|
|
A BILL TO BE ENTITLED
|
|
AN ACT
|
|
relating to a business's duty to protect and safeguard sensitive |
|
personal information contained in its customer records. |
|
BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: |
|
SECTION 1. Section 48.102, Business & Commerce Code, is |
|
amended by amending Subsections (a) and (c) and adding Subsections |
|
(a-1), (a-2), (a-3), (a-4), and (a-5) to read as follows: |
|
(a) In this section, "breach of system security" has the |
|
meaning assigned by Section 48.103, including the exception |
|
provided by Section 48.103(a) for the good faith acquisition of |
|
sensitive personal information by an employee or agent of the |
|
person maintaining the information. |
|
(a-1) A business shall implement and maintain reasonable |
|
procedures, including taking any appropriate corrective action, to |
|
protect and safeguard from unlawful use or disclosure any sensitive |
|
personal information collected or maintained by the business in the |
|
regular course of business. |
|
(a-2) A business that collects sensitive personal |
|
information in the regular course of business shall encrypt, in |
|
conformity with current industry-standard encryption methods and |
|
capabilities, any sensitive personal information contained in |
|
customer records of the business that are maintained in a |
|
computerized database. |
|
(a-3) A person may bring an action against a business that |
|
maintains computerized data that includes sensitive personal |
|
information if, following any breach of system security of that |
|
data, the person's sensitive personal information was acquired by |
|
an unauthorized person or the person was otherwise injured by the |
|
breach. |
|
(a-4) A person who brings an action under Subsection (a-3) |
|
may obtain, subject to Subsection (a-5), actual damages arising |
|
from the violation. |
|
(a-5) The court may increase the amount of an award of |
|
actual damages in an action brought under this section to an amount |
|
not to exceed three times the actual damages sustained if the court |
|
finds that the business violated Subsection (a-2). |
|
(c) This section does not apply to a financial institution |
|
as defined by 15 U.S.C. Section 6809, except that a financial |
|
institution who is injured following a breach of system security of |
|
a business's computerized data may bring an action under Subsection |
|
(a-3). |
|
SECTION 2. This Act takes effect September 1, 2007. |