Data Breach Notification Requirements by State
State-level data breach notification law governs when, how, and to whom affected individuals and regulators must be informed after unauthorized access to personal information. All 50 US states, the District of Columbia, Puerto Rico, and the US Virgin Islands have enacted some form of breach notification statute, creating a patchwork of compliance obligations that vary by jurisdiction, data type, and organizational classification. Understanding the structural differences across these regimes is essential for privacy professionals, legal counsel, and compliance officers operating in multi-state environments.
- Definition and Scope
- Core Mechanics or Structure
- Causal Relationships or Drivers
- Classification Boundaries
- Tradeoffs and Tensions
- Common Misconceptions
- Checklist or Steps
- Reference Table or Matrix
Definition and Scope
A data breach notification requirement is a statutory obligation compelling entities that experience unauthorized acquisition of personal information to notify the affected individuals, and in specified circumstances, state attorneys general or other designated regulatory bodies. The threshold triggering notification — what constitutes "personal information," what constitutes "unauthorized acquisition," and what constitutes "harm risk" — differs materially across state statutes.
California's original statute, enacted in 2002 under California Civil Code §1798.82, established the foundational model: notification to California residents whose unencrypted personal information was, or was reasonably believed to have been, acquired by an unauthorized person. That statute has been amended repeatedly, with the California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA) layering additional private right of action provisions on top of the notification framework.
The definition of "personal information" varies by state. At minimum, most statutes cover Social Security numbers, financial account credentials, and government-issued identification numbers. At least 25 states have expanded definitions to include medical information, biometric data, or login credentials as of amendments passed through 2023 (NCSL State Data Breach Notification Laws tracker). New York's SHIELD Act (NY General Business Law §899-aa and §899-bb) extended covered data to include email addresses combined with passwords, biometric data, and HIPAA-covered health information.
Core Mechanics or Structure
Breach notification statutes generally operate through a four-stage structural sequence: detection, assessment, notification, and regulatory reporting.
Detection and Assessment: After an incident is identified, entities must determine whether the accessed data qualifies as "personal information" under the applicable state's definition, and whether the acquisition presents a risk of harm to affected individuals. States including Florida (Florida Statute §501.171) and Texas (Texas Business & Commerce Code §521.053) impose a formal risk-of-harm assessment requirement that can defer or eliminate notification obligations when the data was encrypted or the breach is determined to pose no material harm risk.
Notification Timing: Timing requirements are the most variable element across state laws. California requires notification in "the most expedient time possible." Florida mandates notification within 30 calendar days of determining a breach occurred (Florida Statute §501.171). New York requires notification in "the most expedient time possible and without unreasonable delay." Ohio allows 45 days. Colorado, under CRS §6-1-716, requires notification within 30 days. States with the strictest clocks — Florida and Colorado both at 30 days — leave limited margin for legal review before notices must be dispatched.
Notification Content: Statutes specify minimum content elements. Common required items include a description of the incident, the categories of data involved, contact information for the notifying entity, and guidance on protective steps available to affected individuals. California, New York, and Illinois specify formatting standards for written notices.
Regulatory Reporting: Approximately 30 states require notification to the state attorney general when a breach exceeds a threshold number of affected residents — commonly 500 or 1,000. New York requires simultaneous notification to the AG, the Department of Financial Services (for covered entities), and the Division of State Police when more than 500 New York residents are affected.
Causal Relationships or Drivers
The fragmentation of state breach notification law is a direct product of congressional inaction on a federal framework. The Federal Trade Commission (FTC) holds general enforcement authority over deceptive trade practices under 15 U.S.C. §45 and has issued breach-related guidance, but no omnibus federal breach notification statute covering private entities existed as of 2024. The Health Insurance Portability and Accountability Act (HIPAA) Breach Notification Rule (45 CFR §§164.400–414), administered by the HHS Office for Civil Rights, covers only covered entities and their business associates — not the broader commercial sector.
In the absence of a federal floor, states have iterated independently, often responding to high-profile incidents. California's 2002 statute followed the ChoicePoint data exposure. New York's SHIELD Act followed the 2019 Capital One breach affecting over 100 million North American cardholders. Illinois' Personal Information Protection Act amendments followed breaches targeting state residents in the financial and healthcare sectors.
The privacy providers that serve this regulatory landscape reflect the professional specialization that multi-state compliance demands, with distinct service categories emerging for incident response, legal notification management, and regulatory liaison functions.
Classification Boundaries
State breach notification statutes fall into four classification categories based on enforcement mechanism and covered entity scope:
Class 1 — AG-Only Enforcement, Broad Entity Scope: The majority of state statutes (including Florida, Texas, and Michigan) vest enforcement exclusively in the state attorney general. No private right of action exists. Any business handling personal information of state residents is covered regardless of the entity's state of incorporation.
Class 2 — AG Enforcement Plus Private Right of Action: California (Civil Code §1798.150 under CCPA), Illinois (under specific BIPA provisions for biometric data), and Washington (limited) allow consumers to sue directly for statutory damages. California's private right of action is capped at $100–$750 per consumer per incident or actual damages, whichever is greater (California Civil Code §1798.150).
Class 3 — Sector-Specific Overlay Statutes: States including New York (DFS Part 500 for financial services) and California (CMIA for medical information) impose notification obligations through sectoral regulators operating in parallel with general breach notification law. These frameworks carry independent penalty structures.
Class 4 — Exemption-Heavy Regimes: States such as Alabama (enacted 2018 under Alabama Code §8-38-1) and South Dakota (enacted 2018) are the most recent additions to the state law landscape and include broader good-faith exemptions and risk-of-harm filters that reduce mandatory notification obligations in ambiguous cases.
HIPAA-covered entities must comply with both the federal Breach Notification Rule and applicable state law, defaulting to whichever imposes the stricter standard (HHS Breach Notification Rule overview).
Tradeoffs and Tensions
The primary structural tension in state breach notification law is between notification speed and notification accuracy. Shorter statutory windows — Florida and Colorado at 30 days — create pressure to issue notices before the full scope of an incident is determined. Premature notices can cause unnecessary consumer alarm and contradict subsequent forensic findings, yet delayed notices increase regulatory and litigation exposure.
A second tension exists between the "reasonable risk of harm" exemption and the fundamental purpose of notification statutes. When companies self-assess that no harm risk exists — often based on encryption attestations that may be incomplete — they eliminate the notification obligation entirely without any independent oversight at the moment of decision. Regulators in New York and California have challenged such determinations post-incident.
A third tension arises from the overlap between HIPAA and state law in healthcare-adjacent sectors. Health app developers, wellness platforms, and employer health programs may not qualify as HIPAA covered entities yet still handle health-adjacent data subject to state notification statutes. The gap between HIPAA's scope and state statute scope is a documented source of compliance uncertainty, referenced in FTC guidance published under its Health Breach Notification Rule (16 CFR Part 318).
The privacy provider network purpose and scope of platforms serving this sector illustrates how the service landscape has structured itself around precisely these jurisdictional friction points.
Common Misconceptions
Misconception 1: Federal HIPAA compliance satisfies all state notification obligations.
HIPAA establishes a floor, not a ceiling. States may impose stricter or faster notification requirements for covered entities, and HIPAA does not preempt more protective state law (45 CFR §160.203(b)).
Misconception 2: Encryption universally eliminates notification obligations.
Approximately 40 states include encryption safe harbors, but the safe harbor typically applies only to data encrypted at rest with a key that was not also compromised. If the encryption key was accessed during the breach, the safe harbor does not apply. California's statute specifies this condition explicitly.
Misconception 3: Notification is only required for digital data breaches.
At least 30 state statutes cover paper records containing personal information alongside electronic records. Oregon (ORS §646A.602) and Massachusetts (201 CMR 17.00) explicitly cover both formats.
Misconception 4: The state of the company's headquarters determines which notification law applies.
Notification obligations are triggered by the residency of affected individuals, not the location of the entity. A company incorporated in Delaware holding data on Texas residents must comply with Texas notification law for those residents.
Checklist or Steps
The following sequence reflects the structural steps embedded in the majority of state breach notification statutes. This is a descriptive account of the statutory framework, not legal advice.
- Incident identification: Confirm that unauthorized access, acquisition, or disclosure of personal data occurred or is reasonably believed to have occurred.
- Jurisdictional mapping: Identify the states of residence of all potentially affected individuals to determine which state statutes apply.
- Data classification review: Assess whether the accessed data meets the definition of "personal information" under each applicable state statute.
- Risk-of-harm assessment: Apply the risk-of-harm or encryption exemption analysis for each jurisdiction that permits such a filter.
- Notification window tracking: Calendar the strictest applicable notification deadline from the date breach determination is made (e.g., 30 days for Florida and Colorado, 45 days for Ohio).
- Notice content drafting: Prepare notice content meeting the most stringent content requirements across all applicable state statutes simultaneously.
- Delivery method compliance: Confirm that delivery format (written, electronic, substitute notice) complies with each jurisdiction's requirements based on affected population size and entity resources.
- Regulatory notification: File simultaneous or tiered notifications with applicable state attorneys general, sector regulators (DFS, OCR), and the FTC if subject to the Health Breach Notification Rule.
- Documentation retention: Retain records of the breach determination, notification decisions, and delivery confirmations in accordance with applicable retention schedules.
The how to use this privacy resource section provides context on how the service provider network is organized to support navigation of these compliance functions.
Reference Table or Matrix
| State | Notification Deadline | Risk-of-Harm Filter | Encryption Safe Harbor | AG Notification Threshold | Private Right of Action |
|---|---|---|---|---|---|
| California | Expedient / unreasonable delay | No | Yes (key not compromised) | 500+ residents | Yes (CCPA §1798.150) |
| New York | Expedient / unreasonable delay | No | Yes | 500+ residents | Limited |
| Florida | 30 days | Yes | Yes | 500+ residents or AG if unknown | No |
| Texas | Expedient / unreasonable delay | Yes | Yes | AG notification required | No |
| Colorado | 30 days | Yes | Yes | 500+ residents | No |
| Illinois | Expedient / unreasonable delay | No | Yes | No threshold specified | Yes (BIPA for biometric data) |
| Ohio | 45 days | Yes | Yes (Safe Harbor Act affirmative defense) | 1,000+ residents | No |
| Massachusetts | Expedient / unreasonable delay | No | Yes | AG and OCABR notification | No |
| Washington | Expedient / unreasonable delay | Yes | Yes | 500+ residents | No |
| Alabama | 45 days | Yes (significant risk standard) | Yes | AG if 1,000+ residents | No |
Sources: NCSL Security Breach Notification Laws; individual state statutes as cited above.