE FOR PROTECTION OF PERSONAL INFORMATION GUIDELINE FOR PROTECTION OF PERSONAL INFORMATION (February 9, 2005) (Purpose) Article 1 The purpose of the Guideline for Protection of Personal Information (hereinafter referred to as Guideline ) is to

More information

TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 NORTH LAMAR BOULEVARD POST OFFICE BOX 4087, AUSTIN, TX /

TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 NORTH LAMAR BOULEVARD POST OFFICE BOX 4087, AUSTIN, TX / TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 NORTH LAMAR BOULEVARD POST OFFICE BOX 4087, AUSTIN, TX 78773-0252 512/424-2365 THOMAS A. DAVIS, JR. DIRECTOR DAVID McEATHRON ASST. DIRECTOR SCHOOL CONTRACTOR DOCUMENT

More information

COMMONWEALTH OF MASSACHUSETTS. ) COMMONWEALTH OF MASSACHUSETTS, ) ) Plaintiff, ) ) v. ) ) SOUTH SHORE HOSPITAL, INC., ) ) Defendant.

COMMONWEALTH OF MASSACHUSETTS. ) COMMONWEALTH OF MASSACHUSETTS, ) ) Plaintiff, ) ) v. ) ) SOUTH SHORE HOSPITAL, INC., ) ) Defendant. COMMONWEALTH OF MASSACHUSETTS SUFFOLK, ss. SUPERIOR COURT CIVIL ACTION NO. ) COMMONWEALTH OF MASSACHUSETTS, ) ) Plaintiff, ) ) v. ) ) SOUTH SHORE HOSPITAL, INC., ) ) Defendant. ) ) FINAL JUDGMENT BY CONSENT

More information

2013 New Law Workbook

2013 New Law Workbook 2013 New Law Workbook A SUMMARY OF LEGISLATION AFFECTING COUNTY CLERKS California Association of Clerks and Election Officials 2013 New Law Workbook Presented by California Association of Clerks and Election

More information

Selected Federal Data Security Breach Legislation

Selected Federal Data Security Breach Legislation Selected Federal Data Security Breach Legislation name redacted Legislative Attorney April 9, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service

More information

State By State Survey:

State By State Survey: Connecticut California Florida State By State Survey: Cyber Risk - Security Breach tification s The Right Choice for Policyholders www.sdvlaw.com Cyber Risk 2 Cyber Risk - Security Breach tification s

More information

YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, DO NOT CLICK ON THE BUY NOW->>

YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, DO NOT CLICK ON THE BUY NOW->> TERMS AND CONDITIONS IMPORTANT READ CAREFULLY: These Terms and Conditions for Virus Eraser Products and Services ( Agreement ) is a legal agreement between you (either an individual or an entity) and Virus

More information

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way.

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way. Page 1 of 10 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way. MEGT will fulfil its obligations under the Privacy Amendment (Enhancing

More information

THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE

THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE Whereas, the City Council finds it is essential to have an informed public debate as early as possible about decisions related to surveillance technology;

More information

COLLEGE OF VETERINARIANS OF BRITISH COLUMBIA

COLLEGE OF VETERINARIANS OF BRITISH COLUMBIA COLLEGE OF VETERINARIANS OF BRITISH COLUMBIA BYLAWS PART 1 GOVERNANCE... 4 Definitions... 4 Council... 5 Council s responsibilities... 5 Application of Roberts Rules of Order... 6 Eligibility to serve

More information

DATA USE AGREEMENT RECITALS

DATA USE AGREEMENT RECITALS DATA USE AGREEMENT This Data Use Agreement (this Agreement ) is made by and between Yale University, a non-profit corporation, organized and existing under and by virtue of a special charter granted by

More information

Access to Information and Protection of Privacy Act

Access to Information and Protection of Privacy Act Access to Information and Protection of Privacy Act Health Information Privacy and Management Act Regulations - Public Consultation Information and Privacy Commissioner s Comments Opening Remarks The Health

More information

CHAPTER Committee Substitute for Committee Substitute for Senate Bill No. 2700

CHAPTER Committee Substitute for Committee Substitute for Senate Bill No. 2700 CHAPTER 2009-158 Committee Substitute for Committee Substitute for Senate Bill No. 2700 An act relating to secondhand dealers; amending s. 538.03, F.S.; excluding cardio and strength training or conditioning

More information

Coordinated text from 10 August 2011 Version applicable from 1 September 2011

Coordinated text from 10 August 2011 Version applicable from 1 September 2011 Coordinated text of the Act of 30 May 2005 - laying down specific provisions for the protection of persons with regard to the processing of personal data in the electronic communications sector and - amending

More information

2014 SASKATCHEWAN EMPLOYMENT 2014 CHAPTER 27. An Act to amend The Saskatchewan Employment Act and to repeal The Public Service Essential Services Act

2014 SASKATCHEWAN EMPLOYMENT 2014 CHAPTER 27. An Act to amend The Saskatchewan Employment Act and to repeal The Public Service Essential Services Act 1 SASKATCHEWAN EMPLOYMENT c. 27 CHAPTER 27 An Act to amend The Saskatchewan Employment Act and to repeal The Public Service Essential Services Act (Assented to May 14, ) HER MAJESTY, by and with the advice

More information

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011]

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011] [To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the ----------, 2011] Government of India MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department

More information

NO. 14 The Plaintiff, State of Washington, by and through its attorneys Robert W. Ferguson,

NO. 14 The Plaintiff, State of Washington, by and through its attorneys Robert W. Ferguson, 1 2 3 4 5 6 7 STATE OF WASHINGTON KING COUNTY SUPERIOR COURT 8 9 STATE OF WASHINGTON, NO. 10 Plaintiff, COMPLAINT FOR INJUNCTIVE AND OTHER RELIEF UNDER THE 11 V. CONSUMER PROTECTION ACT UBER TECHNOLOGIES,

More information

H I P AA B U S I N E S S AS S O C I ATE AGREEMENT

H I P AA B U S I N E S S AS S O C I ATE AGREEMENT H I P AA B U S I N E S S AS S O C I ATE AGREEMENT This HIPAA BUSINESS ASSOCIATE AGREEMENT (the BAA ) is entered into by and between Educators Mutual Insurance Association of Utah and its subsidiaries (

More information

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland Act on the Processing of Personal Data by the Border Guard (579/2005; amendments up to 1072/2015 included)

More information

ACTION: Update and amend OPM/ GOVT 5, Recruiting, Examining, and Placement Records.

ACTION: Update and amend OPM/ GOVT 5, Recruiting, Examining, and Placement Records. This document is scheduled to be published in the Federal Register on 03/26/2014 and available online at http://federalregister.gov/a/2014-06593, and on FDsys.gov OFFICE OF PERSONNEL MANAGEMENT Privacy

More information

IN THE SUPERIOR COURT OF THE STATE OF CALIFORNIA IN AND FOR THE COUNTY OF SAN FRANCISCO. Unlimited Jurisdiction

IN THE SUPERIOR COURT OF THE STATE OF CALIFORNIA IN AND FOR THE COUNTY OF SAN FRANCISCO. Unlimited Jurisdiction 1 1 1 1 Ira P. Rothken (SBN #0 ROTHKEN LAW FIRM 0 Northgate Dr., Suite San Rafael, CA 0 Telephone: (1-0 Facsimile: (1-0 Stan S. Mallison, (SBN 1 Hector R. Martinez (SBN LAW OFFICES OF MALLISON & MARTINEZ

More information

INVESTIGATION REPORT

INVESTIGATION REPORT Saskatchewan New Democratic Party September 19, 2018 Summary: On May 9, 2018, the Complainant submitted a privacy breach complaint to the Information and Privacy Commissioner s office alleging that two

More information

B I L L. No. 30 An Act to amend The Freedom of Information and Protection of Privacy Act

B I L L. No. 30 An Act to amend The Freedom of Information and Protection of Privacy Act B I L L No. 30 An Act to amend The Freedom of Information and Protection of Privacy Act (Assented to ) HER MAJESTY, by and with the advice and consent of the Legislative Assembly of Saskatchewan, enacts

More information

House of Representatives

House of Representatives House of Representatives General Assembly File No. 269 January Session, 2009 Substitute House Bill No. 5694 House of Representatives, March 26, 2009 The Committee on Energy and Technology reported through

More information

DATA BREACH CLAIMS IN THE US: An Overview of First Party Breach Requirements

DATA BREACH CLAIMS IN THE US: An Overview of First Party Breach Requirements State Governing Statutes 1st Party Breach Notification Notes Alabama No Law Alaska 45-48-10 Notification must be made "in the most expeditious time possible and without unreasonable delay" unless it will

More information

Document Retention and Archival Policy

Document Retention and Archival Policy Document Retention and Archival Policy December 1, 2015 Document Retention and Archival Policy Page 1 1. Background The Securities and Exchange Board of India ( SEBI ), vide its Notification dated September

More information

EXHIBIT G PRIVACY AND INFORMATION SECURITY PROVISIONS

EXHIBIT G PRIVACY AND INFORMATION SECURITY PROVISIONS Page 1 of 24 EXHIBIT G PRIVACY AND INFORMATION SECURITY PROVISIONS This Exhibit G is intended to protect the privacy and security of specified Department information that Contractor may access, receive,

More information

ACCESS TO INFORMATION AND PROTECTION OF PRIVACY ACT. ACCESS TO INFORMATION AND PROTECTION OF PRIVACY REGULATIONS R In force December 31, 1996

ACCESS TO INFORMATION AND PROTECTION OF PRIVACY ACT. ACCESS TO INFORMATION AND PROTECTION OF PRIVACY REGULATIONS R In force December 31, 1996 ACCESS TO INFORMATION AND PROTECTION OF PRIVACY ACT ACCESS TO INFORMATION AND PROTECTION OF PRIVACY REGULATIONS In force December 31, 1996 (Current to: May 13, 2016) AS AMENDED BY NORTHWEST TERRITORIES

More information

DBS Disclosure and Barring Service Policy

DBS Disclosure and Barring Service Policy DBS Disclosure and Barring Service Policy Malvern Special Families ensures particular rigour and vigilance when recruiting and employing people to work with children aged under 18 and adults considered

More information

Student/Queensland Health Terms of Agreement Information for Students

Student/Queensland Health Terms of Agreement Information for Students School of Health and Rehabilitation Sciences Head of School Professor Louise Hickson BSpThy(Hons), MAud, PhD CRICOS PROVIDER NUMBER 00025B Student/Queensland Health Terms of Agreement Information for Students

More information

Access to Personal Information Procedure

Access to Personal Information Procedure Purpose of The sixth principle of the Data Protection Act 1998 gives rights to individuals in respect of the personal data that organisations hold about them. The Act says that: Personal data shall be

More information

Commonwealth of Massachusetts County of Suffolk The Superior Court NOTICE OF DOCKET ENTRY

Commonwealth of Massachusetts County of Suffolk The Superior Court NOTICE OF DOCKET ENTRY Commonwealth of Massachusetts County of Suffolk The Superior Court CIVIL DOCKET#: SUCV2012-01925-B RE: Massachusetts v South Shore Hospital Inc TO: Shannon C Choy-Seymour, Esquire Mass Atty General's Office

More information

EVIDENCE ON THE DATA PROTECTION BILL. For the House of Commons Public Bill Committee by Open Rights Group and Chris Pounder

EVIDENCE ON THE DATA PROTECTION BILL. For the House of Commons Public Bill Committee by Open Rights Group and Chris Pounder EVIDENCE ON THE DATA PROTECTION BILL For the House of Commons Public Bill Committee by Open Rights Group and Chris Pounder March 2018 Open Rights Group is a digital rights campaigning organisation. Campaigning

More information

HOME GARDEN COMMUNITY SERVICES DISTRICT AND HOME GARDEN COALITION

HOME GARDEN COMMUNITY SERVICES DISTRICT AND HOME GARDEN COALITION HOME GARDEN COMMUNITY SERVICES DISTRICT AND HOME GARDEN COALITION WHY THE GRAND JURY INVESTIGATED The Grand Jury received a citizen s complaint regarding conflict of interest of members on both the Home

More information

Arent Fox LLP Survey of Data Breach Notification Statutes

Arent Fox LLP Survey of Data Breach Notification Statutes Arent Fox LLP Survey of Data Breach Notification Statutes James Westerlind August 2017 Survey Overview This Survey focuses on the data breach notification statutes of the states and territories within

More information

The Freedom of Information (Jersey) Law, 2011

The Freedom of Information (Jersey) Law, 2011 Retention and destruction of requested information The Freedom of Information (Jersey) Law, 2011 Published: January 2015 Brunel Hose, Old Street, St.Helier, Jersey, JE2 3RG Tel: (+44) 1534 716530 Email:

More information

House Bill 3521 Ordered by the House June 24 Including House Amendments dated May 24 and June 24

House Bill 3521 Ordered by the House June 24 Including House Amendments dated May 24 and June 24 th OREGON LEGISLATIVE ASSEMBLY--0 Regular Session Sponsored by COMMITTEE ON RULES B-Engrossed House Bill Ordered by the House June Including House Amendments dated May and June SUMMARY The following summary

More information

PROTECTION OF PERSONAL INFORMATION ACT NO. 4 OF 2013

PROTECTION OF PERSONAL INFORMATION ACT NO. 4 OF 2013 PROTECTION OF PERSONAL INFORMATION ACT NO. 4 OF 2013 [ASSENTED TO 19 NOVEMBER, 2013] [DATE OF COMMENCEMENT TO BE PROCLAIMED] (Unless otherwise indicated) (The English text signed by the President) This

More information

Privacy International's comments on the Brazil draft law on processing of personal data to protect the personality and dignity of natural persons

Privacy International's comments on the Brazil draft law on processing of personal data to protect the personality and dignity of natural persons Privacy International's comments on the Brazil draft law on processing of personal data to protect the personality and dignity of natural persons 1. Introduction This submission is made by Privacy International.

More information

Definitions The following terms have these meanings in this Policy: a. Act Personal Information Protection and Electronic Documents Act;

Definitions The following terms have these meanings in this Policy: a. Act Personal Information Protection and Electronic Documents Act; PART THREE - CONDUCT SECTION 28 PRIVACY POLICY 28.1 GENERAL 28.1.1 Background Privacy of personal information is governed by the Personal Information Protection and Electronics Documents Act ( PIPEDA ).

More information

Investigating Privacy Breaches under HITECH and HIPAA

Investigating Privacy Breaches under HITECH and HIPAA Investigating Privacy Breaches under HITECH and HIPAA Barry Herrin Smith Moore Leatherwood LLP 1180 W. Peachtree St. NW, Suite 2300 Atlanta, Georgia 30309 T (404) 962-1027 F (404) 962-1200 Presented by:

More information

Data Protection Act 1998 Policy

Data Protection Act 1998 Policy Data Protection Act 1998 Policy Responsibility for Policy: Relevant to: University Secretary All Staff, Students and Academic Partnerships Approved by: SMT in September 2016 Responsibility for Document

More information

Processor Agreement SURF Model Agreement

Processor Agreement SURF Model Agreement Processor Agreement SURF Model Agreement Utrecht, 18 November 2016 Version: 1.1 About this publication Processor Agreement SURF Model Agreement SURF P.O. Box 19035 NL-3501 DA Utrecht T +31 88 787 30 00

More information

COMMONWEALTH OF DOMINICA

COMMONWEALTH OF DOMINICA 2013 ELECTRONIC FUNDS TRANSFER ACT 17 345 COMMONWEALTH OF DOMINICA ARRANGEMENT OF SECTIONS 1. Short title and commencement. 2. Interpretation. 3. False statement. 4. Theft by taking or retaining possession

More information

AS TABLED IN THE HOUSE OF ASSEMBLY

AS TABLED IN THE HOUSE OF ASSEMBLY AS TABLED IN THE HOUSE OF ASSEMBLY A BILL entitled DIGITAL ASSET BUSINESS ACT 2018 TABLE OF CONTENTS 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 PART 1 PRELIMINARY Citation

More information

CCTV CODE OF PRACTICE

CCTV CODE OF PRACTICE EDINBURGH NAPIER UNIVERSITY CCTV CODE OF PRACTICE Introduction The monitoring, recording, holding and processing of images of identifiable individuals constitutes personal data as defined by the Data Protection

More information

ANTI MONEY LAUNDERING ACT, 1996 (Act 8 of 1996)

ANTI MONEY LAUNDERING ACT, 1996 (Act 8 of 1996) ANTI MONEY LAUNDERING ACT, 1996 (Act 8 of 1996) An Act to criminalise money laundering, to require financial institutions to maintain identification procedures and record keeping procedures, to make orders

More information

European College of Business and Management Data Protection Policy

European College of Business and Management Data Protection Policy European College of Business and Management Data Protection Policy 1. INTRODUCTION 1.1 The European College of Business and Management (ECBM) is committed to full compliance with the Data Protection Act

More information

78th OREGON LEGISLATIVE ASSEMBLY Regular Session. House Bill 2059

78th OREGON LEGISLATIVE ASSEMBLY Regular Session. House Bill 2059 th OREGON LEGISLATIVE ASSEMBLY--0 Regular Session House Bill 0 Introduced and printed pursuant to House Rule.00. Presession filed (at the request of House Interim Committee on Rules) SUMMARY The following

More information