22-40-19. Definition of terms in §§22-40-19 to 22-40-26.
Terms in §§22-40-19 to 22-40-26, inclusive, mean:
(1)"Breach of system security," the unauthorized acquisition of unencrypted computerized data or encrypted computerized data and the encryption key by any person that materially compromises the security, confidentiality, or integrity of personal or protected information maintained by the information holder. The term does not include the good faith acquisition of personal or protected information by an employee or agent of the information holder for the purposes of the information holder if the personal or protected information is not used or subject to further unauthorized disclosure;
(2)"Encrypted," computerized data that is rendered unusable, unreadable, or indecipherable without the use of a decryption process or key or in accordance with the Federal Information Processing Standard 140-2 in effect on January 1, 2018;
(3)"Information holder," any person or business that conducts business in this state, and that owns or licenses computerized personal or protected information of residents of this state;
(4)"Personal information," a person's first name or first initial and last name, in combination with any one or more of the following data elements:
(a)Social security number;
(b)Driver license number or other unique identification number created or collected by a government body;
(c)Account, credit card, or debit card number, in combination with any required security code, access code, password, routing number, PIN, or any additional information that would permit access to a person's financial account;
(d)Health information as defined in 45 CFR 160.103; or
(e)An identification number assigned to a person by the person's employer in combination with any required security code, access code, password, or biometric data generated from measurements or analysis of human body characteristics for authentication purposes.
The term does not include information that is lawfully made available to the general public from federal, state, or local government records or information that has been redacted, or otherwise made unusable; and
(5)"Protected information," includes:
(a)A user name or email address, in combination with a password, security question answer, or other information that permits access to an online account; and
(b)Account number or credit or debit card number, in combination with any required security code, access code, or password that permits access to a person's financial account;
(6)"Unauthorized person," any person not authorized to acquire or disclose personal information, or any person authorized by the information holder to access personal information who has acquired or disclosed the personal information outside the guidelines for access of disclosure established by the information holder.
Source: SL 2018, ch 135, §1.
Structure South Dakota Codified Laws
Section 22-40-1 - Impersonation with intent to deceive law enforcement officer--Misdemeanor.
Section 22-40-8 - Identity theft--Felony.
Section 22-40-9 - Identifying information defined.
Section 22-40-10 - Physical presence in county not necessary to commission of identity theft.
Section 22-40-11 - Reencoder and scanning device defined.
Section 22-40-12 - Unauthorized use of scanning device on payment card--Felony.
Section 22-40-13 - Unauthorized use of reencoder on payment card--Felony.
Section 22-40-15 - Making or possessing forgery or counterfeiting devices--Felony.
Section 22-40-17 - Impersonating a judicial official--Misdemeanor .
Section 22-40-18 - Misuse of tribal identification card.
Section 22-40-19 - Definition of terms in §§ 22-40-19 to 22-40-26.
Section 22-40-20 - Notice of breach of system security--Exception.
Section 22-40-21 - Delay of notice that would impede criminal investigation.
Section 22-40-22 - Types of notice of breach of system security.
Section 22-40-24 - Notice to consumer reporting agencies.
Section 22-40-25 - Prosecution for violations.
Section 22-40-26 - Notice of breach of system security in accordance with federal law.