Create Protocols

Push Protocol
PROTOCOLS
Create
Create
Create
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
includes
or
,
,
,
,
or
,
as well as any one or more of the following data elements:
and
.
shall be
Notified
of
when
is acquired by an unauthorized
person.
shall be
of
when
or
is acquired
by an unauthorized person.
References

Any agency that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person.

Any agency that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of California whose encrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the encryption key or security credential was, or is reasonably believed to have been, acquired by an unauthorized person and the agency that owns or licenses the encrypted information has a reasonable belief that the encryption key or security credential could render that personal information readable or usable.

The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision (c).

The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.

Any
that owns or licenses computerized data that includes
must disclose any
of the security of the system
or
in the security of the data to any
whose
was, or is
to have been acquired by an unauthorized person.
Any
that owns or licenses computerized data that includes
must disclose any
of the security of the system
or
in the security of the data to any
whose
was, or is
to have been acquired by an unauthorized person and the
or
was, or is reasonably
believed to have been, acquired by an unauthorized person and the agency that owns or licenses the
has a reasonable belief that the encryption key or security credential could render that personal
information readable or usable.
Ontology
Personal Information
First Name
First initial
Last Name
Username
Email
age
date of birth
social security number
government issued id number
financial account information
medical information
health insurance information
biometric data
Resident of California
Location
Resident of Massachusetts
Geographic Coordinates
Link to existing concept?
Notified
Breach
Encryption Key
Security Credential
Wrap text in ` ` to create required tag.
Wrap text in `` `` to create optional tag.
Group keywords together with or.