Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

New Personal Information Requirements for Companies

By Theodore P. Augustinos and Socheth Sor
February 28, 2012

Effective March 1, 2012, companies with personal information of Massachusetts residents must amend their existing contracts with vendors that handle such information to require the vendors'f compliance with the Massachusetts data security regulations. This requirement applies to the personal information of all Massachusetts residents, regardless of whether they are customers, employees or others with whom the company comes into contact and regardless of in which state the data is kept.

Massachusetts Data Security Regulations

The Massachusetts Office of Consumer Affairs and Business Regulation (OCABR) established what have become known as the Massachusetts data security regulations (201 CMR 17.00 et seq.) with the aim of reducing the risk of privacy breaches, including risks posed by vendor relationships. These regulations, which went into effect March 1, 2010, require any company, regardless of location, size or industry that possesses the personal information of a Massachusetts resident to adopt and implement a comprehensive written information security program (WISP). This WISP must include technical, physical, and administrative safeguards for the protection of personal information owned, licensed, received, stored, maintained, processed, or otherwise accessed by the company. As further discussed below, among the specific requirements of the Massachusetts regulations is the requirement to protect personal information handled by vendors.

As defined by the Massachusetts regulations, personal information means an individual'fs first name and last name or first initial and last name in combination with any one or more of the following: 1) Social Security number; (2) driver'fs license state-issued identification card number; or 3) financial account number or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to the financial account.

Although the Massachusetts regulations only apply to companies possessing the personal information of Massachusetts residents, a growing number of companies have created or adapted their WISP not only to meet the requirements under the Massachusetts regulations, but to cover all personal information they maintain, regardless of the state of residence. The rationale is that it can be difficult or impossible for some companies to cull out Massachusetts personal information from various databases, or corporations see it as unfair to treat employee data from one state differently than that of another.

Protecting Information Shared with Vendors

As many companies have learned, data breaches are expensive, in terms of actual costs to the company addressing notification obligations, as well as potential legal liability to others and negative publicity. According to a recent study by the Ponemon Institute, 39% of data breaches in 2010 involved third-party service providers such as outsourcers, contractors, consultants and business partners. An important data breach prevention measure is to implement effective safeguards to protect personal information and to require one'fs vendors to do the same. In addition to being sound risk mitigation, it may be required by law.

To reduce the risk of data breaches involving third-party service providers, the Massachusetts regulations require companies to take reasonable measures to select vendors that are capable of maintaining appropriate security measures to protect personal information. In addition, companies must enter into contracts with vendors to require them to implement and maintain security measures in compliance with the Massachusetts regulations. All new vendor contracts were required to meet this requirement as of March 1, 2010. For contracts that had been entered into before March 1, 2010, companies are deemed to be in compliance with this requirement if they are amended by March 1, 2012.

Although the Massachusetts regulations do not specify the wording of the provisions that these contracts should include, other than compliance with the Massachusetts regulations and any applicable federal regulations, companies should consider negotiating certain key privacy and data protection representations, warranties and covenants, including those that provide the following:

  • The vendor must comply with the Massachusetts regulations and other applicable federal and state privacy and data security requirements;
  • The company has the right to evaluate or audit the vendor periodically to ensure its compliance with applicable laws;
  • The vendor contractually requires its vendors to comply with applicable privacy and data security requirements;
  • The vendor provides the company with immediate notification of an actual or potential breach involving personal information shared with the vendor;
  • The vendor returns or appropriately destroys all of the company'fs personal information in its possession at the termination of the contract, to the extent feasible; and
  • The vendor agrees to indemnify the company and hold it harmless against any and all losses, damages and expenses, including the costs of any investigation and computer forensic costs, resulting from a data breach caused by the vendor or its vendors.

Exterritorial Effect of the Massachusetts Regulations

These requirements apply to all companies possessing the personal information of Massachusetts residents. Companies that are not technically within the scope of the Massachusetts regulations would be well advised to consider amending their contracts with vendors to include the provisions outlined above as part of their efforts to reduce the risk of data breaches. As a result of these provisions, vendors will be contractually required to implement their own WISPs, and consider how to adjust or limit their exposure, including their own pass-through obligations to sub-vendors.

The Massachusetts regulations are unique. Other states have laws or regulations that require companies to have reasonable or appropriate security measures to protect personal information, but generally they currently offer little guidance as to what specific security measures are required, or how much security is enough. In addition, they do not require companies to mandate vendor compliance by contract. There are, however, federal requirements such as the FTC'fs Safeguards Rule obligating companies to ensure by contract that their vendors have appropriate measures to protection personal information. In fact, the OCABR modeled its vendor provision after the FTC'fs Safeguards Rule.

It is important to note that these regulations have had a national effect, and, to a degree, are driving the data security policy discussion. Typically, companies apply the data security measures they have implemented to comply with the Massachusetts regulations to all personal information they collect, not just to data of Massachusetts residents, as it can be difficult or impossible to cull out Massachusetts personal information. It is also now common to see the kinds of provisions listed above in many contract negotiations.


Theodore P. Augustinos serves as co-chair of the Edwards Wildman Palmer LLP interdisciplinary Privacy and Data Protection Group in the firm's Hartford, CT, office. He may be reached at [email protected]. Socheth Sor is a member of the Privacy and Data Protection Group, also in the Hartford office. She may be reached at [email protected].

Effective March 1, 2012, companies with personal information of Massachusetts residents must amend their existing contracts with vendors that handle such information to require the vendors'f compliance with the Massachusetts data security regulations. This requirement applies to the personal information of all Massachusetts residents, regardless of whether they are customers, employees or others with whom the company comes into contact and regardless of in which state the data is kept.

Massachusetts Data Security Regulations

The Massachusetts Office of Consumer Affairs and Business Regulation (OCABR) established what have become known as the Massachusetts data security regulations (201 CMR 17.00 et seq.) with the aim of reducing the risk of privacy breaches, including risks posed by vendor relationships. These regulations, which went into effect March 1, 2010, require any company, regardless of location, size or industry that possesses the personal information of a Massachusetts resident to adopt and implement a comprehensive written information security program (WISP). This WISP must include technical, physical, and administrative safeguards for the protection of personal information owned, licensed, received, stored, maintained, processed, or otherwise accessed by the company. As further discussed below, among the specific requirements of the Massachusetts regulations is the requirement to protect personal information handled by vendors.

As defined by the Massachusetts regulations, personal information means an individual'fs first name and last name or first initial and last name in combination with any one or more of the following: 1) Social Security number; (2) driver'fs license state-issued identification card number; or 3) financial account number or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to the financial account.

Although the Massachusetts regulations only apply to companies possessing the personal information of Massachusetts residents, a growing number of companies have created or adapted their WISP not only to meet the requirements under the Massachusetts regulations, but to cover all personal information they maintain, regardless of the state of residence. The rationale is that it can be difficult or impossible for some companies to cull out Massachusetts personal information from various databases, or corporations see it as unfair to treat employee data from one state differently than that of another.

Protecting Information Shared with Vendors

As many companies have learned, data breaches are expensive, in terms of actual costs to the company addressing notification obligations, as well as potential legal liability to others and negative publicity. According to a recent study by the Ponemon Institute, 39% of data breaches in 2010 involved third-party service providers such as outsourcers, contractors, consultants and business partners. An important data breach prevention measure is to implement effective safeguards to protect personal information and to require one'fs vendors to do the same. In addition to being sound risk mitigation, it may be required by law.

To reduce the risk of data breaches involving third-party service providers, the Massachusetts regulations require companies to take reasonable measures to select vendors that are capable of maintaining appropriate security measures to protect personal information. In addition, companies must enter into contracts with vendors to require them to implement and maintain security measures in compliance with the Massachusetts regulations. All new vendor contracts were required to meet this requirement as of March 1, 2010. For contracts that had been entered into before March 1, 2010, companies are deemed to be in compliance with this requirement if they are amended by March 1, 2012.

Although the Massachusetts regulations do not specify the wording of the provisions that these contracts should include, other than compliance with the Massachusetts regulations and any applicable federal regulations, companies should consider negotiating certain key privacy and data protection representations, warranties and covenants, including those that provide the following:

  • The vendor must comply with the Massachusetts regulations and other applicable federal and state privacy and data security requirements;
  • The company has the right to evaluate or audit the vendor periodically to ensure its compliance with applicable laws;
  • The vendor contractually requires its vendors to comply with applicable privacy and data security requirements;
  • The vendor provides the company with immediate notification of an actual or potential breach involving personal information shared with the vendor;
  • The vendor returns or appropriately destroys all of the company'fs personal information in its possession at the termination of the contract, to the extent feasible; and
  • The vendor agrees to indemnify the company and hold it harmless against any and all losses, damages and expenses, including the costs of any investigation and computer forensic costs, resulting from a data breach caused by the vendor or its vendors.

Exterritorial Effect of the Massachusetts Regulations

These requirements apply to all companies possessing the personal information of Massachusetts residents. Companies that are not technically within the scope of the Massachusetts regulations would be well advised to consider amending their contracts with vendors to include the provisions outlined above as part of their efforts to reduce the risk of data breaches. As a result of these provisions, vendors will be contractually required to implement their own WISPs, and consider how to adjust or limit their exposure, including their own pass-through obligations to sub-vendors.

The Massachusetts regulations are unique. Other states have laws or regulations that require companies to have reasonable or appropriate security measures to protect personal information, but generally they currently offer little guidance as to what specific security measures are required, or how much security is enough. In addition, they do not require companies to mandate vendor compliance by contract. There are, however, federal requirements such as the FTC'fs Safeguards Rule obligating companies to ensure by contract that their vendors have appropriate measures to protection personal information. In fact, the OCABR modeled its vendor provision after the FTC'fs Safeguards Rule.

It is important to note that these regulations have had a national effect, and, to a degree, are driving the data security policy discussion. Typically, companies apply the data security measures they have implemented to comply with the Massachusetts regulations to all personal information they collect, not just to data of Massachusetts residents, as it can be difficult or impossible to cull out Massachusetts personal information. It is also now common to see the kinds of provisions listed above in many contract negotiations.


Theodore P. Augustinos serves as co-chair of the Edwards Wildman Palmer LLP interdisciplinary Privacy and Data Protection Group in the firm's Hartford, CT, office. He may be reached at [email protected]. Socheth Sor is a member of the Privacy and Data Protection Group, also in the Hartford office. She may be reached at [email protected].

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

How Secure Is the AI System Your Law Firm Is Using? Image

What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

Generative AI and the 2024 Elections: Risks, Realities, and Lessons for Businesses Image

GenAI's ability to produce highly sophisticated and convincing content at a fraction of the previous cost has raised fears that it could amplify misinformation. The dissemination of fake audio, images and text could reshape how voters perceive candidates and parties. Businesses, too, face challenges in managing their reputations and navigating this new terrain of manipulated content.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.