Financial Services Alert New Massachusetts Identity Theft Prevention Law Breaks New Ground

Financial Services Alert
August 2007
Authors:
Henry L. Judy 202.778.9032
www.klgates.com
New Massachusetts Identity Theft Prevention
Law Breaks New Ground
henry.judy@klgates.com
Holly K. Towle
206.370.8334 holly.towle@klgates.com
Sean P. Mahoney 617.261.3202
sean.mahoney@klgates.com
K&L Gates comprises approximately 1,400
lawyers in 22 offices located in North
America, Europe and Asia, and represents
capital markets participants, entrepreneurs,
growth and middle market companies,
leading FORTUNE 100 and FTSE 100
global corporations and public sector
entities. For more information, please visit
www.klgates.com.
On August 2, 2007, Massachusetts Governor Deval Patrick signed into law Chapter 82 of
the Acts of 2007 entitled, “An Act Relative to Security Freezes and Notification of Data
Breaches” (the “Act”). The Act contains three main components: (1) mandatory notification
requirements to be followed upon a data security breach; (2) data disposal requirements; and
(3) a “security freeze” procedure applicable to credit bureaus to allow consumers to mitigate
identity theft. Unlike similar statutes in other states,1 the Act applies to everybody—natural
persons, corporations and government agencies alike. The Act purportedly applies to anyone
who holds information relating to Massachusetts residents—not just persons who conduct
business in Massachusetts—thus creating issues regarding its constitutionality. Penalties
for non-compliance range from treble damages plus attorneys fees (recoverable by the
Massachusetts Attorney General) for the security breach notice provisions, to fines of up
to $50,000 per violation for failure to comply with the data disposal requirements. The
notification and security freeze provisions become effective October 31, 2007, while the
data security provisions become effective February 3, 2008. Each component of the Act is
discussed below.
Data Security Breach Notification Requirements
The Act creates a new Chapter 93H in the General Laws, requiring that agencies adopt
data security regulations. It also provides a notification procedure in the event of a data
security breach affecting personal information pertaining to residents of Massachusetts. The
applicability of the statute is not limited to businesses, but includes all natural persons as well
as legal entities and Massachusetts governmental agencies.2
“Personal information” subject to Chapter 93H includes a resident’s first and last name, or a
resident’s first initial and last name and any one or more of the following: (a) social security
number, (b) driver’s license or state-issued identification card number, or (c) “financial
account number.” For a financial account number to be considered as causing the name
information to be “personal information,” the Act does not require compromise of a PIN or
other identifier that would permit access to the account. This is different from most other
state statutes of this kind and questionable as policy matter. Additionally, the Act does not
provide any definition as to what constitutes a “financial account.” “Personal information”
explicitly excludes any data that is lawfully obtained from publicly available information.
Indirectly, it also excludes non-electronic information: the definition of “breach of security”
pertains only to electronic data, although the failure of the Act consistently to use that defined
term creates some ambiguities.
Holders of personal information are divided into two categories: (1) persons who “own or
license” personal information and (2) others who “maintain or store” covered information.
1
2
For a list of these statutes and a discussion of them, see a treatise co-authored by one of the authors of this
alert: see Holly K. Towle and Raymond T. Nimmer, The Law of Electronic Commercial Transactions (2003-07, A.S. Pratt & Sons) at Chapter 16.08[3].
The definition of “agency” under the Data Disposal provisions (discussed below) is not limited to Massachusetts governmental agencies.
Financial Services Alert
This dichotomy seems necessary in order to allocate
responsibilities among those who have a relationship
to the subject of the information and those who
merely process the information. But, like statutes
in other states, the Act does not elaborate on who
“owns” or “licenses” personal information, an issue
that is complex in modern law. Under a wide variety
of circumstances, residents, retailers, card issuers,
service providers and other participants in our complex
economy can and may have a good basis for arguing
that they are or are not owners, licensors or licensees
of different personal data elements. The Act does not
resolve these fundamental underlying ambiguities. It
can be expected that the applicable regulatory agencies
and the courts will need to address them. As discussed
below, these distinctions are not just theoretical but
have important compliance consequences under the
Act.
“Maintaining” or “storing” information is a separate
category of “holding” and would include the activities
of at least some service providers. However, the scope
of this separate category is not clear. For example, if
a service provider processes information and holds it
only temporarily in cache, does that service provider
maintain or store it within the terms of the statute?
Natural persons are subject to the Act and maintaining
or holding is not limited to doing so for businesses
purposes. Hence, a security breach involving home
records (e.g., family personal information held by a
sibling) is literally covered by the Act.
The foregoing scheme appears to assume that it will
be clear in most cases exactly which persons are
owners or licensors and which simply maintain or
store the personal information and that a breach may
not involve a range of data elements, some which are
held in different capacities. This is not unlike the
ambiguity that arises under the EU Data Protection
Directive as to who is a “controller,” “co-controller,”
“processor” or “sub-processor” with respect to different
data elements.
The obligation to provide a notice is triggered if the
person (1) knows or has reason to know of a “breach
of security,” a defined term, or (2) knows or has reason
to know that the personal information of a resident
was acquired or used by an unauthorized person or
used for an unauthorized purpose. The term “breach
of security” is defined to include the “unauthorized
acquisition or unauthorized use of unencrypted data or,
encrypted electronic data and the confidential process
or key that is capable of compromising the security,
confidentiality, or integrity of personal information,
maintained by a person or agency that creates a
substantial risk of identity theft or fraud against a
resident of [Massachusetts].” Thus, at least when the
term “breach of security” is used,3 to constitute such
a breach an event must create a “substantial risk” of
identity theft or fraud. This is consistent with federal
guidance for financial institutions and avoids the
problems created by some of the state statutes that
force notices in circumstances where there really is
no reasonable risk. For example, such notices can
have the effect of encouraging consumers to seek new
numbers when such is not warranted and causing them
to ignore all notices as being just more paper.
With respect to encryption, the Act appears to be the
first of the state statutes to define the level of encryption
required (“encrypted” is defined as a process using 128
bit key length or higher4). At least three issues are
raised: (1) a covered entity that has encrypted at lower
levels to come within encryption exemptions under
other state statutes will need to revamp its systems as to
Massachusetts; (2) the Massachusetts exemption is not
as robust as under some of the other state statutes since
even encrypted data might trigger the need to provide
notice if a data key is exposed; and (3) the robustness
of the encryption is defined solely in terms of key
length and does not consider the relative strengths of
the different algorithms that might be used.
Notice of a breach of security must be sent “as soon
as practicable and without unreasonable delay.” A
Unfortunately, the Act is fundamentally ambiguous on whether such a breach is required: clearly a breach of security is the trigger point for subsection (1) of this paragraph, but subsection (2) does not use that defined term and literally simply requires acquisition or use by an unauthorized person or for an unauthorized purpose. It is unlikely that the legislature intended, for purposes of subsection (2), to cast aside all of the concepts inherent in the definition of “breach of security” (such as the requirement for electronic data and substantial risk of harm), but such is not clear. Hopefully the regulations will remedy this ambiguity.
3
A California regulator has suggested in a “best practices” guide that encryption meet standards set by the National Institute of Standards and Technology’s Advanced Encryption Standard, but the guide itself explains that it has no legal significance (“The recommendations offered here are neither regulations, nor mandates, nor legal opinions.”) See “Recommended Practices on Notice of Security Breach Involving Personal Information” (2/07, CA Office of Privacy Protection).
4
August 2007 | Financial Services Alert
person who “owns or licenses” personal information is
required to send notice to the Massachusetts Attorney
General, Director of the Office of Consumer Affairs
(“Consumer Affairs”) and to each resident affected by
the security breach or potential unauthorized acquisition
or use. If the reporting person is an agency within
the executive branch of Massachusetts government,
it must also notify the Division of Public Records.
After receipt of a notice, Consumer Affairs is then
required to provide the reporting person with a list
of state agencies and credit bureaus that must also be
notified of the incident. The provision of notice may
be delayed if a law enforcement agency (a) determines
that giving notices may impede a criminal investigation
and (b) notifies the Attorney General in writing of such
determination. But once the law enforcement agency
notifies the reporting person that the notice may be
given without risk of impeding an investigation, the
notice must be given promptly.
The notice provided by a person owning or licensing
personal information to the Attorney General and the
Consumer Affairs must specify: (1) the nature of the
breach of security or unauthorized acquisition or use,
(2) the number of Massachusetts residents affected by
the incident at the time of notification, and (3) any steps
the reporting person has taken or plans to take relating
to the incident.
It is critical to note that the notice provided to residents is
distinctly different. It must include: (a) the consumer’s
right to obtain a police report, and (b) information
instructing a consumer how to effect a security freeze
on his or her credit report, but may not disclose the
nature of the incident or the number of Massachusetts
residents affected thereby. This later requirement,
i.e., the prohibition on describing the incident or the
numbers affected, directly contradicts several other
“security breach notice” statutes which expressly
require at least a general description of the breach.5
Thus, a person sending notice in the form required
by those states will violate Massachusetts law, and a
person sending the notice required in Massachusetts
will violate the laws of other states. In short, and
assuming any of the statutes are constitutional, special
notices for Massachusetts will need to be crafted.
Persons who maintain or hold personal information
are required to send notice to the “owner or licensor”
and to cooperate with such owner or licensor, but
cannot be required to send notices to the residents
that are the subject of the information at risk. Such
holders are required to cooperate by providing the
owner or licensor with: (a) the nature of the breach
of security or unauthorized acquisition or use, (b) the
date or approximate date of the incident, and (c) any
steps the holder has taken or plans to take relating to
the incident. The holder is not required to provide any
information to an owner or licensor of the information
that constitutes confidential business information or
trade secrets.
Notices may be made in writing or electronically
consistent with the E-Sign Act6 and the analogous
provision of Massachusetts law, Mass. Gen. L. ch.
110G. If the person or agency required to provide
notice demonstrates that (a) the cost of providing
written notice will exceed $250,000, (b) if notice
is required for more than 500,0000 Massachusetts
residents, or (c) if the person or agency does not have
sufficient contact information to provide notice, then
a “substitute notice” may be provided.
A “substitute notice” is notice that includes the
following three elements: (1) e-mail notice, if the
person or agency has e-mail addresses of affected
Massachusetts residents; (2) a clear and conspicuous
posting of the notice on the home page of the person
or agency if the person or agency maintains a website;
and (3) publication in or broadcast through media or
medium that provides notice throughout Massachusetts.
Substitute notices can have the effect of promoting
identity theft by alerting identity thieves to a problem
they can “solve” (e.g., by sending “phishing” emails
offering to “correct” the resident’s account if only the
resident will confirm their account number). Although
other state statutes have similar provisions, the vast
majority of them also allow notice to be provided in
compliance with the reporting persons’ information
See e.g., NC GS § 75-65(d) (notice must include description of the “incident in general terms”) and N.H. Rev. Stat. tit. XXXI,
§ 359-C:20 (same); see also e.g., Michigan S.B. 309 (notice must “describe the security breach in general terms”).
5
The Electronic Signatures in Global and National Commerce Act, Pub. L. No. 106-229, 114 Stat. 464 (2000) (codified at 15 U.S.C.
§ 7001 et seq.). This wording, which exists in most of the state statutes, is another example of ambiguity in the Act.
6
August 2007 | Financial Services Alert
security policy. Such provisions allow parties to
have a privacy/information policy, for example, that
allows use of a more private form of notice such as
via email. Federal guidance for financial institutions
similarly allows email notice per agreement and
without compliance with the provision of E-Sign
referenced in the Act. The Act, however, contains
no such provisions, so may promote what it hopes to
prevent, identity theft.
A person that maintains procedures for responding to
a breach of security pursuant to federal laws, rules,
regulations, guidance, or guidelines, and provides
notice in accordance with such procedures, is deemed
to comply with the Act if that person also provides a
notice to the Attorney General and Consumer Affairs
of the breach as soon as practicable. The notice must
describe any steps the person or agency has taken
or plans to take relating to the breach pursuant to
the applicable federal law, rule, regulation, guidance
or guidelines. Whether this state gloss on federal
law is preempted remains to be seen and may depend
upon the underlying federal law and the scope of its
preemption (or lack thereof).
Several Massachusetts governmental agencies are
required to adopt regulations designed to protect the
“personal information” of Massachusetts residents.
Consumer Affairs is charged with promulgating
regulations that will apply to persons that own or
license personal information relating to Massachusetts
residents. The Massachusetts legislature, judiciary,
Attorney General, Secretary of State, Treasurer and
State Auditor are required to adopt rules or regulations
governing their own safe-keeping of personal
information relating to Massachusetts residents. The
Massachusetts Supervisor of Records is charged with
promulgating regulations that will apply to all other
state agencies.
The Attorney General is explicitly authorized to pursue
violations of the Act under the Massachusetts Unfair
and Deceptive Acts and Practices (“UDAP”) statute.
UDAP statute allows penalties treble damages plus
attorneys’ fees.
Data Disposal Requirements
The Act also creates a new Chapter 93I of the
Massachusetts General Laws. The new chapter
requires any person holding “personal information”
on a resident of Massachusetts to follow certain
procedures in disposing of such information. Chapter
93I does not become effective until February 3, 2008,
and like the Act, creates constitutional questions.
The definition of “personal information” in Chapter 93I
is identical to the definition in Chapter 93H (relating to
data security breach notification) with two exceptions:
(1) Chapter 93I applies to non-electronic information
as well as electronic information; and (2) the 93I
definition also includes name and biometric indicator
as personal information. Thus, on both grounds a
fingerprint card with a Massachusetts resident’s name
would be subject to Chapter 93I (data disposal) but for
both reasons would not be covered by Chapter 93H
(data security).
Chapter 93I is applicable to individuals in their
completely personal capacities. Thus, if any person,
apparently regardless of location, wishes to dispose
of his or her computer, cell phone, PDA or other
device and that device contains personal information
concerning any Massachusetts resident, that person
must dispose of the device in accordance with Chapter
93I. As discussed below, the requirement would
appear to extend also to computer vendors that have
environmentally friendly programs for the disposal of
such devices.
New Chapter 93I imposes requirements for any
Massachusetts government agency or person disposing
of records containing personal information relating to
Massachusetts residents. Paper documents containing
personal information must be “redacted, burned,
pulverized or shredded so that personal data cannot
practicably be read or reconstructed.” Non-paper
personal information must be “destroyed or erased so
that personal information cannot practicably be read
or reconstructed.”
Service providers that provide disposal services must
implement and monitor compliance with policies and
procedures designed to prohibit unauthorized access
to or acquisition of or use of personal information
“during the collection, transportation and disposal
of personal information.” This requirement raises
certain implementation questions. First, the absolute
term “prohibit” appears to set a high and perhaps
unreachable standard. Second, practice differs in the
disposal industry as to whether a service provider
that collects older computers for disposal or erasure
acquires title at the time of collection or simply takes
them on consignment. The distinction matters for
August 2007 | Financial Services Alert
insurance, environmental law and other purposes. At
the time of collection is the service provider an owner
or licensor of any personal data on the hard drives for
notice purposes? Or is the entity that engaged the
service provider?
Note that Chapter 93I does not impose any condition
that a service provider or other person disposing of
personal information have any knowledge that he,
she or it even possesses the personal information.
An owner of a public waste receptacle could
conceivably violate Chapter 93I if members of the
public place items containing personal information in
that receptacle; town governments that collect waste
from residents may need to be concerned that any
personal information contained in household waste is
properly disposed of; and even consumers will need
to be careful of disposing of their credit card imprint
receipts and family records. Ironically, a new form
of “dumpster diving” may occur as service providers
inspect previously uninspected garbage in order to be
able to comply with the statute. A similar disposal rule
at the federal level was accompanied by an explanation
that waste containing covered information must be
so marked by the party disposing of it;7 although that
approach has its own problems, it at least gives the
service provider a fighting chance.
Violations of Chapter 93I are subject to fines of up
to $100 per item of data affected up to a maximum
of $50,000 for each instance of improper disposal.
Additionally, the Attorney General is explicitly
authorized to pursue violations Chapter 93I under the
Massachusetts UDAP statute.
Security Freeze Provisions
The Act adds a new Section 62A to Chapter 93 of
the Massachusetts General Laws creating the core
of the new security freeze right. A Massachusetts
“consumer” may request a security freeze on his or her
credit report (i.e. the report maintained on a consumer
by a credit bureau).
The credit bureau receiving the request then has three
business days from the date of receipt of the request
to effect the security freeze and five business days to
notify the consumer in writing that the freeze is in
effect. Within five business days of a request, a credit
bureau is required to provide the consumer with a PIN
or password to use in order to remove the security
freeze or to authorize the release of information to
a specific creditor. A credit bureau is required to
release a security freeze within three business days of
a consumer request and may charge a fee of up to $5
unless the consumer is a victim of identity theft.
Once a security freeze is in place, the credit bureau may
not release a credit report relating to a consumer to any
person without the consumer’s express authorization,
subject to the exemptions described in the following
paragraph. While a security freeze is in place, a credit
bureau cannot change a consumer’s name, date of birth,
social security number, or address in that consumer’s
credit report without sending a written confirmation
of the change to the consumer within 30 days of the
change.
Even if a freeze is in effect, a credit bureau may
release the related consumer’s credit report to any of
the following: (a) a creditor (or agent of a creditor)
of the consumer, (b) a proposed assignee of an
obligation of the consumer if the consumer has an
existing relationship with the proposed assignee, (c)
any government agency, law enforcement agency, or
trial court acting pursuant to a court order, warrant
or subpoena; (d) the Massachusetts child support
agency; (e) the executive office of health and human
services or its agents or assigns acting to investigate
Medicaid fraud; (f) a person using credit information
for the purposes of prescreening as provided for by
the federal Fair Credit Reporting Act (i.e. credit card
companies preparing pre-approved offers of credit);
(g) any credit file monitoring service to which the
consumer has subscribed; (h) any person acting solely
for the purpose of providing a consumer with a copy
of his consumer report upon the consumer’s request;
or (i) to any property and casualty insurer licensed
by Massachusetts for use in rating or underwriting
insurance policies.
Interestingly, all notifications are required to be
delivered by consumers to credit bureaus via postal
mail or overnight courier. Additionally, a consumer
would have to notify each of the credit bureaus in this
way to effect a security freeze. This would make the
security freeze a cumbersome procedure in the event
Holly K. Towle and Raymond T. Nimmer, The Law of Electronic Commercial Transactions (2003-07, A.S. Pratt & Sons) at Chapter 16.12.
7
August 2007 | Financial Services Alert
of actual danger of identity theft. A thief could obtain
credit instantaneously via electronic means, while the
procedure for preventing this must be done by paper
and physical delivery. The prohibition against use
of electronic methods of delivery may also create
questions under federal law restricting the powers of
states to discriminate against e-commerce. Similarly,
the restriction on the release of all information by
credit bureaus may raise constitutional issues.
Because a consumer may request a security freeze at
any time—whether or not the consumer reasonably
believes that he or she is vulnerable to identity theft—
the open-ended nature of the security freeze effectively
gives consumers a new right to control dissemination of
their credit reports. Moreover, the security freeze may
only be removed at the consumer’s direction unless
that consumer has “misrepresented a material fact” in
which case the credit bureau may lift the freeze with
five days prior notice to the consumer. Accordingly
and ironically, the danger of an identity thief instituting
a security freeze after changing the address on the
consumer’s credit report may create a greater risk to
consumers than existed before.
Coverage of the Act
The Act has the potential to affect a large number of
persons, businesses and government agencies within
the reach of Massachusetts’ jurisdiction. The sole
criterion subjecting one to the Act is the possession
of personal information relating to a Massachusetts
resident. There is no requirement that the personal
information be used in commerce or that the person
holding the information has any other contact to
Massachusetts (other than contacts sufficient to warrant
jurisdiction). Although the Act will have minimal
impact on financial institutions—they are already
subject to many similar requirements under federal law
and regulatory guidance—many others may be caught
off guard by the asserted breadth of the Act. It is
therefore important for any person, business or agency
holding personal information relating to Massachusetts
residents to assess the impact of the Act on it.
K&L Gates comprises multiple affiliated partnerships: a limited liability partnership with the full name Kirkpatrick & Lockhart Preston Gates Ellis LLP qualified
in Delaware and maintaining offices throughout the U.S., in Berlin, and in Beijing (Kirkpatrick & Lockhart Preston Gates Ellis LLP Beijing Representative
Office); a limited liability partnership (also named Kirkpatrick & Lockhart Preston Gates Ellis LLP) incorporated in England and maintaining our London
office; a Taiwan general partnership (Kirkpatrick & Lockhart Preston Gates Ellis) which practices from our Taipei office; and a Hong Kong general
partnership (Kirkpatrick & Lockhart Preston Gates Ellis, Solicitors) which practices from our Hong Kong office. K&L Gates maintains appropriate registrations
in the jurisdictions in which its offices are located. A list of the partners in each entity is available for inspection at any K&L Gates office.
This publication/newsletter is for informational purposes and does not contain or convey legal advice. The information herein should not be used or relied
upon in regard to any particular facts or circumstances without first consulting a lawyer.
Data Protection Act 1998—We may contact you from time to time with information on Kirkpatrick & Lockhart Preston Gates Ellis LLP seminars and with our
regular newsletters, which may be of interest to you. We will not provide your details to any third parties. Please e-mail london@klgates.com if you would
prefer not to receive this information.
©1996-2007 Kirkpatrick & Lockhart Preston Gates Ellis LLP. All Rights Reserved.
August 2007 |