{"id":1641,"date":"2006-01-06T00:00:00","date_gmt":"2006-01-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/06\/three-more-u-s-states-add-laws-on-data-breaches\/"},"modified":"2021-12-30T11:39:44","modified_gmt":"2021-12-30T11:39:44","slug":"three-more-u-s-states-add-laws-on-data-breaches","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/06\/three-more-u-s-states-add-laws-on-data-breaches\/","title":{"rendered":"Three more U.S. states add laws on data breaches"},"content":{"rendered":"<p>Companies struggling to keep up with a patchwork of U.S. state laws related to data privacy and information security have three more to contend with, as new security-breach notification laws went into effect in Illinois, Louisiana and New Jersey on Jan. 1.  Like existing statutes in more than 20 other states, the new laws prescribe various actions that companies are required to take in the event of a security breach involving the compromise of personal data about their customers.  For instance, New Jersey&#8217;s Identity Theft Prevention Act requires businesses to destroy all unneeded customer data and to notify consumers when sensitive data about them has been accessed by an unauthorized person.  Louisiana&#8217;s Database Security Breach Notification Law requires entities that collect information on the state&#8217;s residents to notify affected individuals of security breaches involving their confidential data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For companies that do business nationally or in various states, the smorgasbord of state laws poses a growing problem, because the measures often specify different triggers for notifications and set varying requirements on what needs to be disclosed, to whom and when, said Kirk Herath, chief privacy officer at Nationwide Mutual Insurance Co. in Columbus, Ohio.<\/p>\n<p>In addition, some states require companies to provide credit-monitoring services to affected customers, whereas others don&#8217;t, Herath said.<\/p>\n<p>http:\/\/www.networkworld.com\/news\/2006\/010606-data-breaches-law.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1641","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1641"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1641\/revisions"}],"predecessor-version":[{"id":4128,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1641\/revisions\/4128"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}