RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Reply To:
Records Management Program <[log in to unmask]>
Date:
Tue, 30 Jun 2009 08:20:21 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (64 lines)
fyi


http://www.realtime-itcompliance.com/laws_regulations/2009/06/south_carolina_alaska_privacy.htm

South Carolina & Alaska Privacy Breach Notice Laws Go Into Effect July 1

This week two more U.S. breach notice laws go into effect...

1. Most of South Carolina's Financial Identity Fraud and Identity Theft
Protection Act went into effect in December 2008. However, Section 4.A and
Section 7.A, which cover identity theft and security breach notification,
are going into effect on July 1, 2009.

A few interesting notes about this law:


    * It has a civil penalty of $1,000 per resident affected by the breach
for entities who 'knowingly and wilfully' violate the notification
requirements.

    * It does not specify a maximum amount for the total penalty. Most
other U.S. state and territory breach notice laws have penalty caps.

    * If the number of residents affected exceeds 1,000, entities also
have to notify the Department of Consumer Affairs.

2. Alaska's Personal Information Protection Act goes into effect no July
1, 2009.

A violation of this law could result in a penalty of up to $500 for each
resident whose information was compromised by the breach, with the maximum
amount set at $50,000.


Among other requirements, both of these laws require:

    * That businesses who posses ('own' or license) the personal
information of residents of the states to notify a breach of security to
every resident whose personal information was affected.
    * Breach notification must be made within the 'most expedient time
possible and without reasonable delay'.


_______________________________________________
Dataloss Mailing List ([log in to unmask])

Get business, compliance, IT and security staff on the same page with
CREDANT Technologies: The Shortcut Guide to Understanding Data Protection
from Four Critical Perspectives. The eBook begins with considerations
important to executives and business leaders.
http://www.credant.com/campaigns/ebook-chpt-one-web.php



-- 
Peterk
Richmond, Va

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

ATOM RSS1 RSS2