Feeds

California aims to close loophole in state ID theft law

Bring us another bucket of cement

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Californian legislators have backed a bill that tightens up the state's existing laws about the disclosure of security breaches involving consumer data. The California Assembly's judiciary committee voted 6-3 on Tuesday for a bill that would mean firms have to tell consumers if paper records or a back-up tape containing personal information are compromised or lost. Information security breaches are covered by state laws on ID theft that came into effect in January 2003, so the new bill is essentially designed to close a loophole in existing laws.

"Right now, companies have to tell you when a thief hacks into their computer system and gets access to your personal account information or Social Security number, but they don't have to say word one when paper records or a back-up tape containing the exact same personal information are lost, stolen or inadvertently handed to a perfect stranger," Democratic state Sen. Debra Bowen told Reuters.

The bill has already been approved in the Californian state Senate and now passes on to the Assembly Business and Professions Committee. California has the toughest security breach disclosure laws in the US. Personal information privacy laws have became a hot topic in the US in the wake of breaches involving a string of US institutions including data mining firm ChoicePoint and affiliates of MasterCard International. ®

Related stories

MasterCard fingers partner in 40m card security breach
Unauthorised research opened door to MasterCard breach
ID theft is inescapable
Big company, crap security
US bank staff 'sold customer details'
Backup tapes are backdoor for ID thieves
Online fraud, ID theft soars
California disclosure law has national reach

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?