|
|
|
94TH GENERAL ASSEMBLY
State of Illinois
2005 and 2006 SB1798
Introduced 2/25/2005, by Sen. Peter J. Roskam SYNOPSIS AS INTRODUCED: |
|
|
Creates the Personal Information Protection Act. Requires any person, business, or State agency conducting business in the State, and that owns or licenses computerized data that includes vulnerable personal information, to disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any person whose unencrypted personal information was, or is reasonably believed to have been acquired by an unauthorized person. Requires any person, business, or State agency that maintains computerized data that includes vulnerable personal information that the person, business, or State agency does not own, to notify the owner or licensee of the information of any breach of the security of the data immediately following discovery, if the vulnerable personal information was, or is reasonably believed to have been acquired by an unauthorized person. Provides that notice may be provided to a customer in one of the following ways: (1) written notice; or (2) substitute notice if the person or business demonstrates that the cost of providing notice would exceed $250,000, or the affected class of persons to be notified exceeds 500,000, or the person or business does not have sufficient contact information.
|
| |
|
|
A BILL FOR
|
|
|
|
|
SB1798 |
|
LRB094 11157 RXD 41798 b |
|
|
1 |
| AN ACT concerning business.
|
2 |
| Be it enacted by the People of the State of Illinois,
|
3 |
| represented in the General Assembly:
|
4 |
| Section 1. Short title. This Act may be cited as the |
5 |
| Personal Information Protection Act. |
6 |
| Section 5. Definitions. In this Act: |
7 |
| "Breach of the security of the system" means unauthorized |
8 |
| acquisition of computerized data that comprises the security, |
9 |
| confidentiality, or integrity of personal information |
10 |
| maintained by a person, business, or State agency. "Breach of |
11 |
| the security of the system" does not include good faith |
12 |
| acquisition of personal information by an employee or agent of |
13 |
| the person, business, or State agency, provided that the |
14 |
| personal information is not used or subject to further |
15 |
| unauthorized disclosure. |
16 |
| "Personal information" shall mean any information |
17 |
| concerning a natural person which, because of name, number, |
18 |
| personal mark, or other identifier can be used to identify the |
19 |
| natural person. |
20 |
| "Vulnerable personal information" means personal |
21 |
| information consisting of any information in combination with |
22 |
| any one or more of the following data elements, when either the |
23 |
| personal information or the data element is not encrypted: |
24 |
| (1) Social security number. |
25 |
| (2) Driver's license number. |
26 |
| (3) Account number, credit or debit card number, in |
27 |
| combination with any required security code, access code, |
28 |
| or password that would permit access to an individual's |
29 |
| financial account. |
30 |
| "Vulnerable personal information" does not include publicly |
31 |
| available information that is lawfully made available to the |
32 |
| general public from federal, State, or local government |