ARTICLE
13 April 2021

Utah Creates Data Breach Safe Harbor

SM
Sheppard Mullin Richter & Hampton

Contributor

Sheppard Mullin is a full service Global 100 firm with over 1,000 attorneys in 16 offices located in the United States, Europe and Asia. Since 1927, companies have turned to Sheppard Mullin to handle corporate and technology matters, high stakes litigation and complex financial transactions. In the US, the firm’s clients include more than half of the Fortune 100.
Utah recently amended its breach notice law to provide certain defenses to companies who suffer a data breach.
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.

Utah recently amended its breach notice law to provide certain defenses to companies who suffer a data breach. It is now the second state, after Ohio, to include such provisions. Specifically, entities that create and reasonably comply with a written cybersecurity program may have an affirmative defense to litigation resulting after a data breach. For the safe harbor to apply, the written cybersecurity program must:

  • be designed to protect against the security, confidentiality and integrity of personal information and anticipated threats and hazards;
  • reasonably conform to a recognized cybersecurity framework like NIST 800-171 or 800-53, ISO 27000, PCI DSS, and federal laws such as HIPAA and GLBA (among others); and
  • be appropriate to the "scale and scope" of the company, the information it collects, the activities in which it engages, and its resources and tools available.

Even if a written cybersecurity program is in place, there are certain exceptions. For example, if the entity had actual notice of a threat to the security of the personal information. Or, if it did not act in a reasonable amount of time to take known remedial efforts to protect the personal information.

Putting it into Practice. The Utah and Ohio laws provide incentives for companies to protect information in light of the safe harbor from certain litigation claims after a data breach. As a reminder, beyond these laws, many states require a written cybersecurity program as part of their data security laws.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

We operate a free-to-view policy, asking only that you register in order to read all of our content. Please login or register to view the rest of this article.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More