H.R.580 - Data Accountability and Trust Act114th Congress (2015-2016)
|Sponsor:||Rep. Rush, Bobby L. [D-IL-1] (Introduced 01/28/2015)|
|Committees:||House - Energy and Commerce|
|Latest Action:||House - 01/30/2015 Referred to the Subcommittee on Commerce, Manufacturing, and Trade. (All Actions)|
This bill has the status Introduced
Here are the steps for Status of Legislation:
Summary: H.R.580 — 114th Congress (2015-2016)All Information (Except Text)
Introduced in House (01/28/2015)
Data Accountability and Trust Act
Requires the Federal Trade Commission (FTC) to promulgate regulations requiring each person engaged in interstate commerce that owns or possesses data containing personal information to establish specified security policies and procedures to treat and protect such information.
Requires the regulations to include methods for disposing of both electronic and nonelectronic data.
Requires information brokers to submit their security policies to the FTC in conjunction with a notification of a security breach notification or upon the FTC's request. Authorizes the FTC to conduct information security practices audits of brokers who have had a security breach or require such brokers to conduct independent audits.
Requires information brokers to: (1) establish procedures to verify the accuracy of information that identifies individuals, (2) provide to individuals whose personal information it maintains a means to review it, (3) place a conspicuous notice on the Internet instructing individuals how to request access to such information, and (4) correct inaccurate information.
Directs the FTC to require information brokers to establish measures which facilitate the auditing or retracing of access to, or transmissions of, any data containing personal information.
Makes it unlawful for information brokers to obtain or disclose personal information by false pretenses (pretexting).
Requires such person to notify the FTC and affected individuals of information security breaches. Sets forth requirements concerning such notification, including method of notification requirements and timeliness requirements. Allows an exemption from notification requirements if such person determines that there is no reasonable risk of identity theft, fraud, or other unlawful conduct.
Preempts state information security laws.