Data Breach Notification Requirements by State
State-level data breach notification laws establish the legal obligations that organizations face when unauthorized access to personal information occurs. All 50 US states, the District of Columbia, Puerto Rico, Guam, and the US Virgin Islands have enacted breach notification statutes, creating a patchwork regulatory environment that determines who must be notified, within what timeframe, and under what thresholds. Compliance requires mapping the residency of affected individuals against the specific statutory requirements of each applicable jurisdiction — a process that becomes operationally significant whenever a breach crosses state lines.
- Definition and Scope
- Core Mechanics or Structure
- Causal Relationships or Drivers
- Classification Boundaries
- Tradeoffs and Tensions
- Common Misconceptions
- Checklist or Steps
- Reference Table or Matrix
Definition and scope
A data breach notification requirement is a statutory obligation compelling entities that experience unauthorized acquisition of, or access to, personal information to notify affected residents and, in prescribed circumstances, state regulators and consumer reporting agencies. California enacted the first such law (California Civil Code §1798.29 and §1798.82) in 2002, and the model spread to every jurisdiction within approximately two decades.
The scope of "personal information" subject to these laws differs by jurisdiction. The most common core definition — an individual's name combined with at least one of Social Security number, driver's license number, account number plus security code, or medical information — appears in statutes across 40+ states, but newer laws in California, Colorado, and Virginia extend this to standalone biometric identifiers, precise geolocation data, and login credentials even without an accompanying name. The NCSL (National Conference of State Legislatures) maintains a comparative database of all active statutes.
"Covered entities" under these laws include businesses, government agencies, and — in states such as Florida and Illinois — any natural person maintaining personal data. Service providers and third-party processors are explicitly covered by statute in California (Cal. Civ. Code §1798.82) and New York (N.Y. Gen. Bus. Law §899-aa).
The intersection of state notification law with sector-specific federal requirements — including HIPAA's Breach Notification Rule (45 CFR §§164.400–414) and the GLBA Safeguards Rule — creates overlapping obligations that must be tracked simultaneously.
Core mechanics or structure
The operational architecture of a breach notification obligation contains five functional elements:
1. Trigger condition. A breach is "discovered" when the entity knows or reasonably should have known unauthorized access occurred. Most statutes do not require confirmed data exfiltration — access itself triggers the clock in states including Massachusetts (201 CMR 17.00) and New York.
2. Investigation window. Laws permit a reasonable period to investigate scope before notification. California imposes a 30-calendar-day outer limit from discovery for regulated entities under certain circumstances. Florida mandates notification within 30 days of breach determination (Fla. Stat. §501.171). Texas requires notification "as quickly as possible."
3. Risk threshold. The majority of states permit entities to forgo notification when a risk-of-harm analysis concludes that the breach is unlikely to result in harm to affected individuals. Six states — Florida, Ohio, Illinois, New Mexico, South Carolina, and Vermont — apply an explicit "material risk of harm" standard. Some states (including Wisconsin and Delaware) require notification regardless of harm assessment.
4. Notice content. Most statutes specify minimum content: description of the incident, categories of information involved, steps taken by the entity, protective measures available to affected individuals, and contact information. California requires notification in a specific standardized format for breaches affecting more than 500 California residents (Cal. Civ. Code §1798.82(d)).
5. Regulatory notification. Forty states require or permit notification to the Attorney General or a designated state agency when a breach exceeds a resident threshold — typically between 500 and 1,000 affected individuals. The FTC provides federal overlay guidance for non-HIPAA, non-financial sector entities.
Causal relationships or drivers
The proliferation of state breach notification laws reflects three structural forces. First, the absence of a federal preemptive statute has left the field open to state legislatures; proposals for a unified national standard have been introduced in Congress but not enacted as of the last completed legislative session. Second, the scale of breach incidents — the Identity Theft Resource Center's 2023 Annual Data Breach Report recorded 3,205 publicly reported data compromises in the United States — produced political pressure for stronger resident-facing protections at the state level. Third, the expansion of covered data categories in statutes like the CCPA/CPRA (Cal. Civ. Code §1798.150) established a template that states including Virginia (VCDPA), Colorado (CPA), and Connecticut (CTDPA) adapted for their own frameworks.
The growth of state privacy laws has also broadened the categories of data whose compromise triggers notification, particularly regarding health data held outside covered HIPAA entities — a gap addressed by Washington's My Health MY Data Act (2023) and Nevada's health data amendments.
Classification boundaries
State breach notification laws cluster into four structural categories based on their enforcement and scope architecture:
Category 1 – Name-plus-element statutes (40+ states). Traditional structure requiring a name combined with a financial, government identification, or medical data element. Wisconsin (Wis. Stat. §134.98), Minnesota (Minn. Stat. §325E.61), and Connecticut (Conn. Gen. Stat. §36a-701b) represent this model.
Category 2 – Expanded standalone-element statutes (8–10 states). California, Colorado, Illinois, and Washington now treat biometric data, login credentials, and health information as independently breach-triggering, regardless of whether a name is exposed. Illinois's Biometric Information Privacy Act (740 ILCS 14) is the most litigated standalone-element statute in this category — see biometric data privacy laws for sector-specific analysis.
Category 3 – Sector-regulated overlay states. States where HIPAA-covered entities and financial institutions follow both federal and state breach regimes simultaneously. New York's SHIELD Act (2019) and NYDFS Cybersecurity Regulation (23 NYCRR 500) create a layered obligation for financial services firms.
Category 4 – Comprehensive privacy law integration. Virginia, Colorado, and Connecticut link breach notification obligations to broader data rights frameworks, aligning notification with consumer data rights provisions and enforcement by state Attorneys General.
Tradeoffs and tensions
Multi-state breach notification presents genuine operational tension between compliance speed and notification accuracy. Florida's 30-day hard deadline conflicts with the investigation reality that forensic attribution of a breach's scope may require 45–60 days in complex network intrusion cases. Sending premature notifications to residents before scope is confirmed can cause unwarranted consumer alarm and may itself expose entities to regulatory criticism under states that require accurate notice content.
A second tension exists between harm-threshold exemptions and consumer protection objectives. The risk-of-harm safe harbor — which permits non-notification when harm is deemed unlikely — is criticized by privacy advocates as subject to self-serving interpretation by breached entities. The FTC has pursued enforcement actions against companies that used harm assessments to delay or suppress notifications it considered unjustified.
The regulatory notification threshold also creates inconsistency: an organization breaching data of 800 California residents must notify the California Attorney General, while the same breach affecting 800 Wyoming residents triggers no state agency notification under Wyoming's statute (Wyo. Stat. §40-12-501 through 40-12-509). This asymmetry means that organizations of identical size face structurally different regulatory scrutiny based solely on the geography of their customer base.
Privacy incident response programs must account for these jurisdiction-specific variations in their escalation protocols.
Common misconceptions
Misconception: Federal law provides a preemptive floor. No single federal statute preempts state breach notification requirements for all sectors. HIPAA preempts only inconsistent state requirements for covered entities and business associates in the healthcare context — and only when the state law provides less protection than HIPAA, not when it provides more (45 CFR §160.203).
Misconception: Encrypted data is never subject to notification. Encryption is a safe harbor in most states, but the harbor applies only to properly implemented encryption with the key not also compromised. Maryland, North Carolina, and Florida explicitly condition the encryption safe harbor on key integrity — a breach of both encrypted data and its decryption key may still trigger notification under those statutes.
Misconception: Notification must go only to residents of the company's home state. Notification obligations attach to the residency of affected individuals, not the domicile of the breached entity. A Delaware-incorporated company holding data on Texas and Illinois residents must comply with Texas Business & Commerce Code §521 and the Illinois Personal Information Protection Act (815 ILCS 530) for those resident populations.
Misconception: Small businesses are exempt. While California's CCPA contains a small business threshold (fewer than 100,000 consumers and less than $25 million in annual gross revenue), breach notification statutes in the majority of states impose no size threshold. A sole proprietorship maintaining employee or customer records in Massachusetts is subject to 201 CMR 17.00 in the same manner as a Fortune 500 company.
Checklist or steps
The following sequence reflects the structural phases of breach notification compliance as codified across major state statutes. This is a reference sequence, not legal advice.
- Confirm unauthorized access or acquisition — distinguish security incidents from confirmed breaches using forensic determination consistent with NIST SP 800-61 (Computer Security Incident Handling Guide).
- Identify the universe of affected records — extract the full population of compromised records and map each individual's state of residence.
- Classify the data elements involved — determine whether compromised fields meet statutory "personal information" definitions under each applicable state law, including standalone-element statutes.
- Apply the harm-threshold analysis (where permitted) — document the basis for any risk-of-harm determination using a contemporaneous written record, as required by Delaware (6 Del. C. §12B-101) and several other states.
- Calculate notification deadlines by state — map discovery date against each state's statutory clock; where hard deadlines conflict with investigation timelines, default to the most restrictive.
- Determine regulatory notification obligations — identify which state Attorneys General or agencies require notification and at what resident-count thresholds.
- Draft state-specific notice content — confirm each notice meets minimum content requirements, including California's standardized format requirement for 500+ resident incidents.
- Execute notification — deliver written notice via required channels (first-class mail, email with prior consent, or substitute notice for large populations under statutes that allow it).
- Notify credit reporting agencies (if applicable) — required when more than 1,000 residents are affected in a single event under laws including California and New York.
- Document and retain records — preserve the investigation record, notification content, delivery confirmation, and harm analysis for the statutory retention period applicable in each jurisdiction.
Reference table or matrix
| State | Notification Deadline | Harm Threshold | Regulatory Notice Threshold | Key Statute |
|---|---|---|---|---|
| California | 30 days (regulated entities) | No unconditional exemption | 500 residents → AG | Cal. Civ. Code §1798.82 |
| New York | "In the most expedient time possible" | Yes (immaterial risk) | 500 residents → AG, DFS (financial) | N.Y. Gen. Bus. Law §899-aa; SHIELD Act |
| Florida | 30 days from determination | Yes (material risk) | 500 residents → AG | Fla. Stat. §501.171 |
| Texas | "As quickly as possible" | Yes (likelihood of harm) | AG notification required | Tex. Bus. & Com. Code §521 |
| Illinois | "Expedient" / "without unreasonable delay" | Yes (reasonable likelihood) | None specified | 815 ILCS 530 |
| Massachusetts | "As expeditiously as possible" | Yes (likelihood of harm) | All breaches → AGO | Mass. Gen. Laws c. 93H |
| Colorado | 30 days (500+ residents) | Yes (significant risk) | 500 residents → AG | Colo. Rev. Stat. §6-1-716 |
| Washington | "Most expedient time possible" | Yes (likelihood of harm) | None specified | RCW 19.255.010 |
| Delaware | 60 days from discovery | Yes (risk of harm) | AG notice required | 6 Del. C. §12B-101 |
| Virginia | 60 days from discovery | Yes (likely to cause harm) | AG notification (500+ residents) | Va. Code §18.2-186.6 |
Statutes are subject to legislative amendment. Practitioners should verify current text through official state legislative portals or the NCSL Breach Notification Law Database.
The personal data classification standards that determine what fields qualify as "personal information" under these state statutes are explored in greater depth across this reference network, as are the federal privacy framework structures that operate alongside — rather than replacing — state notification obligations.
References
- National Conference of State Legislatures – Security Breach Notification Laws
- California Civil Code §1798.82 – Breach Notification (California Legislative Information)
- California Civil Code §1798.150 – CCPA Private Right of Action
- New York General Business Law §899-aa – SHIELD Act (NY Senate)
- Florida Statutes §501.171 – Data Security (FL Legislature)
- 45 CFR §160.203 – HIPAA Preemption of State Law (eCFR)
- HHS – HIPAA Breach Notification Rule (45 CFR §§164.400–414)
- FTC – Data Breach Response Guidance
- NIST SP 800-61 Rev. 2 – Computer Security Incident Handling Guide (CSRC)
- NYDFS Cybersecurity Regulation – 23 NYCRR 500 (NY DFS)
- Identity Theft Resource Center – 2023 Annual Data Breach Report (ITRC)
- [Illinois Biometric Information Privacy Act