Civ. Code § 1798.91.3(a)-(c)(1)-(2)-(3)-(5)-(6)-(9)-(10)-(11)
Plain Language
Covered deployers must develop, implement, and maintain a comprehensive written information security program with administrative, technical, and physical safeguards scaled to the deployer's size, resources, data volume, and sensitivity. The program must designate at least one responsible employee, identify and assess reasonably foreseeable internal and external security risks, require ongoing employee and contractor training, mandate compliance with program policies, include disciplinary measures for violations, prevent terminated employees from accessing personal information, incorporate regular monitoring for unauthorized access, and document incident response actions with post-incident reviews. The program must be reviewed at least annually and whenever there is a material change in business practices affecting data security. Safeguards must be consistent with existing applicable state and federal data protection requirements.
Statutory Text
(a) A covered deployer conducting business in this state shall have a duty to protect personal information held by the covered deployer as provided by this section.
(b) A covered deployer whose high-risk artificial intelligence systems process personal information shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate for all of the following:
(1) The covered deployer's size, scope, and type of business.
(2) The amount of resources available to the covered deployer.
(3) The amount of data stored by the covered deployer.
(4) The need for security and confidentiality of personal information stored by the covered deployer.
(c) The comprehensive information security program required by subdivision (a) shall meet all of the following requirements:
(1) The program shall incorporate safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under state or federal laws and regulations applicable to the covered deployer.
(2) The program shall include the designation of one or more employees of the covered deployer to maintain the program.
(3) The program shall require the identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of any electronic, paper, or other record containing personal information, and the establishment of a process for evaluating and improving, as necessary, the effectiveness of the current safeguards for limiting those risks, including by all of the following:
(A) Requiring ongoing employee and contractor education and training, including education and training for temporary employees and contractors of the covered deployer, on the proper use of security procedures and protocols and the importance of personal information security.
(B) Mandating employee compliance with policies and procedures established under the program.
(C) Providing a means for detecting and preventing security system failures.
(5) The program shall provide disciplinary measures for violations of a policy or procedure established under the program.
(6) The program shall include measures for preventing a terminated employee from accessing records containing personal information.
(9) The program shall include regular monitoring to ensure that the program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personal information and, as necessary, upgrading information safeguards to limit the risk of unauthorized access to or unauthorized use of personal information.
(10) The program shall require the regular review of the scope of the program's security measures that must occur subject to both of the following timeframes:
(A) At least annually.
(B) Whenever there is a material change in the covered deployer's business practices that may reasonably affect the security or integrity of records containing personal information.
(11) The program shall require the documentation of responsive actions taken in connection with any incident involving a breach of security, including a mandatory postincident review of each event and the actions taken, if any, in response to that event to make changes in business practices relating to protection of personal information.