US Data Breach Notification Requirements by State and Sector
All 50 US states, the District of Columbia, Puerto Rico, and the US Virgin Islands have enacted data breach notification laws, creating a patchwork of disclosure obligations that vary by trigger threshold, covered data type, notification timeline, and regulatory recipient. Federal sector-specific frameworks — including HIPAA, the Gramm-Leach-Bliley Act, and the FTC's Safeguards Rule — impose additional layers that operate independently of, and sometimes concurrently with, state law. This page maps the structural landscape of those obligations: their jurisdictional scope, sector-specific overlays, classification boundaries, and operational components relevant to compliance professionals and researchers.
- Definition and scope
- Core mechanics or structure
- Causal relationships or drivers
- Classification boundaries
- Tradeoffs and tensions
- Common misconceptions
- Checklist or steps (non-advisory)
- Reference table or matrix
- References
Definition and scope
A data breach notification requirement is a statutory or regulatory obligation compelling an entity that has experienced unauthorized access to or acquisition of personal information to notify affected individuals, government regulators, or both within a defined time window. The National Conference of State Legislatures (NCSL) confirms that all 50 states plus DC, Puerto Rico, Guam, and the US Virgin Islands maintain distinct breach notification statutes — meaning no single federal preemption standard applies across the board.
Scope varies significantly across jurisdictions. California's California Consumer Privacy Act (CCPA) and its amendment under the California Privacy Rights Act (CPRA) govern breach exposure for consumers whose nonencrypted or nonredacted personal information is accessed without authorization. New York's SHIELD Act (NY General Business Law §899-aa) expanded the definition of private information beyond Social Security numbers to include biometric data, account credentials, and combinations of data elements. Texas, Florida, and at least 18 other states impose specific notification deadlines ranging from 30 to 90 days following discovery or determination of a breach.
At the federal level, sector-specific regulators govern defined industries. The Department of Health and Human Services Office for Civil Rights (HHS OCR) administers the HIPAA Breach Notification Rule (45 CFR §§164.400–414), which applies to covered entities and business associates handling protected health information. The Federal Trade Commission (FTC) enforces the amended Safeguards Rule under the Gramm-Leach-Bliley Act for non-bank financial institutions. The Securities and Exchange Commission (SEC) adopted cybersecurity incident disclosure rules in 2023 requiring material cybersecurity incidents to be reported on Form 8-K within four business days of determining materiality.
This reference scope intersects directly with cybersecurity compliance requirements and the broader regulatory landscape described under US cybersecurity regulations.
Core mechanics or structure
Breach notification frameworks share a common structural skeleton consisting of four elements: trigger definition, covered entity designation, notification recipient specification, and timeline mandate.
Trigger definition determines what event activates the obligation. Most statutes require unauthorized access and acquisition — meaning access alone, without confirmed data exfiltration, may not trigger notification under older laws. California and a smaller subset of states have moved to an acquisition-or-access standard. The HIPAA Breach Notification Rule (45 CFR §164.402) operates on a presumption-of-breach model: any impermissible use or disclosure of PHI is presumed a breach unless the covered entity demonstrates a low probability of compromise through a four-factor risk assessment.
Covered entity designation defines who bears the obligation. State statutes typically apply to any person or business that maintains personal information about state residents, regardless of where the business is incorporated or physically located. Federal frameworks apply by industry category: HIPAA to covered entities and their business associates, GLBA/Safeguards Rule to financial institutions, and SEC disclosure rules to publicly traded companies.
Notification recipients fall into three categories: (1) affected individuals, (2) state attorneys general or designated regulatory agencies, and (3) consumer reporting agencies (required under federal law when breach affects more than 500 residents in certain states, or universally under HIPAA when affecting more than 500 individuals in a state). HHS OCR maintains a publicly accessible breach portal — the so-called "Wall of Shame" — logging HIPAA breaches affecting 500 or more individuals (HHS Breach Portal).
Timeline mandates range from 30 days (Florida — Fla. Stat. §501.171) to 90 days (many older state statutes) to "most expedient time possible" without a hard deadline (a minority of states). The SEC's four-business-day rule for material incident disclosure represents the most compressed federal timeline currently in effect.
Causal relationships or drivers
The proliferation of distinct state notification laws traces directly to the absence of a federal omnibus breach notification statute. Congressional attempts to pass a unified national standard — including multiple versions of the Data Security and Breach Notification Act — have not resulted in enacted law as of the most recent congressional sessions. That legislative gap left states as the primary rulemakers beginning with California's SB 1386, enacted in 2003 and effective in 2003, which was the first US state breach notification law.
Sector-specific federal frameworks emerged from pre-existing regulatory structures rather than breach-specific legislative action. HIPAA's breach notification component was added by the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 (Pub. L. 111-5), which directed HHS OCR to promulgate notification rules. The FTC's expanded Safeguards Rule (16 CFR Part 314), effective for most provisions in June 2023, added an explicit requirement for non-bank financial institutions to report certain breaches to the FTC within 30 days.
Rising breach frequency — IBM's Cost of a Data Breach Report (IBM 2023) documented an average breach cost of $4.45 million in 2023 — has accelerated regulatory tightening, particularly in states with large consumer populations. California's CPRA enforcement, which began in March 2024, introduced the California Privacy Protection Agency as a dedicated enforcement body, creating a model that several other states have examined for adoption.
Incident response programs within organizations must account for this regulatory pressure at both the planning and execution stages.
Classification boundaries
Breach notification obligations can be classified along three independent axes:
Axis 1: Jurisdiction type
- State law obligations — Apply based on residency of affected individuals, not business location. All 50 states plus DC and US territories.
- Federal sector-specific obligations — Apply based on industry classification: health (HIPAA), financial services (GLBA/Safeguards, FCRA), publicly traded companies (SEC), federal contractors (FISMA breach protocols under NIST SP 800-61).
- Federal agency-specific obligations — Agencies operating under OMB Memorandum M-17-12 must report breaches to US-CERT within one hour of identification for major incidents.
Axis 2: Data type covered
- Personally Identifiable Information (PII) — Standard category across most state statutes; typically includes Social Security numbers, financial account numbers, driver's license numbers.
- Protected Health Information (PHI) — HIPAA-specific category; includes 18 identifiers defined at 45 CFR §164.514(b).
- Biometric data — Illinois BIPA (740 ILCS 14) governs biometric identifiers separately from breach notification law; Texas and Washington have their own biometric statutes.
- Credentials and account data — NY SHIELD Act and a growing number of state laws explicitly include username/password combinations as private information.
Axis 3: Breach type
- Electronic records breaches — Covered universally.
- Paper/physical record breaches — Covered under HIPAA and most state statutes enacted or amended after 2010.
- Third-party/vendor-caused breaches — Covered entity remains responsible under HIPAA business associate rules; state law obligations follow the same residency-based logic regardless of where the breach originated.
Understanding these axes is essential for cyber risk management functions that must map obligations across multi-state and multi-sector operating environments.
Tradeoffs and tensions
State law vs. federal preemption: HIPAA explicitly preempts state breach notification laws only when the state law is less protective than HIPAA — meaning states may impose stricter requirements that apply concurrently (45 CFR §160.203). A healthcare organization breaching PHI for California residents must satisfy both HIPAA's 60-day individual notification deadline and California's 30-day deadline under the CCPA — the stricter timeline governs.
Safe harbor vs. disclosure breadth: At least 27 states provide a safe harbor from notification obligations when breached data was encrypted to a specified standard, according to the NCSL data security overview. The tension arises because encryption standards are not uniformly defined across those statutes: some reference NIST standards explicitly, others use ambiguous "industry standard" language. Organizations that rely on encryption safe harbors must verify the specific statutory language in each affected state.
Risk-of-harm threshold: Alabama's breach notification law (Ala. Code §8-38-1 et seq.) conditions notification on a "reasonable belief" that the breach has or is reasonably likely to cause substantial harm — one of the few states with an explicit harm threshold. The Federal Trade Commission has argued that harm thresholds create perverse incentives to underestimate risk. This tension between harm-based triggers and strict liability approaches remains unresolved at the federal policy level.
Notification speed vs. accuracy: Compressed timelines (30 days, or the SEC's four business days) create pressure to notify before forensic investigation is complete, potentially resulting in over-notification or inaccurate disclosures. The HIPAA framework partially addresses this by allowing up to 60 days but requiring notification "without unreasonable delay."
Common misconceptions
Misconception 1: "Encryption always eliminates the notification obligation."
Encryption safe harbors exist in approximately 27 states, but they are conditional. The data must be encrypted at rest and in transit, the encryption keys must not have been compromised in the same incident, and the encryption must meet standards the specific statute references. If the key was also exposed, the safe harbor does not apply even if the data itself was encrypted.
Misconception 2: "A breach affecting only 10 individuals does not require regulatory reporting."
HIPAA requires notification to HHS OCR for all breaches affecting fewer than 500 individuals, logged annually within 60 days of the end of the calendar year (45 CFR §164.408(b)). Regulatory reporting thresholds vary by state and sector — there is no universal "small breach" exemption.
Misconception 3: "The state where the company is incorporated governs the notification obligation."
State breach notification statutes are triggered by the residency of the affected individuals, not the business's state of incorporation or primary location location. A Delaware-incorporated company with customers in all 50 states may face notification obligations in each of those 50 states simultaneously.
Misconception 4: "SEC breach disclosure and HIPAA notification are parallel but separate."
A publicly traded healthcare company may be subject to both. SEC Form 8-K filing (within four business days of determining materiality) and HIPAA individual notification (within 60 days of discovery) can be triggered by the same incident. The SEC rule does not preempt HIPAA, and HIPAA does not satisfy SEC disclosure obligations.
Misconception 5: "GDPR applies to US companies only if they have a European office."
The EU General Data Protection Regulation's Article 3 territorial scope applies to any organization that processes personal data of EU residents while offering goods or services to those residents or monitoring their behavior — physical presence in the EU is not required. For US organizations handling EU resident data, GDPR's 72-hour breach notification requirement to the relevant Data Protection Authority (GDPR Article 33) applies concurrently with applicable US state and federal obligations.
Checklist or steps (non-advisory)
The following sequence reflects the structural phases organizations typically move through when responding to a potential breach notification obligation. This is a reference framework, not legal guidance.
-
Incident identification and initial classification — Determine whether unauthorized access, acquisition, or use of personal data has occurred. Document time of discovery.
-
Scope determination — Identify the data types involved (PII, PHI, financial account data, credentials, biometrics) and the residency of affected individuals across all 50 states and applicable territories.
-
Applicable law inventory — Compile every state statute applicable based on individual residency, plus applicable federal frameworks (HIPAA, GLBA/Safeguards, SEC, FISMA) based on the organization's industry classification.
-
Safe harbor assessment — For each jurisdiction, evaluate whether encryption or other safe harbor conditions are met; confirm no key compromise occurred.
-
Risk-of-harm analysis — For states with harm-based triggers (Alabama being a notable example), document the risk-of-harm determination with supporting evidence.
-
Notification timeline mapping — Map each applicable jurisdiction's deadline, starting from the legally defined clock start (discovery, determination, or confirmation, depending on the statute). Identify the most compressed deadline governing execution.
-
Regulatory notification preparation — Draft notifications for state attorneys general, HHS OCR (HIPAA), FTC (Safeguards Rule), SEC (Form 8-K, if applicable), and US-CERT (federal agencies).
-
Individual notification preparation — Draft individual notices meeting content requirements for each applicable jurisdiction; format requirements vary (written, electronic, substitute notice thresholds differ by state).
-
Consumer reporting agency notification — For breaches affecting more than 500 residents in a given state, or per HIPAA's media notice threshold, prepare notifications to major consumer reporting agencies.
-
Documentation and record retention — Document all decisions, timelines, and notifications dispatched. HIPAA requires a six-year retention period for breach-related documentation (45 CFR §164.414(b)).
Data loss prevention controls and encryption standards programs directly affect steps 4 and 5 of this sequence by determining which safe harbor conditions can be asserted.
Reference table or matrix
State and Federal Breach Notification Requirements — Key Parameters
| Jurisdiction / Framework | Governing Authority | Notification Deadline | Regulatory Recipient | Harm Threshold | Encryption Safe Harbor |
|---|---|---|---|---|---|
| California (CCPA/CPRA) | CA AG / CA Privacy Protection Agency | Most expedient time; no hard outer limit | AG (if >500 CA residents) | No | Yes (with key protection) |
| New York (SHIELD Act) | NY AG | Most expedient time; unreasonable delay standard | NY AG | No | Yes |
| Florida | FL AG under Fla. Stat. §501.171 | 30 days from determination | FL AG (if >500 FL residents) | No | Yes |
| Texas | TX AG under Tex. Bus. & Com. Code §521 | 60 days from discovery | TX AG | No | Yes |
| Alabama | AL AG under |