State Codes and Statutes

Statutes > Utah > Title-13 > Chapter-44 > 13-44-202

13-44-202. Personal information -- Disclosure of system security breach.
(1) (a) A person who owns or licenses computerized data that includes personalinformation concerning a Utah resident shall, when the person becomes aware of a breach ofsystem security, conduct in good faith a reasonable and prompt investigation to determine thelikelihood that personal information has been or will be misused for identity theft or fraudpurposes.
(b) If an investigation under Subsection (1)(a) reveals that the misuse of personalinformation for identity theft or fraud purposes has occurred, or is reasonably likely to occur, theperson shall provide notification to each affected Utah resident.
(2) A person required to provide notification under Subsection (1) shall provide thenotification in the most expedient time possible without unreasonable delay:
(a) considering legitimate investigative needs of law enforcement, as provided inSubsection (4)(a);
(b) after determining the scope of the breach of system security; and
(c) after restoring the reasonable integrity of the system.
(3) (a) A person who maintains computerized data that includes personal informationthat the person does not own or license shall notify and cooperate with the owner or licensee ofthe information of any breach of system security immediately following the person's discovery ofthe breach if misuse of the personal information occurs or is reasonably likely to occur.
(b) Cooperation under Subsection (3)(a) includes sharing information relevant to thebreach with the owner or licensee of the information.
(4) (a) Notwithstanding Subsection (2), a person may delay providing notification underSubsection (1) at the request of a law enforcement agency that determines that notification mayimpede a criminal investigation.
(b) A person who delays providing notification under Subsection (4)(a) shall providenotification in good faith without unreasonable delay in the most expedient time possible afterthe law enforcement agency informs the person that notification will no longer impede thecriminal investigation.
(5) (a) A notification required by this section may be provided:
(i) in writing by first-class mail to the most recent address the person has for the resident;
(ii) electronically, if the person's primary method of communication with the resident isby electronic means, or if provided in accordance with the consumer disclosure provisions of 15U.S.C. Section 7001;
(iii) by telephone, including through the use of automatic dialing technology notprohibited by other law; or
(iv) by publishing notice of the breach of system security:
(A) in a newspaper of general circulation; and
(B) as required in Section 45-1-101.
(b) If a person maintains the person's own notification procedures as part of aninformation security policy for the treatment of personal information the person is considered tobe in compliance with this chapter's notification requirements if the procedures are otherwiseconsistent with this chapter's timing requirements and the person notifies each affected Utahresident in accordance with the person's information security policy in the event of a breach.
(c) A person who is regulated by state or federal law and maintains procedures for abreach of system security under applicable law established by the primary state or federal

regulator is considered to be in compliance with this part if the person notifies each affected Utahresident in accordance with the other applicable law in the event of a breach.
(6) A waiver of this section is contrary to public policy and is void and unenforceable.

Amended by Chapter 388, 2009 General Session

State Codes and Statutes

Statutes > Utah > Title-13 > Chapter-44 > 13-44-202

13-44-202. Personal information -- Disclosure of system security breach.
(1) (a) A person who owns or licenses computerized data that includes personalinformation concerning a Utah resident shall, when the person becomes aware of a breach ofsystem security, conduct in good faith a reasonable and prompt investigation to determine thelikelihood that personal information has been or will be misused for identity theft or fraudpurposes.
(b) If an investigation under Subsection (1)(a) reveals that the misuse of personalinformation for identity theft or fraud purposes has occurred, or is reasonably likely to occur, theperson shall provide notification to each affected Utah resident.
(2) A person required to provide notification under Subsection (1) shall provide thenotification in the most expedient time possible without unreasonable delay:
(a) considering legitimate investigative needs of law enforcement, as provided inSubsection (4)(a);
(b) after determining the scope of the breach of system security; and
(c) after restoring the reasonable integrity of the system.
(3) (a) A person who maintains computerized data that includes personal informationthat the person does not own or license shall notify and cooperate with the owner or licensee ofthe information of any breach of system security immediately following the person's discovery ofthe breach if misuse of the personal information occurs or is reasonably likely to occur.
(b) Cooperation under Subsection (3)(a) includes sharing information relevant to thebreach with the owner or licensee of the information.
(4) (a) Notwithstanding Subsection (2), a person may delay providing notification underSubsection (1) at the request of a law enforcement agency that determines that notification mayimpede a criminal investigation.
(b) A person who delays providing notification under Subsection (4)(a) shall providenotification in good faith without unreasonable delay in the most expedient time possible afterthe law enforcement agency informs the person that notification will no longer impede thecriminal investigation.
(5) (a) A notification required by this section may be provided:
(i) in writing by first-class mail to the most recent address the person has for the resident;
(ii) electronically, if the person's primary method of communication with the resident isby electronic means, or if provided in accordance with the consumer disclosure provisions of 15U.S.C. Section 7001;
(iii) by telephone, including through the use of automatic dialing technology notprohibited by other law; or
(iv) by publishing notice of the breach of system security:
(A) in a newspaper of general circulation; and
(B) as required in Section 45-1-101.
(b) If a person maintains the person's own notification procedures as part of aninformation security policy for the treatment of personal information the person is considered tobe in compliance with this chapter's notification requirements if the procedures are otherwiseconsistent with this chapter's timing requirements and the person notifies each affected Utahresident in accordance with the person's information security policy in the event of a breach.
(c) A person who is regulated by state or federal law and maintains procedures for abreach of system security under applicable law established by the primary state or federal

regulator is considered to be in compliance with this part if the person notifies each affected Utahresident in accordance with the other applicable law in the event of a breach.
(6) A waiver of this section is contrary to public policy and is void and unenforceable.

Amended by Chapter 388, 2009 General Session


State Codes and Statutes

State Codes and Statutes

Statutes > Utah > Title-13 > Chapter-44 > 13-44-202

13-44-202. Personal information -- Disclosure of system security breach.
(1) (a) A person who owns or licenses computerized data that includes personalinformation concerning a Utah resident shall, when the person becomes aware of a breach ofsystem security, conduct in good faith a reasonable and prompt investigation to determine thelikelihood that personal information has been or will be misused for identity theft or fraudpurposes.
(b) If an investigation under Subsection (1)(a) reveals that the misuse of personalinformation for identity theft or fraud purposes has occurred, or is reasonably likely to occur, theperson shall provide notification to each affected Utah resident.
(2) A person required to provide notification under Subsection (1) shall provide thenotification in the most expedient time possible without unreasonable delay:
(a) considering legitimate investigative needs of law enforcement, as provided inSubsection (4)(a);
(b) after determining the scope of the breach of system security; and
(c) after restoring the reasonable integrity of the system.
(3) (a) A person who maintains computerized data that includes personal informationthat the person does not own or license shall notify and cooperate with the owner or licensee ofthe information of any breach of system security immediately following the person's discovery ofthe breach if misuse of the personal information occurs or is reasonably likely to occur.
(b) Cooperation under Subsection (3)(a) includes sharing information relevant to thebreach with the owner or licensee of the information.
(4) (a) Notwithstanding Subsection (2), a person may delay providing notification underSubsection (1) at the request of a law enforcement agency that determines that notification mayimpede a criminal investigation.
(b) A person who delays providing notification under Subsection (4)(a) shall providenotification in good faith without unreasonable delay in the most expedient time possible afterthe law enforcement agency informs the person that notification will no longer impede thecriminal investigation.
(5) (a) A notification required by this section may be provided:
(i) in writing by first-class mail to the most recent address the person has for the resident;
(ii) electronically, if the person's primary method of communication with the resident isby electronic means, or if provided in accordance with the consumer disclosure provisions of 15U.S.C. Section 7001;
(iii) by telephone, including through the use of automatic dialing technology notprohibited by other law; or
(iv) by publishing notice of the breach of system security:
(A) in a newspaper of general circulation; and
(B) as required in Section 45-1-101.
(b) If a person maintains the person's own notification procedures as part of aninformation security policy for the treatment of personal information the person is considered tobe in compliance with this chapter's notification requirements if the procedures are otherwiseconsistent with this chapter's timing requirements and the person notifies each affected Utahresident in accordance with the person's information security policy in the event of a breach.
(c) A person who is regulated by state or federal law and maintains procedures for abreach of system security under applicable law established by the primary state or federal

regulator is considered to be in compliance with this part if the person notifies each affected Utahresident in accordance with the other applicable law in the event of a breach.
(6) A waiver of this section is contrary to public policy and is void and unenforceable.

Amended by Chapter 388, 2009 General Session