Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Information Security Breaches: Privacy Laws and Procedures

By Melissa J. Krasnow and Randolph M. Perkins
May 30, 2007

Part Two of a Two-Part Series

Part One of this series discussed security breach notification laws. The conclusion addresses security procedures laws.

In addition to the California security breach notification law, California was the first state to enact a security procedures law (A.B. 1950), which became effective Jan. 1, 2005. This law requires that a business implement and maintain reasonable security procedures and practices to protect personal information. A few other states, namely 1) Arkansas, 2) Nevada, 3) Rhode Island, and 4) Texas, also have enacted security procedures laws. In addition, Utah has passed such a law, which became effective Jan. 1, 2007. Again, for purposes of the utility of any overview, and because this California law also serves as the model for a number of the other state laws, a step-by-step analysis of this law is also set out here for consideration by landlords and managers.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Spurred By Data Breaches, CLOs Are Increasing Cybersecurity Leadership Role Image

Chief information officers still bear the brunt of cybersecurity worries at many companies. But a study by the Association of Corporate Counsel Foundation finds that chief legal officers are increasingly taking a leadership role in cybersecurity strategy.

GCs Want to Tap Into AI But Lack Roadmap, Report Shows Image

General counsel are eager to tap the promise of generative AI. But without clear technology road maps, many legal departments are struggling to turn that interest into action.

Is Google Search Dead? The Key to Thriving In an AI-Driven World Image

Part Two of this two-part article examines practical steps marketers must take to succeed in this changing landscape by embracing a multichannel, AI-driven approach to their marketing and PR efforts.

Shifting Crypto and Cyber Enforcement Priorities In SEC Image

When the SEC issues the next annual enforcement report for fiscal year 2025, we expect securities offering actions and investment adviser actions will almost certainly be up, and the “crypto” and “cyber” cases will almost certainly be down. Public statements by the new SEC administration have said as much, but even more telling than public statements are the allocation of limited enforcement resources.

Seventh, Ninth Court Rulings Tighten Reach of Federal Video Privacy Protection Act Image

The VPPA may be nearly four-decades old and video-rental stores largely a thing of the past, but the rise of online content, streaming services and ancillary activities has brought with it frequent litigation based on the VPPA. The key challenge in these litigations is how to interpret the VPPA’s 1980s terms in light of today’s digital advances.