Pennsylvania's Data Breach Notification Law & Requirements

Last spring New Mexico passed a state-level data breach notification law, making South Dakota and Alabama the last two states without comparable statutes. States differ in the kind of data that necessitates notification, as well as the timing, form, and remaining conditions of said notification. For businesses with customers in multiple states, this means they must track and comply with numerous sets of requirements. When it comes to data breach notification, Pennsylvania remains somewhat moderate. Learn why, below.

Here Are the Basics of the Pennsylvania Data Breach Notification Law:

Defining Breach of System

As per Business Privacy Law, a "Breach of System" is defined as:

"The unauthorized access and acquisition of computerized data that materially compromises the security or confidentiality of personal information maintained by the entity as part of a database of personal information regarding multiple individuals and that causes or the entity reasonably believes, has caused or will cause loss or injury to any resident of this Commonwealth. Good faith acquisition of personal information by an employee or agent of the entity for the purposes of the entity is not a breach of the security of the system if the personal information is not used for a purpose other than the lawful purpose of the entity and is not subject to further unauthorized disclosure." 

Pennsylvania is one of 24 states that require customer notification, “without unreasonable delay,” when a data breach affects more than 1,000 residents. States are increasingly moving toward specific time limits for notification, the most common being 45 days after confirmation of breach. It is important to note that these rules also apply to companies that maintain or control personal information, such as database vendors.

Defining Personal Information

Pennsylvania defines “personal information” as a person’s name, combined with a social security, driver’s license, state ID, credit card, or financial account number. Several states have expanded the definition of personal information to include medical or health insurance information, biometric data such as fingerprint or iris scans, and DNA profiles. It should be noted that publicly available "made available to the general public from Federal, State, or local government records" is excluded. Pennsylvania only requires notification when the breach “materially compromises” security or confidentiality. Data that has been encrypted, and is not accessible, is excluded. As a general rule:

"An entity that maintains, stores or manages computerized data that includes personal information shall provide notice of any breach of the security of the system following the discovery of the breach of the security of the system to any resident of this Commonwealth whose unencrypted and unredacted personal information was or is reasonably believed to have been accessed and acquired by an unauthorized person."

[BLOG] 5 Questions to Ask Before Buying a Cyber Insurance Policy Webp

Notifying the State

Many states require notice to the Attorney General (AG), or to a state agency, such as a consumer protection organization. Pennsylvania does not have this requirement. Instead, any breach must be relayed to all nationwide credit reporting agencies (CRAs). Like most states, Pennsylvania permits written, telephonic, or email notice to affected consumers. If the breach is unusually large (over 100,000 consumers) or expensive, substitute notice is permitted, which can take the form of a media or online post. And for companies who do business or have employees outside the state, they are required to report in those states as well.

Civil and Criminal Consequences

In the event of a notification violation, action can be initiated by the Attorney General under state “deceptive trade practices” statutes. It is generally held that companies promise to keep data confidential, and any breach is a release from that promise. Pennsylvania does allow for restrictive, potentially expensive, injunctions against businesses. Pennsylvania also gives the AG explicit right to seek restitution. Pennsylvania, like many states, provides an encryption safe harbor: if the acquired data was encrypted or redacted, notification is not required. This does not apply if the encryption key was compromised, or if those with access to said key were involved in the breach.

Operating in Pennsylvania

Any business operating in Pennsylvania should remain attentive to relevant legislature, as data breach regulations are constantly being amended and modified. For the latest information on data breaches, provides a running list by type, organization affected and geographic location. Remember, there are many ways to mitigate the risk factors associated with data breaches:

  1. Implement automatic system patches for all applications and core operating systems.

  2. Keep your anti-virus software up to date. 

  3. Use cloud-based services that offer advanced protection including data encryption and automatic web-traffic validation.

  4. Encrypt all devices and information, to protect both sensitive user and client data.

  5. Leverage "https". Hypertext Transfer Protocol (HTTP) Secure allows for secure communication over a computer network by providing bidirectional encryption. This protects against eavesdropping or tampering with information by a malicious third party.  

For more information on Pennsylvania's data breach notification law or for assistance with operational compliance, or proactive security strategies, contact iCorps for more information. As more businesses move to the cloud, it's important to ask your cloud provider the tough questions when it comes to data security. Learn more with a free IT consultation.

Request a Free IT Consultation