What counts as a reportable breach?
Not every cybersecurity incident needs to be reported—for example, unauthorized access attempts that don’t compromise data. Breach notification laws come into play with confirmed theft of sensitive data, such as financial or personal information. These definitions vary across jurisdictions, but usually hinge on a fancy legal word: “materiality.”
In 2023, the Securities and Exchange Commission (SEC) adopted new regulations that require public companies to disclose material cybersecurity incidents within four business days of determining materiality. SEC defines materiality as information that a reasonable investor would deem important, including potential financial, reputational, or litigation risks.
For other organizations, materiality is dictated by relevant jurisdictions. This can create a complex web of state, federal, international, and sector-based laws and regulations that organizations must plan for.
For example, medical organizations must follow HIPAA’s patient confidentiality protections and send data breach notifications if personal health information (PHI) is compromised. HIPAA has risk-based notification rules, while states such as California take a stricter approach, triggering notification when unencrypted personal information is acquired (or reasonably believed acquired). HIPAA applies to PHI, while state breach notification laws cover a broader range of data, including payment cards, login credentials, online identifiers, and more.
All 50 states and territories have breach notification laws with differing definitions and triggers for reporting. What qualifies as "personally identifiable information" (PII) can vary, with some states including biometric data while others focus on financial details. Companies often follow the most stringent standard to cover multi-state obligations.