2025 -- S 1037

========

LC002859

========

     STATE OF RHODE ISLAND

IN GENERAL ASSEMBLY

JANUARY SESSION, A.D. 2025

____________

A N   A C T

RELATING TO CRIMINAL OFFENSES -- IDENTITY THEFT PROTECTION ACT OF 2015

     

     Introduced By: Senators Gu, Zurier, Burke, Ciccone, Urso, DiPalma, Vargas, Paolino,
Tikoian, and Lawson

     Date Introduced: May 09, 2025

     Referred To: Senate Artificial Intelligence & Emerging Tech

     It is enacted by the General Assembly as follows:

1

     SECTION 1. Sections 11-49.3-2, 11-49.3-3, 11-49.3-4, 11-49.3-5, 11-49.3-6 and 11-49.3-

2

7 of the General Laws in Chapter 11-49.3 entitled "Identity Theft Protection Act of 2015" are

3

hereby amended to read as follows:

4

     11-49.3-2. Risk-based information security program.

5

     (a) A municipal agency, state agency, or person who or that stores, collects, processes,

6

maintains, acquires, uses, owns, or licenses personal personally identifiable information about a

7

Rhode Island resident shall, at a minimum, implement and maintain a risk-based information

8

security program that meets current best practices of an approved and industry recognized

9

cybersecurity framework that contains reasonable security procedures and practices appropriate to

10

the size and scope of the organization; the nature of the information; and the purpose for which the

11

information was collected in order to protect the personal personally identifiable information from

12

unauthorized access, use, modification, destruction, or disclosure and to preserve the

13

confidentiality, integrity, and availability of such information. Controls and procedures shall be

14

implemented to restrict and manage access to the data in transit and at rest. A municipal agency,

15

state agency, or person shall not retain personal personally identifiable information for a period

16

longer than is reasonably required to provide the services requested; to meet the purpose for which

17

it was collected; or in accordance with a written retention policy or as may be required by law. A

18

municipal agency, state agency, or person shall destroy all personal personally identifiable

19

information, regardless of the medium that such information is in, in a secure manner, including,

 

1

but not limited to, shredding, pulverization, incineration, or erasure in accordance with current best

2

practices of an approved and industry recognized sanitization and destruction guideline.

3

     (b) A municipal agency, state agency, or person who or that discloses personal personally

4

identifiable information about a Rhode Island resident to a nonaffiliated third party shall require by

5

written contract that the third party and any sub-contracted party implement and maintain

6

reasonable security procedures and practices that meet current best practices of an approved and

7

industry recognized cybersecurity framework and are appropriate to the size and scope of the

8

organization; the nature of the information; and the purpose for which the information was collected

9

in order to protect the personal personally identifiable information from unauthorized access, use,

10

modification, destruction, or disclosure. The provisions of this section shall apply to contracts

11

entered into after the effective date of this act.

12

     (c) Municipal and state agencies shall provide an annual update to the general assembly

13

and the division of enterprise technology strategy and services (ETSS) or successor state agency,

14

or successor to the chief digital officer in the form required by the ETSS.

15

     11-49.3-3. Definitions.

16

     (a) The following definitions apply to this chapter:

17

     (1) “Breach of the security of the system” means unauthorized access or acquisition of

18

unencrypted, computerized data information that compromises the security, confidentiality, or

19

integrity of personal personally identifiable information maintained by the municipal agency, state

20

agency, or person. Good-faith acquisition of personal personally identifiable information by an

21

employee or agent of the agency for the purposes of the agency is not a breach of the security of

22

the system; provided, that the personal personally identifiable information is not used or subject to

23

further unauthorized disclosure.

24

     (2) “Classified data” means any data that is not public (private, sensitive, confidential).

25

Classified data requires additional security controls, such as access restrictions and encryption.

26

Classified data includes personally identifiable information (PII), personally identifiable health

27

information (PHI), or federal tax information (FTI).

28

     (3) “Cybersecurity incident” means unauthorized access that could jeopardize the

29

confidentiality, integrity, or availability of critical information systems and critical infrastructure

30

systems (i.e., first responder networks, water, energy).

31

     (4)(3) “Encrypted” means the transformation of data through the use of a one hundred

32

twenty-eight (128) bit or higher algorithmic process into a form in which there is a low probability

33

of assigning meaning without use of a confidential process or key. Data shall not be considered to

34

be encrypted if it is acquired in combination with any key, security code, or password that would

 

LC002859 - Page 2 of 9

1

permit access to the encrypted data.

2

     (5)(4) “Health insurance information” means an individual’s health insurance policy

3

number, subscriber identification number, or any unique identifier used by a health insurer to

4

identify the individual.

5

     (6)(5) “Medical information” means any information regarding an individual’s medical

6

history, mental or physical condition, or medical treatment or diagnosis by a healthcare professional

7

or provider.

8

     (7)(6) “Municipal agency” means any department, division, agency, commission, board,

9

office, bureau, authority, quasi-public authority, or school, fire, or water district within Rhode

10

Island, other than a state agency, and any other agency that is in any branch of municipal

11

government and exercises governmental functions other than in an advisory nature.

12

     (8)(7) “Owner” means the original collector of the information.

13

     (9)(8) “Person” shall include any individual, sole proprietorship, partnership, association,

14

corporation, joint venture, business, legal entity, trust, estate, cooperative, or other commercial

15

entity.

16

     (10) “Personal information” means an individual’s first name or first initial and last name

17

in combination with any one or more of the following data elements, when the name and the data

18

elements are not encrypted or are in hard copy, paper format:

19

     (i) Social security number;

20

     (ii) Driver’s license number, Rhode Island identification card number, or tribal

21

identification number;

22

     (iii) Account number, credit or debit card number, in combination with any required

23

security code, access code, password, or personal identification number, that would permit access

24

to an individual’s financial account;

25

     (iv) Medical or health insurance information; or

26

     (v) E-mail address with any required security code, access code, or password that would

27

permit access to an individual’s personal, medical, insurance, or financial account.

28

     (9) “Personally identifiable information” means information that can be used to distinguish

29

or trace an individual's identity, either alone or when combined with other information that is linked

30

or linkable to a specific individual. This information includes both direct and indirect identifiers,

31

as well as biometric data and internet data.

32

     (10) “Reasonable security procedures” means protective, documented measures that are

33

commensurate with the risk and sensitivity of the data, suitable for the specific context, including

34

nature of the business and type of data; effective in preventing unauthorized access, use, disclosure,

 

LC002859 - Page 3 of 9

1

alteration or destruction of the data. Reasonable security procedures are regularly reviewed and

2

updated to ensure they remain effective and relevant in the face of evolving threats and include

3

who is responsible for implementing and maintaining the procedures, how they are implemented

4

and how they are regularly reviewed.

5

     (11) “Remediation service provider” means any person who or that, in the usual course of

6

business, provides services pertaining to a consumer credit report including, but not limited to,

7

credit report monitoring and alerts, that are intended to mitigate the potential for identity theft.

8

     (12) “State agency” means any department, division, agency, commission, board, office,

9

bureau, authority, or quasi-public authority within Rhode Island; either branch of the Rhode Island

10

general assembly or an agency or committee thereof; the judiciary; or any other agency that is in

11

any branch of Rhode Island state government and that exercises governmental functions other than

12

in an advisory nature.

13

     (b) For purposes of this chapter, personal personally identifiable information does not

14

include publicly available information that is lawfully made available to the general public from

15

federal, state, or local government records.

16

     (c) For purposes of this chapter, “notice” may be provided by one of the following methods:

17

     (1) Written notice;

18

     (2) Electronic notice, if the notice provided is consistent with the provisions regarding

19

electronic records and signatures set forth in 15 U.S.C. § 7001; or

20

     (3) Substitute notice, if the municipal agency, state agency, or person demonstrates that the

21

cost of providing notice would exceed twenty-five thousand dollars ($25,000), or that the affected

22

class of subject persons to be notified exceeds fifty thousand (50,000), or the municipal agency,

23

state agency, or person does not have sufficient contact information. Substitute notice shall consist

24

of all of the following:

25

     (i) E-mail notice when the municipal agency, state agency, or person has an e-mail address

26

for the subject persons;

27

     (ii) Conspicuous posting of the notice on the municipal agency’s, state agency’s, or

28

person’s website page, if the municipal agency, state agency, or person maintains one; and

29

     (iii) Notification to major statewide media.

30

     11-49.3-4. Notification of breach.

31

     (a)(1) Any municipal agency, state agency, or person who or that stores, owns, collects,

32

processes, maintains, acquires, uses, or licenses data that includes personal personally identifiable

33

information shall provide notification as set forth in this section of any disclosure of personal

34

personally identifiable information, or any breach of the security of the system, that poses a

 

LC002859 - Page 4 of 9

1

significant risk of identity theft to any resident of Rhode Island whose personal personally

2

identifiable information was, or is reasonably believed to have been, acquired by an unauthorized

3

person or entity.

4

     (2) The notification shall be made in the most expedient time possible, subject to the

5

following:

6

     (i) For state and municipal agencies, no later than thirty (30) calendar days after

7

confirmation of the breach and the ability to ascertain the information required to fulfill the notice

8

requirements contained in subsection (d), and shall be consistent with the legitimate needs of law

9

enforcement as provided in subsection (b). In the event that more than five hundred (500) Rhode

10

Island residents are to be notified, the municipal agency or state agency shall notify the attorney

11

general and the major credit reporting agencies as to the timing, content, and distribution of the

12

notices and the approximate number of affected individuals. Notification to the attorney general,

13

the division of enterprise technology strategy and services (ETSS) or successor state agency or

14

successor to the chief digital officer and the major credit reporting agencies shall be made without

15

delaying notice to affected Rhode Island residents. Where affected employees are represented by a

16

labor union through a collective bargaining agreement, the employer shall also notify the collective

17

bargaining agent, or designee, of such breaches.

18

     (ii) For persons subject to subsection (a)(1), which is not a state or municipal agency, no

19

later than forty-five (45) calendar days after confirmation of the breach and the ability to ascertain

20

the information required to fulfill the notice requirements contained in subsection (d), and shall be

21

consistent with the legitimate needs of law enforcement as provided in subsection (b). In the event

22

that more than five hundred (500) Rhode Island residents are to be notified, the person shall notify

23

the attorney general and the major credit reporting agencies as to the timing, content, and

24

distribution of the notices and the approximate number of affected individuals. Notification to the

25

attorney general, the division of enterprise technology strategy and services (ETSS) or successor

26

state agency or successor to the chief digital officer and the major credit reporting agencies shall

27

be made without delaying notice to affected Rhode Island residents.

28

     (b) The notification required by this section may be delayed if a federal, state, or local law

29

enforcement agency determines that the notification will impede a criminal investigation. The

30

federal, state, or local law enforcement agency must notify the municipal agency, state agency, or

31

person of the request to delay notification without unreasonable delay. If notice is delayed due to

32

such determination, then, as soon as the federal, state, or municipal law enforcement agency

33

determines and informs the municipal agency, state agency, or person that notification no longer

34

poses a risk of impeding an investigation, notice shall be provided as soon as practicable pursuant

 

LC002859 - Page 5 of 9

1

to subsection (a)(2). The municipal agency, state agency, or person shall cooperate with federal,

2

state, or municipal law enforcement in its investigation of any breach of security or unauthorized

3

acquisition or use, which shall include the sharing of information relevant to the incident; provided

4

however, that such disclosure shall not require the disclosure of confidential business information

5

or trade secrets.

6

     (c) Any municipal agency, state agency, or person required to make notification under this

7

section and fails to do so is liable for a violation as set forth in § 11-49.3-5.

8

     (d) The notification to individuals must include the following information to the extent

9

known:

10

     (1) A general and brief description of the incident, including how the security breach

11

occurred and the number of affected individuals;

12

     (2) The type of information that was subject to the breach;

13

     (3) Date of breach, estimated date of breach, or the date range within which the breach

14

occurred;

15

     (4) Date that the breach was discovered;

16

     (5) A clear and concise description of any remediation services offered to affected

17

individuals including toll free numbers and websites to contact:

18

     (i) The credit reporting agencies;

19

     (ii) Remediation service providers;

20

     (iii) The attorney general, the division of enterprise technology strategy and services

21

(ETSS) or successor state agency or successor to the chief digital officer; and

22

     (6) A clear and concise description of the consumer’s ability to file or obtain a police report;

23

how a consumer requests a security freeze and the necessary information to be provided when

24

requesting the security freeze; and that fees may be required to be paid to the consumer reporting

25

agencies.

26

     (e) For state and municipal agencies remediation services to be provided and to be

27

described pursuant to the provisions of subsection (d)(5) of this section shall include, but not be

28

limited to:

29

     (1) Individuals eighteen (18) years of age and older, a minimum of five (5) years of

30

coverage; and

31

     (2) Individuals under eighteen (18) years of age, coverage until age eighteen (18), and no

32

less than two (2) years of coverage beyond age eighteen (18).

33

     11-49.3-5. Penalties for violation.

34

     (a) Each reckless violation of this chapter is a civil violation for which a penalty of not

 

LC002859 - Page 6 of 9

1

more than one hundred dollars ($100) one thousand dollars ($1,000) per record may be adjudged

2

against a defendant.

3

     (b) Each knowing and willful violation of this chapter is a civil violation for which a penalty

4

of not more than two hundred dollars ($200) two thousand dollars ($2,000) per record may be

5

adjudged against a defendant.

6

     (c) Whenever the attorney general has reason to believe that a violation of this chapter has

7

occurred and that proceedings would be in the public interest, the attorney general may bring an

8

action in the name of the state against the business or person in violation.

9

     (d) In addition to the penalties listed in this section, courts may impose additional

10

appropriate sanctions as warranted by the circumstances.

11

     11-49.3-6. Agencies or persons with security breach procedures.

12

     (a) Any municipal agency, state agency, or person shall be deemed to be in compliance

13

with the security breach notification requirements of § 11-49.3-4 if:

14

     (1) The municipal agency, state agency, or person maintains its own security breach

15

procedures as part of an information security policy program that meets or exceeds the requirements

16

of this chapter for the treatment of personal personally identifiable information and at a minimum,

17

adheres to the timing and notification otherwise complies with the timing requirements of § 11-

18

49.3-4, and notifies subject persons in accordance with such municipal agency’s, state agency’s, or

19

person’s notification policies in the event of a breach of security; or

20

     (2) The person maintains a security breach procedure pursuant to the rules, regulations,

21

procedures, or guidelines established by the primary or applicable federal functional regulator, as

22

defined in 15 U.S.C. § 6809(2), and notifies subject persons in accordance with the policies or the

23

rules, regulations, procedures, or guidelines established by the primary or applicable federal

24

functional regulator in the event of a breach of security of the system.

25

     (b) A financial institution, trust company, credit union, or its affiliates that is subject to and

26

examined for, and found in compliance with, the Federal Interagency Guidelines on Response

27

Programs for Unauthorized Access to Customer Information and Customer Notice shall be deemed

28

in compliance with this chapter.

29

     (c) A provider of health care, healthcare service plan, health insurer, or a covered entity

30

governed by the medical privacy and security rules issued by the federal Department of Health and

31

Human Services, Parts 160 and 164 of Title 45 of the Code of Federal Regulations, established

32

pursuant to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) shall be

33

deemed in compliance with this chapter.

34

     11-49.3-7. Notification of cybersecurity incident.

 

LC002859 - Page 7 of 9

1

     (a) Any municipal agency or state agency that detects a cybersecurity incident shall provide

2

notification to the Rhode Island state police upon detection of the cybersecurity incident within

3

twenty-four (24) hours. The state police shall notify the division of enterprise technology strategy

4

and services (ETSS) or successor state agency or successor to the chief digital officer within

5

twenty-four (24) hours, or the next business day, of initial notification.

6

     (b) Any municipal agency or state agency required to make notification under this section

7

and fails to do so may be liable for a violation as set forth in § 11-49.3-5.

8

     (c) The notification shall include, at a minimum, the following information to the extent

9

known:

10

     (1) A general and brief description of the incident, including how the cybersecurity incident

11

occurred; and

12

     (2) The date of the cybersecurity incident, estimated date of the cybersecurity incident, or

13

the date range within which the cybersecurity incident occurred.;

14

     (3) Any mitigating actions taken; and

15

     (4) Any notifications to regulatory or federal entities.

16

     SECTION 2. This act shall take effect upon passage.

========

LC002859

========

 

LC002859 - Page 8 of 9

EXPLANATION

BY THE LEGISLATIVE COUNCIL

OF

A N   A C T

RELATING TO CRIMINAL OFFENSES -- IDENTITY THEFT PROTECTION ACT OF 2015

***

1

     This act would amend the Identity Theft Protection Act of 2015. The act would eliminate

2

the definitions for "classified data" and "personal information" and establish a definition for

3

"personally identifiable information". This act would also add division of enterprise technology

4

strategy and services (ETSS) or successor state agency, or successor to the chief digital officer to

5

notification requirement provisions of the chapter. This act would raise the penalty provisions for

6

violations.

7

     This act would take effect upon passage.

========

LC002859

========

 

LC002859 - Page 9 of 9