Last week, California Governor Jerry Brown signed into law three bills that revise California’s data breach notification statute. The bills, which take effect January 1, 2016, establish specific formatting requirements for the consumer breach notice letter; define “encrypted”; and create notice, security, and privacy obligations for data captured by automated license plate recognition (ALPR) systems. The enactment of these bills, and others, indicates California’s continued commitment to reviewing and revising privacy- and security-related legislation to address perceived gaps and new threats.
Currently, California’s breach notification statute requires that the plain-language notice to affected consumers include (1) the notifying entity’s name and contact information; (2) a list of the types of personal information subject to the breach; (3) the date of the breach; (4) whether notification was delayed due to a law enforcement investigation; (5) if the breach involved Social Security, driver’s license, or California identification card numbers, the phone numbers and addresses of the major credit reporting agencies; and (6) if identity theft and mitigation services are offered, all information necessary to take advantage of that offer. S.B. 570 adds the following formatting requirements:
- The notice must be titled “Notice of Data Breach.”
- The required content (listed above) must be described under the following headings: “What Happened,” “What Information Was Involved,” “What We Are Doing,” “What You Can Do,” and “For More Information.” Additional information may be provided as a supplement to the notice.
- The format of the notice must be designed to call attention to the nature and significance of the information it contains.
- The title and headings must be clearly and conspicuously displayed.
- The text must be at least 10-point type.
Under California law, a breach has occurred only if the compromised personal information is not encrypted. A.B. 964 defines “encrypted” as “rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.”