HB 0481CS

CHAMBER ACTION




1The Criminal Justice Committee recommends the following:
2
3     Council/Committee Substitute
4     Remove the entire bill and insert:
5
A bill to be entitled
6An act relating to unlawful use of personal identification
7information; amending s. 817.568, F.S.; including other
8information within the definition of the term "personal
9identification information"; defining the term
10"counterfeit or fictitious personal identification
11information"; revising criminal penalties relating to the
12offense of fraudulently using, or possessing with intent
13to fraudulently use, personal identification information;
14providing minimum mandatory terms of imprisonment;
15creating the offenses of willfully and fraudulently using,
16or possessing with intent to fraudulently use, personal
17identification information concerning a deceased
18individual; providing criminal penalties; providing for
19minimum mandatory terms of imprisonment; creating the
20offense of willfully and fraudulently creating or using,
21or possessing with intent to fraudulently use, counterfeit
22or fictitious personal identification information;
23providing criminal penalties; providing for
24reclassification of offenses under certain circumstances;
25providing for reduction or suspension of sentences under
26certain circumstances; creating s. 817.5681, F.S.;
27requiring business persons maintaining computerized data
28that includes personal information to disclose breaches of
29system security under certain circumstances; providing
30requirements; providing for administrative fines;
31providing exceptions and limitations; authorizing delays
32of such disclosures under certain circumstances; providing
33definitions; providing for alternative notice methods;
34specifying conditions of compliance for persons
35maintaining certain alternative notification procedures;
36specifying conditions under which notification is not
37required; providing requirements for documentation and
38maintenance of documentation; providing an administrative
39fine for failing to document certain failures to comply;
40providing for application of administrative sanctions to
41certain persons under certain circumstances; authorizing
42the Department of Legal Affairs to institute proceedings
43to assess and collect fines; providing an effective date.
44
45Be It Enacted by the Legislature of the State of Florida:
46
47     Section 1.  Section 817.568, Florida Statutes, is amended
48to read:
49     817.568  Criminal use of personal identification
50information.--
51     (1)  As used in this section, the term:
52     (a)  "Access device" means any card, plate, code, account
53number, electronic serial number, mobile identification number,
54personal identification number, or other telecommunications
55service, equipment, or instrument identifier, or other means of
56account access that can be used, alone or in conjunction with
57another access device, to obtain money, goods, services, or any
58other thing of value, or that can be used to initiate a transfer
59of funds, other than a transfer originated solely by paper
60instrument.
61     (b)  "Authorization" means empowerment, permission, or
62competence to act.
63     (c)  "Harass" means to engage in conduct directed at a
64specific person that is intended to cause substantial emotional
65distress to such person and serves no legitimate purpose.
66"Harass" does not mean to use personal identification
67information for accepted commercial purposes. The term does not
68include constitutionally protected conduct such as organized
69protests or the use of personal identification information for
70accepted commercial purposes.
71     (d)  "Individual" means a single human being and does not
72mean a firm, association of individuals, corporation,
73partnership, joint venture, sole proprietorship, or any other
74entity.
75     (e)  "Person" means a "person" as defined in s. 1.01(3).
76     (f)  "Personal identification information" means any name
77or number that may be used, alone or in conjunction with any
78other information, to identify a specific individual, including
79any:
80     1.  Name, postal or electronic mail address, telephone
81number, social security number, date of birth, mother's maiden
82name, official state-issued or United States-issued driver's
83license or identification number, alien registration number,
84government passport number, employer or taxpayer identification
85number, Medicaid or food stamp account number, or bank account
86number, or credit or debit card number, or personal
87identification number or code assigned to the holder of a debit
88card by the issuer to permit authorized electronic use of such
89card;
90     2.  Unique biometric data, such as fingerprint, voice
91print, retina or iris image, or other unique physical
92representation;
93     3.  Unique electronic identification number, address, or
94routing code; or
95     4.  Medical records;
96     5.4.  Telecommunication identifying information or access
97device; or.
98     6.  Other number or information that can be used to access
99a person's financial resources.
100     (g)  "Counterfeit or fictitious personal identification
101information" means any counterfeit, fictitious, or fabricated
102information in the similitude of the data outlined in paragraph
103(f) that, although not truthful or accurate, would in context
104lead a reasonably prudent person to credit its truthfulness and
105accuracy.
106     (2)(a)  Any person who willfully and without authorization
107fraudulently uses, or possesses with intent to fraudulently use,
108personal identification information concerning an individual
109without first obtaining that individual's consent, commits the
110offense of fraudulent use of personal identification
111information, which is a felony of the third degree, punishable
112as provided in s. 775.082, s. 775.083, or s. 775.084.
113     (b)  Any person who willfully and without authorization
114fraudulently uses personal identification information concerning
115an individual without first obtaining that individual's consent
116commits a felony of the second degree, punishable as provided in
117s. 775.082, s. 775.083, or s. 775.084, if the pecuniary benefit,
118the value of the services received, the payment sought to be
119avoided, or the amount of the injury or fraud perpetrated is
120$5,000 or more or if the person fraudulently uses the personal
121identification information of 10 or more individuals, but fewer
122than 20 individuals, without their consent. Notwithstanding any
123other provision of law, the court shall sentence any person
124convicted of committing the offense described in this paragraph
125to a mandatory minimum sentence of 3 years' imprisonment.
126     (c)  Any person who willfully and without authorization
127fraudulently uses personal identification information concerning
128an individual without first obtaining that individual's consent
129commits a felony of the first degree, punishable as provided in
130s. 775.082, s. 775.083, or s. 775.084, if the pecuniary benefit,
131the value of the services received, the payment sought to be
132avoided, or the amount of the injury or fraud perpetrated is
133$50,000 or more or if the person fraudulently uses the personal
134identification information of 20 or more individuals, but fewer
135than 30 individuals, without their consent. Notwithstanding any
136other provision of law, the court shall sentence any person
137convicted of committing the offense described in this paragraph:
138     1.  to a mandatory minimum sentence of 5 years'
139imprisonment. If the pecuniary benefit, the value of the
140services received, the payment sought to be avoided, or the
141amount of the injury or fraud perpetrated is $100,000 or more,
142or if the person fraudulently uses the personal identification
143information of 30 or more individuals without their consent,
144notwithstanding any other provision of law, the court shall
145sentence any person convicted of committing the offense
146described in this paragraph
147     2.  to a mandatory minimum sentence of 10 years'
148imprisonment, if the pecuniary benefit, the value of the
149services received, the payment sought to be avoided, or the
150amount of the injury or fraud perpetrated is $100,000 or more or
151if the person fraudulently uses the personal identification
152information of 30 or more individuals without their consent.
153     (3)  Neither paragraph (2)(b) nor paragraph (2)(c) prevents
154a court from imposing a greater sentence of incarceration as
155authorized by law. If the minimum mandatory terms of
156imprisonment imposed under paragraph (2)(b) or paragraph (2)(c)
157exceed the maximum sentences authorized under s. 775.082, s.
158775.084, or the Criminal Punishment Code under chapter 921, the
159mandatory minimum sentence must be imposed. If the mandatory
160minimum terms of imprisonment under paragraph (2)(b) or
161paragraph (2)(c) are less than the sentence that could be
162imposed under s. 775.082, s. 775.084, or the Criminal Punishment
163Code under chapter 921, the sentence imposed by the court must
164include the mandatory minimum term of imprisonment as required
165by paragraph (2)(b) or paragraph (2)(c).
166     (4)  Any person who willfully and without authorization
167possesses, uses, or attempts to use personal identification
168information concerning an individual without first obtaining
169that individual's consent, and who does so for the purpose of
170harassing that individual, commits the offense of harassment by
171use of personal identification information, which is a
172misdemeanor of the first degree, punishable as provided in s.
173775.082 or s. 775.083.
174     (5)  If an offense prohibited under this section was
175facilitated or furthered by the use of a public record, as
176defined in s. 119.011, the offense is reclassified to the next
177higher degree as follows:
178     (a)  A misdemeanor of the first degree is reclassified as a
179felony of the third degree.
180     (b)  A felony of the third degree is reclassified as a
181felony of the second degree.
182     (c)  A felony of the second degree is reclassified as a
183felony of the first degree.
184
185For purposes of sentencing under chapter 921 and incentive gain-
186time eligibility under chapter 944, a felony offense that is
187reclassified under this subsection is ranked one level above the
188ranking under s. 921.0022 of the felony offense committed, and a
189misdemeanor offense that is reclassified under this subsection
190is ranked in level 2 of the offense severity ranking chart in s.
191921.0022.
192     (6)  Any person who willfully and without authorization
193fraudulently uses personal identification information concerning
194an individual who is less than 18 years of age without first
195obtaining the consent of that individual or of his or her legal
196guardian commits a felony of the second degree, punishable as
197provided in s. 775.082, s. 775.083, or s. 775.084.
198     (7)  Any person who is in the relationship of parent or
199legal guardian, or who otherwise exercises custodial authority
200over an individual who is less than 18 years of age, who
201willfully and fraudulently uses personal identification
202information of that individual commits a felony of the second
203degree, punishable as provided in s. 775.082, s. 775.083, or s.
204775.084.
205     (8)(a)  Any person who willfully and fraudulently uses, or
206possesses with intent to fraudulently use, personal
207identification information concerning a deceased individual
208commits the offense of fraudulent use or possession with intent
209to use personal identification information of a deceased
210individual, a felony of the third degree, punishable as provided
211in s. 775.082, s. 775.083, or s. 775.084.
212     (b)  Any person who willfully and fraudulently uses
213personal identification information concerning a deceased
214individual commits a felony of the second degree, punishable as
215provided in s. 775.082, s. 775.083, or s. 775.084, if the
216pecuniary benefit, the value of the services received, the
217payment sought to be avoided, or the amount of injury or fraud
218perpetrated is $5,000 or more, or if the person fraudulently
219uses the personal identification information of 10 or more but
220fewer than 20 deceased individuals. Notwithstanding any other
221provision of law, the court shall sentence any person convicted
222of committing the offense described in this paragraph to a
223mandatory minimum sentence of 3 years' imprisonment.
224     (c)  Any person who willfully and fraudulently uses
225personal identification information concerning a deceased
226individual commits the offense of aggravated fraudulent use of
227the personal identification information of multiple deceased
228individuals, a felony of the first degree, punishable as
229provided in s. 775.082, s. 775.083, or s. 775.084, if the
230pecuniary benefit, the value of the services received, the
231payment sought to be avoided, or the amount of injury or fraud
232perpetrated is $50,000 or more, or if the person fraudulently
233uses the personal identification information of 20 or more but
234fewer than 30 deceased individuals. Notwithstanding any other
235provision of law, the court shall sentence any person convicted
236of the offense described in this paragraph to a minimum
237mandatory sentence of 5 years' imprisonment. If the pecuniary
238benefit, the value of the services received, the payment sought
239to be avoided, or the amount of the injury or fraud perpetrated
240is $100,000 or more, or if the person fraudulently uses the
241personal identification information of 30 or more deceased
242individuals, notwithstanding any other provision of law, the
243court shall sentence any person convicted of an offense
244described in this paragraph to a mandatory minimum sentence of
24510 years' imprisonment.
246     (9)  Any person who willfully and fraudulently creates or
247uses, or possesses with intent to fraudulently use, counterfeit
248or fictitious personal identification information concerning a
249fictitious individual, or concerning a real individual without
250first obtaining that real individual's consent, with intent to
251use such counterfeit or fictitious personal identification
252information for the purpose of committing or facilitating the
253commission of a fraud on another person, commits the offense of
254fraudulent creation or use, or possession with intent to
255fraudulently use, counterfeit or fictitious personal
256identification information, a felony of the third degree,
257punishable as provided in s. 775.082, s. 775.083, or s. 775.084.
258     (10)  Any person who commits an offense described in this
259section and for the purpose of obtaining or using personal
260identification information misrepresents himself or herself to
261be a law enforcement officer; an employee or representative of a
262bank, credit card company, credit counseling company, or credit
263reporting agency; or any person who wrongfully represents that
264he or she is seeking to assist the victim with a problem with
265the victim's credit history shall have the offense reclassified
266as follows:
267     (a)  In the case of a misdemeanor, the offense is
268reclassified as a felony of the third degree.
269     (b)  In the case of a felony of the third degree, the
270offense is reclassified as a felony of the second degree.
271     (c)  In the case of a felony of the second degree, the
272offense is reclassified as a felony of the first degree.
273     (d)  In the case of a felony of the first degree or a
274felony of the first degree punishable by a term of imprisonment
275not exceeding life, the offense is reclassified as a life
276felony.
277
278For purposes of sentencing under chapter 921, a felony offense
279that is reclassified under this subsection is ranked one level
280above the ranking under s. 921.0022 or s. 921.0023 of the felony
281offense committed, and a misdemeanor offense that is
282reclassified under this subsection is ranked in level 2 of the
283offense severity ranking chart.
284     (11)  The prosecutor may move the sentencing court to
285reduce or suspend the sentence of any person who is convicted of
286a violation of this section and who provides substantial
287assistance in the identification, arrest, or conviction of any
288of that person's accomplices, accessories, coconspirators, or
289principals or of any other person engaged in fraudulent
290possession or use of personal identification information. The
291arresting agency shall be given an opportunity to be heard in
292aggravation or mitigation in reference to any such motion. Upon
293good cause shown, the motion may be filed and heard in camera.
294The judge hearing the motion may reduce or suspend the sentence
295if the judge finds that the defendant rendered such substantial
296assistance.
297     (12)(8)  This section does not prohibit any lawfully
298authorized investigative, protective, or intelligence activity
299of a law enforcement agency of this state or any of its
300political subdivisions, of any other state or its political
301subdivisions, or of the Federal Government or its political
302subdivisions.
303     (13)(9)(a)  In sentencing a defendant convicted of an
304offense under this section, the court may order that the
305defendant make restitution under pursuant to s. 775.089 to any
306victim of the offense. In addition to the victim's out-of-pocket
307costs, such restitution may include payment of any other costs,
308including attorney's fees incurred by the victim in clearing the
309victim's credit history or credit rating, or any costs incurred
310in connection with any civil or administrative proceeding to
311satisfy any debt, lien, or other obligation of the victim
312arising as the result of the actions of the defendant.
313     (b)  The sentencing court may issue such orders as are
314necessary to correct any public record that contains false
315information given in violation of this section.
316     (14)(10)  Prosecutions for violations of this section may
317be brought on behalf of the state by any state attorney or by
318the statewide prosecutor.
319     (15)(11)  The Legislature finds that, in the absence of
320evidence to the contrary, the location where a victim gives or
321fails to give consent to the use of personal identification
322information is the county where the victim generally resides.
323     (16)(12)  Notwithstanding any other provision of law, venue
324for the prosecution and trial of violations of this section may
325be commenced and maintained in any county in which an element of
326the offense occurred, including the county where the victim
327generally resides.
328     (17)(13)  A prosecution of an offense prohibited under
329subsection (2), subsection (6), or subsection (7) must be
330commenced within 3 years after the offense occurred. However, a
331prosecution may be commenced within 1 year after discovery of
332the offense by an aggrieved party, or by a person who has a
333legal duty to represent the aggrieved party and who is not a
334party to the offense, if such prosecution is commenced within 5
335years after the violation occurred.
336     Section 2.  Section 817.5681, Florida Statutes, is created
337to read:
338     817.5681  Breach of security concerning confidential
339personal information in third-party possession; administrative
340penalties.--
341     (1)(a)  Any person who conducts business in this state and
342maintains computerized data in a system that includes personal
343information shall disclose any breach of the security of the
344system, following discovery or notification of the breach in the
345security of the data, to any resident of this state whose
346unencrypted personal information was, or is reasonably believed
347to have been, acquired by an unauthorized person. The disclosure
348shall be made most expeditiously and without unreasonable delay,
349consistent with the legitimate needs of law enforcement, as
350provided in subsection (3) and paragraph (9)(a), or any measures
351necessary to determine the scope of the breach and restore the
352reasonable integrity of the data system. Disclosure of the
353breach may only be delayed indefinitely following its discovery
354under subsection (3). Otherwise, disclosure must be made no
355later than 30 days following the discovery of the breach.
356     (b)  Any person required to make disclosures under
357paragraph (a) who fails to do so within the time periods
358provided in this subsection is liable for an administrative fine
359in the amount of $1,000 for each day the breach goes undisclosed
360for up to 30 days.
361     (c)  Except as required for investigations under subsection
362(3), any person required to make disclosures under paragraph (a)
363who fails to do so is subject to an administrative fine of up to
364$50,000 for each 30-day period or portion thereof up to 180 days
365unless acting under a court order. If such disclosure is not
366made within 180 days, any person required to make such
367disclosures under paragraph (a) who fails to do so is subject to
368an administrative fine of up to $500,000.
369     (d)  The disclosure required under this subsection must be
370made by each person in the state in possession of computerized
371data. However, the administrative sanctions for nondisclosure
372provided in this subsection shall not apply in the case of
373computerized information in the custody of any governmental
374agency or political subdivision, unless that governmental agency
375or political subdivision has entered into a contract with a
376contractor or third-party administrator to provide governmental
377services. In such case, the contractor or third-party
378administrator shall be a person to whom the administrative
379sanctions provided in this subsection apply, provided such
380contractor or third-party administrator found in violation of
381the nondisclosure restrictions in this section may not bring an
382action for contribution or set-off available against the
383employing agency or subdivision.
384     (2)(a)  Any person who maintains computerized data that
385includes personal information on behalf of another business
386entity shall notify the business entity for which the
387information is maintained of any breach of the security of the
388data within 72 hours after the discovery of the breach, if the
389personal information was, or is reasonably believed to have
390been, acquired by an unauthorized person.
391     (b)  Any person required to make disclosures under
392paragraph (a) who fails to do so within the time periods
393provided in this subsection is liable for an administrative fine
394in the amount of $1,000 for each day the breach goes undisclosed
395for up to 30 days.
396     (c)  Except as required for investigations under subsection
397(3), any person required to make disclosures under paragraph (a)
398who fails to do so is subject to an administrative fine of up to
399$50,000 for each 30-day period or portion thereof up to 180 days
400unless acting under court order. If such disclosure is not made
401within 180 days, any person required to make disclosures under
402paragraph (a) who fails to do so is subject to an administrative
403fine of up to $500,000.
404     (d)  The disclosure required under this subsection must be
405made by each person in the state in possession of computerized
406data. However, the administrative sanctions for nondisclosure
407provided in this subsection shall not apply in the case of
408computerized information in the custody of any governmental
409agency or political subdivision unless that governmental agency
410or political subdivision has entered into a contract with a
411contractor or third-party administrator to provide governmental
412services. In such case, the contractor or third-party
413administrator shall be a person to whom the administrative
414sanctions provided in this subsection would apply, provided such
415contractor or third-party administrator found in violation of
416the nondisclosure restrictions in this subsection may not bring
417an action for contribution or set-off available against the
418employing agency or subdivision.
419     (3)  The notification required by this section may be
420delayed if a law enforcement agency determines that the
421notification will impede a criminal investigation. The
422notification required by this section shall be made after the
423law enforcement agency determines that the notification will not
424compromise the investigation. The delay in notification allowed
425under this subsection shall not exceed 90 days unless ordered by
426a court of competent jurisdiction.
427     (4)  For purposes of this section, the term "breach of the
428security of the system" means unauthorized acquisition of
429computerized data that materially compromises the security,
430confidentiality, or integrity of personal information maintained
431by the person. Good faith acquisition of personal information by
432an employee or agent of a person for the purposes of the person
433is not a breach of the security of the system, provided the
434information is not used for a purpose unrelated to the business
435or subject to further unauthorized disclosure.
436     (5)  For purposes of this section, the term "personal
437information" means an individual's first name or first initial
438and last name in combination with any one or more of the
439following data elements, when the data elements are not
440encrypted:
441     (a)  Social security number.
442     (b)  Driver's license number or Florida identification card
443number.
444     (c)  Account number or credit or debit card number, in
445combination with any required security code, access code, or
446password that would permit access to an individual's financial
447account.
448     (6)  For purposes of this section, notice may be provided
449by one of the following methods:
450     (a)  Written notice;
451     (b)  Electronic notice, if the notice provided is
452consistent with the provisions regarding electronic records and
453signatures set forth in 15 U.S.C. s. 7001; or
454     (c)  Substitute notice, if the person demonstrates that the
455cost of providing notice would exceed $250,000, the affected
456class of subject persons to be notified exceeds 500,000, or the
457person does not have sufficient contact information. Substitute
458notice shall consist of all of the following:
459     1.  Electronic mail notice when the person has an
460electronic mail address for the subject person.
461     2.  Conspicuous posting of the notice on the person's
462website, if the person maintains a website.
463     3.  Notification to major statewide media.
464     (7)  For purposes of this section, the term "unauthorized
465person" means any person who is not the person to whom the
466personal information belongs and who does not have permission
467from or a password issued by the person who stores the
468computerized data to acquire such data.
469     (8)  Notwithstanding subsection (6), a person who maintains
470his or her own notification procedures as part of an information
471security or privacy policy for the treatment of personal
472information and which procedures are otherwise consistent with
473the timing requirements of this part shall be deemed to be in
474compliance with the notification requirements of this section if
475the person notifies subject persons in accordance with its
476procedures in the event of a breach of security of the system.
477     (9)(a)  Notwithstanding subsection (2), notification is not
478required if, after an appropriate investigation and after
479consultation with relevant federal, state, and local agencies
480responsible for law enforcement, the person reasonably
481determines that the breach has not and will not likely result in
482harm to the individuals whose personal information has been
483acquired and accessed. Such a determination must be documented
484in writing and the documentation must be maintained for 5 years.
485     (b)  Any person required to document a failure to notify
486affected persons who fails to document the failure as required
487in this subsection or who, if documentation was created, fails
488to maintain the documentation for the full 5 years as required
489in this subsection is liable for an administrative fine in the
490amount of up to $50,000 for such failure.
491     (c)  The documentation and maintenance of documentation
492required under this subsection must be made by each person in
493the state in possession of computerized data. However, the
494administrative sanctions outlined in this subsection shall not
495apply in the case of computerized information in the custody of
496any governmental agency or political subdivision, unless that
497governmental agency or political subdivision has entered into a
498contract with a contractor or third-party administrator to
499provide governmental services. In such case, the contractor or
500third-party administrator shall be a person to whom the
501administrative sanctions outlined in this subsection apply,
502provided such contractor or third-party administrator found in
503violation of the documentation and maintenance of documentation
504requirements in this subsection may not bring an action for
505contribution or set-off available against the employing agency
506or subdivision.
507     (10)  The Department of Legal Affairs may institute
508proceedings to assess and collect the fines provided in this
509section.
510     Section 3.  This act shall take effect July 1, 2005.


CODING: Words stricken are deletions; words underlined are additions.