Educause Security Discussion mailing list archives

Re: Data Security laws by state


From: Valerie Vogel <vvogel () EDUCAUSE EDU>
Date: Tue, 14 Jul 2015 17:21:30 +0000

The National Conference of State Legislatures (NCSL) also has a list of state security breach notification laws:
http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx

Valerie Vogel Program Manager

EDUCAUSE
Uncommon Thinking for the Common Good
direct: 202.331.5374 | main: 202.872.4200 | twitter: @HEISCouncil | educause.edu<http://www.educause.edu/>

From: EDUCAUSE Listserv <SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU>> on behalf of 
David Curry <david.curry () NEWSCHOOL EDU<mailto:david.curry () NEWSCHOOL EDU>>
Reply-To: EDUCAUSE Listserv <SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU>>
Date: Tuesday, July 14, 2015 at 10:19 AM
To: EDUCAUSE Listserv <SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU>>
Subject: Re: [SECURITY] Data Security laws by state

Perkins Coie has a survey of state data breach laws that's available in both online and downloadable formats:

https://www.perkinscoie.com/en/news-insights/security-breach-notification-chart.html

BakerHostetler has a survey of state data breach laws, and also a compendium of international data protection laws:

http://www.bakerlaw.com/PrivacyDataProtection

(look toward the bottom of the "resources" box).

--Dave






--

DAVID A. CURRY, CISSP
DIRECTOR OF INFORMATION SECURITY
INFORMATION TECHNOLOGY

71 FIFTH AVE., 9TH FL., NEW YORK, NY 10003
+1 212 229-5300 x4728 • david.curry () newschool edu<mailto:david.curry () newschool edu>

[The New School]

On Tue, Jul 14, 2015 at 1:05 PM, Wayne S. Martin <MartinW () brcc edu<mailto:MartinW () brcc edu>> wrote:
Greetings,

Is anyone aware of a dedicated effort to identify and analyze data security and breach laws across the states. Ideally, 
this effort would yield insights into commonalities and differences, areas of concern by region, and maybe inform 
evolving best practices. I have attempted an informal review and analysis and quickly came to the conclusion that an 
organized focused activity would be a better approach. I am hoping I do not need to reinvent the wheel.

Wayne S. Martin
Information Security Officer
Blue Ridge Community College



Current thread: