HB 0481CS

CHAMBER ACTION




1The Business Regulation Committee recommends the following:
2
3     Council/Committee Substitute
4     Remove the entire bill and insert:
5
A bill to be entitled
6An act relating to unlawful use of personal identification
7information; amending s. 817.568, F.S.; including other
8information within the definition of the term "personal
9identification information"; defining the term
10"counterfeit or fictitious personal identification
11information"; revising criminal penalties relating to the
12offense of fraudulently using, or possessing with intent
13to fraudulently use, personal identification information;
14providing minimum mandatory terms of imprisonment;
15creating the offenses of willfully and fraudulently using,
16or possessing with intent to fraudulently use, personal
17identification information concerning a deceased
18individual; providing criminal penalties; providing for
19minimum mandatory terms of imprisonment; creating the
20offense of willfully and fraudulently creating or using,
21or possessing with intent to fraudulently use, counterfeit
22or fictitious personal identification information;
23providing criminal penalties; providing for
24reclassification of offenses under certain circumstances;
25providing for reduction or suspension of sentences under
26certain circumstances; creating s. 817.5681, F.S.;
27requiring business persons maintaining computerized data
28that includes personal information to provide notice of
29breaches of system security under certain circumstances;
30providing requirements; providing for administrative
31fines; providing exceptions and limitations; authorizing
32delays of such disclosures under certain circumstances;
33providing definitions; providing for alternative notice
34methods; specifying conditions of compliance for persons
35maintaining certain alternative notification procedures;
36specifying conditions under which notification is not
37required; providing requirements for documentation and
38maintenance of documentation; providing an administrative
39fine for failing to document certain failures to comply;
40providing for application of administrative sanctions to
41certain persons under certain circumstances; authorizing
42the Department of Legal Affairs to institute proceedings
43to assess and collect fines; providing an effective date.
44
45Be It Enacted by the Legislature of the State of Florida:
46
47     Section 1.  Section 817.568, Florida Statutes, is amended
48to read:
49     817.568  Criminal use of personal identification
50information.--
51     (1)  As used in this section, the term:
52     (a)  "Access device" means any card, plate, code, account
53number, electronic serial number, mobile identification number,
54personal identification number, or other telecommunications
55service, equipment, or instrument identifier, or other means of
56account access that can be used, alone or in conjunction with
57another access device, to obtain money, goods, services, or any
58other thing of value, or that can be used to initiate a transfer
59of funds, other than a transfer originated solely by paper
60instrument.
61     (b)  "Authorization" means empowerment, permission, or
62competence to act.
63     (c)  "Harass" means to engage in conduct directed at a
64specific person that is intended to cause substantial emotional
65distress to such person and serves no legitimate purpose.
66"Harass" does not mean to use personal identification
67information for accepted commercial purposes. The term does not
68include constitutionally protected conduct such as organized
69protests or the use of personal identification information for
70accepted commercial purposes.
71     (d)  "Individual" means a single human being and does not
72mean a firm, association of individuals, corporation,
73partnership, joint venture, sole proprietorship, or any other
74entity.
75     (e)  "Person" means a "person" as defined in s. 1.01(3).
76     (f)  "Personal identification information" means any name
77or number that may be used, alone or in conjunction with any
78other information, to identify a specific individual, including
79any:
80     1.  Name, postal or electronic mail address, telephone
81number, social security number, date of birth, mother's maiden
82name, official state-issued or United States-issued driver's
83license or identification number, alien registration number,
84government passport number, employer or taxpayer identification
85number, Medicaid or food stamp account number, or bank account
86number, or credit or debit card number, or personal
87identification number or code assigned to the holder of a debit
88card by the issuer to permit authorized electronic use of such
89card;
90     2.  Unique biometric data, such as fingerprint, voice
91print, retina or iris image, or other unique physical
92representation;
93     3.  Unique electronic identification number, address, or
94routing code; or
95     4.  Medical records;
96     5.4.  Telecommunication identifying information or access
97device; or.
98     6.  Other number or information that can be used to access
99a person's financial resources.
100     (g)  "Counterfeit or fictitious personal identification
101information" means any counterfeit, fictitious, or fabricated
102information in the similitude of the data outlined in paragraph
103(f) that, although not truthful or accurate, would in context
104lead a reasonably prudent person to credit its truthfulness and
105accuracy.
106     (2)(a)  Any person who willfully and without authorization
107fraudulently uses, or possesses with intent to fraudulently use,
108personal identification information concerning an individual
109without first obtaining that individual's consent, commits the
110offense of fraudulent use of personal identification
111information, which is a felony of the third degree, punishable
112as provided in s. 775.082, s. 775.083, or s. 775.084.
113     (b)  Any person who willfully and without authorization
114fraudulently uses personal identification information concerning
115an individual without first obtaining that individual's consent
116commits a felony of the second degree, punishable as provided in
117s. 775.082, s. 775.083, or s. 775.084, if the pecuniary benefit,
118the value of the services received, the payment sought to be
119avoided, or the amount of the injury or fraud perpetrated is
120$5,000 or more or if the person fraudulently uses the personal
121identification information of 10 or more individuals, but fewer
122than 20 individuals, without their consent. Notwithstanding any
123other provision of law, the court shall sentence any person
124convicted of committing the offense described in this paragraph
125to a mandatory minimum sentence of 3 years' imprisonment.
126     (c)  Any person who willfully and without authorization
127fraudulently uses personal identification information concerning
128an individual without first obtaining that individual's consent
129commits a felony of the first degree, punishable as provided in
130s. 775.082, s. 775.083, or s. 775.084, if the pecuniary benefit,
131the value of the services received, the payment sought to be
132avoided, or the amount of the injury or fraud perpetrated is
133$50,000 or more or if the person fraudulently uses the personal
134identification information of 20 or more individuals, but fewer
135than 30 individuals, without their consent. Notwithstanding any
136other provision of law, the court shall sentence any person
137convicted of committing the offense described in this paragraph:
138     1.  to a mandatory minimum sentence of 5 years'
139imprisonment. If the pecuniary benefit, the value of the
140services received, the payment sought to be avoided, or the
141amount of the injury or fraud perpetrated is $100,000 or more,
142or if the person fraudulently uses the personal identification
143information of 30 or more individuals without their consent,
144notwithstanding any other provision of law, the court shall
145sentence any person convicted of committing the offense
146described in this paragraph
147     2.  to a mandatory minimum sentence of 10 years'
148imprisonment, if the pecuniary benefit, the value of the
149services received, the payment sought to be avoided, or the
150amount of the injury or fraud perpetrated is $100,000 or more or
151if the person fraudulently uses the personal identification
152information of 30 or more individuals without their consent.
153     (3)  Neither paragraph (2)(b) nor paragraph (2)(c) prevents
154a court from imposing a greater sentence of incarceration as
155authorized by law. If the minimum mandatory terms of
156imprisonment imposed under paragraph (2)(b) or paragraph (2)(c)
157exceed the maximum sentences authorized under s. 775.082, s.
158775.084, or the Criminal Punishment Code under chapter 921, the
159mandatory minimum sentence must be imposed. If the mandatory
160minimum terms of imprisonment under paragraph (2)(b) or
161paragraph (2)(c) are less than the sentence that could be
162imposed under s. 775.082, s. 775.084, or the Criminal Punishment
163Code under chapter 921, the sentence imposed by the court must
164include the mandatory minimum term of imprisonment as required
165by paragraph (2)(b) or paragraph (2)(c).
166     (4)  Any person who willfully and without authorization
167possesses, uses, or attempts to use personal identification
168information concerning an individual without first obtaining
169that individual's consent, and who does so for the purpose of
170harassing that individual, commits the offense of harassment by
171use of personal identification information, which is a
172misdemeanor of the first degree, punishable as provided in s.
173775.082 or s. 775.083.
174     (5)  If an offense prohibited under this section was
175facilitated or furthered by the use of a public record, as
176defined in s. 119.011, the offense is reclassified to the next
177higher degree as follows:
178     (a)  A misdemeanor of the first degree is reclassified as a
179felony of the third degree.
180     (b)  A felony of the third degree is reclassified as a
181felony of the second degree.
182     (c)  A felony of the second degree is reclassified as a
183felony of the first degree.
184
185For purposes of sentencing under chapter 921 and incentive gain-
186time eligibility under chapter 944, a felony offense that is
187reclassified under this subsection is ranked one level above the
188ranking under s. 921.0022 of the felony offense committed, and a
189misdemeanor offense that is reclassified under this subsection
190is ranked in level 2 of the offense severity ranking chart in s.
191921.0022.
192     (6)  Any person who willfully and without authorization
193fraudulently uses personal identification information concerning
194an individual who is less than 18 years of age without first
195obtaining the consent of that individual or of his or her legal
196guardian commits a felony of the second degree, punishable as
197provided in s. 775.082, s. 775.083, or s. 775.084.
198     (7)  Any person who is in the relationship of parent or
199legal guardian, or who otherwise exercises custodial authority
200over an individual who is less than 18 years of age, who
201willfully and fraudulently uses personal identification
202information of that individual commits a felony of the second
203degree, punishable as provided in s. 775.082, s. 775.083, or s.
204775.084.
205     (8)(a)  Any person who willfully and fraudulently uses, or
206possesses with intent to fraudulently use, personal
207identification information concerning a deceased individual
208commits the offense of fraudulent use or possession with intent
209to use personal identification information of a deceased
210individual, a felony of the third degree, punishable as provided
211in s. 775.082, s. 775.083, or s. 775.084.
212     (b)  Any person who willfully and fraudulently uses
213personal identification information concerning a deceased
214individual commits a felony of the second degree, punishable as
215provided in s. 775.082, s. 775.083, or s. 775.084, if the
216pecuniary benefit, the value of the services received, the
217payment sought to be avoided, or the amount of injury or fraud
218perpetrated is $5,000 or more, or if the person fraudulently
219uses the personal identification information of 10 or more but
220fewer than 20 deceased individuals. Notwithstanding any other
221provision of law, the court shall sentence any person convicted
222of committing the offense described in this paragraph to a
223mandatory minimum sentence of 3 years' imprisonment.
224     (c)  Any person who willfully and fraudulently uses
225personal identification information concerning a deceased
226individual commits the offense of aggravated fraudulent use of
227the personal identification information of multiple deceased
228individuals, a felony of the first degree, punishable as
229provided in s. 775.082, s. 775.083, or s. 775.084, if the
230pecuniary benefit, the value of the services received, the
231payment sought to be avoided, or the amount of injury or fraud
232perpetrated is $50,000 or more, or if the person fraudulently
233uses the personal identification information of 20 or more but
234fewer than 30 deceased individuals. Notwithstanding any other
235provision of law, the court shall sentence any person convicted
236of the offense described in this paragraph to a minimum
237mandatory sentence of 5 years' imprisonment. If the pecuniary
238benefit, the value of the services received, the payment sought
239to be avoided, or the amount of the injury or fraud perpetrated
240is $100,000 or more, or if the person fraudulently uses the
241personal identification information of 30 or more deceased
242individuals, notwithstanding any other provision of law, the
243court shall sentence any person convicted of an offense
244described in this paragraph to a mandatory minimum sentence of
24510 years' imprisonment.
246     (9)  Any person who willfully and fraudulently creates or
247uses, or possesses with intent to fraudulently use, counterfeit
248or fictitious personal identification information concerning a
249fictitious individual, or concerning a real individual without
250first obtaining that real individual's consent, with intent to
251use such counterfeit or fictitious personal identification
252information for the purpose of committing or facilitating the
253commission of a fraud on another person, commits the offense of
254fraudulent creation or use, or possession with intent to
255fraudulently use, counterfeit or fictitious personal
256identification information, a felony of the third degree,
257punishable as provided in s. 775.082, s. 775.083, or s. 775.084.
258     (10)  Any person who commits an offense described in this
259section and for the purpose of obtaining or using personal
260identification information misrepresents himself or herself to
261be a law enforcement officer; an employee or representative of a
262bank, credit card company, credit counseling company, or credit
263reporting agency; or any person who wrongfully represents that
264he or she is seeking to assist the victim with a problem with
265the victim's credit history shall have the offense reclassified
266as follows:
267     (a)  In the case of a misdemeanor, the offense is
268reclassified as a felony of the third degree.
269     (b)  In the case of a felony of the third degree, the
270offense is reclassified as a felony of the second degree.
271     (c)  In the case of a felony of the second degree, the
272offense is reclassified as a felony of the first degree.
273     (d)  In the case of a felony of the first degree or a
274felony of the first degree punishable by a term of imprisonment
275not exceeding life, the offense is reclassified as a life
276felony.
277
278For purposes of sentencing under chapter 921, a felony offense
279that is reclassified under this subsection is ranked one level
280above the ranking under s. 921.0022 or s. 921.0023 of the felony
281offense committed, and a misdemeanor offense that is
282reclassified under this subsection is ranked in level 2 of the
283offense severity ranking chart.
284     (11)  The prosecutor may move the sentencing court to
285reduce or suspend the sentence of any person who is convicted of
286a violation of this section and who provides substantial
287assistance in the identification, arrest, or conviction of any
288of that person's accomplices, accessories, coconspirators, or
289principals or of any other person engaged in fraudulent
290possession or use of personal identification information. The
291arresting agency shall be given an opportunity to be heard in
292aggravation or mitigation in reference to any such motion. Upon
293good cause shown, the motion may be filed and heard in camera.
294The judge hearing the motion may reduce or suspend the sentence
295if the judge finds that the defendant rendered such substantial
296assistance.
297     (12)(8)  This section does not prohibit any lawfully
298authorized investigative, protective, or intelligence activity
299of a law enforcement agency of this state or any of its
300political subdivisions, of any other state or its political
301subdivisions, or of the Federal Government or its political
302subdivisions.
303     (13)(9)(a)  In sentencing a defendant convicted of an
304offense under this section, the court may order that the
305defendant make restitution under pursuant to s. 775.089 to any
306victim of the offense. In addition to the victim's out-of-pocket
307costs, such restitution may include payment of any other costs,
308including attorney's fees incurred by the victim in clearing the
309victim's credit history or credit rating, or any costs incurred
310in connection with any civil or administrative proceeding to
311satisfy any debt, lien, or other obligation of the victim
312arising as the result of the actions of the defendant.
313     (b)  The sentencing court may issue such orders as are
314necessary to correct any public record that contains false
315information given in violation of this section.
316     (14)(10)  Prosecutions for violations of this section may
317be brought on behalf of the state by any state attorney or by
318the statewide prosecutor.
319     (15)(11)  The Legislature finds that, in the absence of
320evidence to the contrary, the location where a victim gives or
321fails to give consent to the use of personal identification
322information is the county where the victim generally resides.
323     (16)(12)  Notwithstanding any other provision of law, venue
324for the prosecution and trial of violations of this section may
325be commenced and maintained in any county in which an element of
326the offense occurred, including the county where the victim
327generally resides.
328     (17)(13)  A prosecution of an offense prohibited under
329subsection (2), subsection (6), or subsection (7) must be
330commenced within 3 years after the offense occurred. However, a
331prosecution may be commenced within 1 year after discovery of
332the offense by an aggrieved party, or by a person who has a
333legal duty to represent the aggrieved party and who is not a
334party to the offense, if such prosecution is commenced within 5
335years after the violation occurred.
336     Section 2.  Section 817.5681, Florida Statutes, is created
337to read:
338     817.5681  Breach of security concerning confidential
339personal information in third-party possession; administrative
340penalties.--
341     (1)(a)  Any person who conducts business in this state and
342maintains computerized data in a system that includes personal
343information shall provide notice of any breach of the security
344of the system, following a determination of the breach, to any
345resident of this state whose unencrypted personal information
346was, or is reasonably believed to have been, acquired by an
347unauthorized person. The notification shall be made without
348unreasonable delay, consistent with the legitimate needs of law
349enforcement, as provided in subsection (3) and paragraph
350(10)(a), or subject to any measures necessary to determine the
351presence, nature, and scope of the breach and restore the
352reasonable integrity of the system. Notification must be made no
353later than 45 days following the determination of the breach
354unless otherwise provided in this section.
355     (b)  Any person required to make notification under
356paragraph (a) who fails to do so within 45 days following the
357determination of a breach or receipt of notice from law
358enforcement as provided in subsection (3) is liable for an
359administrative fine not to exceed $500,000, as follows:
360     1.  In the amount of $1,000 for each day the breach goes
361undisclosed for up to 30 days and, thereafter, $50,000 for each
36230-day period or portion thereof for up to 180 days.
363     2.  If notification is not made within 180 days, any person
364required to make notification under paragraph (a) who fails to
365do so is subject to an administrative fine of up to $500,000.
366     (c)  The administrative sanctions for failure to notify
367provided in this subsection shall not apply in the case of
368personal information in the custody of any governmental agency
369or subdivision, unless that governmental agency or subdivision
370has entered into a contract with a contractor or third-party
371administrator to provide governmental services. In such case,
372the contractor or third-party administrator shall be a person to
373whom the administrative sanctions provided in this subsection
374would apply, although such contractor or third-party
375administrator found in violation of the notification
376requirements provided in this subsection would not have an
377action for contribution or set-off available against the
378employing agency or subdivision.
379     (2)(a)  Any person who maintains computerized data that
380includes personal information on behalf of another business
381entity shall disclose to the business entity for which the
382information is maintained any breach of the security of the
383system as soon as practicable, but no later than 10 days
384following the determination, if the personal information was, or
385is reasonably believed to have been, acquired by an unauthorized
386person. The person who maintains the data on behalf of another
387business entity and the business entity on whose behalf the data
388is maintained may agree who will provide the notice, if any is
389required, as provided in paragraph (1)(a), provided only a
390single notice for each breach of the security of the system
391shall be required. If agreement regarding notification cannot be
392reached, the person who has the direct business relationship
393with the resident of this state shall be subject to the
394provisions of paragraph (1)(a).
395     (b)  Any person required to disclose to a business entity
396under paragraph (a) who fails to do so within 10 days after the
397determination of a breach or receipt of notification from law
398enforcement as provided in subsection (3) is liable for an
399administrative fine not to exceed $500,000, as follows:
400     1.  In the amount of $1,000 for each day the breach goes
401undisclosed for up to 30 days and, thereafter, $50,000 for each
40230-day period or portion thereof for up to 180 days.
403     2.  If disclosure is not made within 180 days, any person
404required to make disclosures under paragraph (a) who fails to do
405so is subject to an administrative fine of up to $500,000.
406     (c)  The administrative sanctions for nondisclosure
407provided in this subsection shall not apply in the case of
408personal information in the custody of any governmental agency
409or subdivision unless that governmental agency or subdivision
410has entered into a contract with a contractor or third-party
411administrator to provide governmental services. In such case,
412the contractor or third-party administrator shall be a person to
413whom the administrative sanctions provided in this subsection
414would apply, although such contractor or third-party
415administrator found in violation of the nondisclosure
416restrictions in this subsection would not have an action for
417contribution or set-off available against the employing agency
418or subdivision.
419     (3)  The notification required by this section may be
420delayed upon a request by law enforcement if a law enforcement
421agency determines that the notification will impede a criminal
422investigation. The notification time period required by this
423section shall commence after the person receives notice from the
424law enforcement agency that the notification will not compromise
425the investigation.
426     (4)  For purposes of this section, the terms "breach" and
427"breach of the security of the system" mean unlawful and
428unauthorized acquisition of computerized data that materially
429compromises the security, confidentiality, or integrity of
430personal information maintained by the person. Good faith
431acquisition of personal information by an employee or agent of
432the person is not a breach or breach of the security of the
433system, provided the information is not used for a purpose
434unrelated to the business or subject to further unauthorized
435use.
436     (5)  For purposes of this section, the term "personal
437information" means an individual's first name, first initial and
438last name, or any middle name and last name, in combination with
439any one or more of the following data elements when the data
440elements are not encrypted:
441     (a)  Social security number.
442     (b)  Driver's license number or Florida Identification Card
443number.
444     (c)  Account number, credit card number, or debit card
445number, in combination with any required security code, access
446code, or password that would permit access to an individual's
447financial account.
448
449For purposes of this section, the term "personal information"
450does not include publicly available information that is lawfully
451made available to the general public from federal, state, or
452local government records or widely distributed media.
453     (6)  For purposes of this section, notice may be provided
454by one of the following methods:
455     (a)  Written notice;
456     (b)  Electronic notice, if the notice provided is
457consistent with the provisions regarding electronic records and
458signatures set forth in 15 U.S.C. s. 7001; or
459     (c)  Substitute notice, if the person demonstrates that the
460cost of providing notice would exceed $250,000, the affected
461class of subject persons to be notified exceeds 500,000, or the
462person does not have sufficient contact information. Substitute
463notice shall consist of all of the following:
464     1.  Electronic mail or email notice when the person has an
465electronic mail or email address for the subject persons.
466     2.  Conspicuous posting of the notice on the web page of
467the person, if the person maintains a web page.
468     3.  Notification to major statewide media.
469     (7)  For purposes of this section, the term "unauthorized
470person" means any person who does not have permission from, or a
471password issued by, the person who stores the computerized data
472to acquire such data, but does not include any individual to
473whom the personal information pertains.
474     (8)  For purposes of this section, the term "person" means
475a person as defined in s. 1.01(3). For purposes of this section,
476the State of Florida, as well as any of its agencies or
477political subdivisions, and any of the agencies of its political
478subdivisions, constitutes a person.
479     (9)  Notwithstanding subsection (6), a person who
480maintains:
481     (a)  The person's own notification procedures as part of an
482information security or privacy policy for the treatment of
483personal information, which procedures are otherwise consistent
484with the timing requirements of this part; or
485     (b)  A notification procedure pursuant to the rules,
486regulations, procedures, or guidelines established by the
487person's primary or functional federal regulator,
488
489shall be deemed to be in compliance with the notification
490requirements of this section if the person notifies subject
491persons in accordance with the person's policies or the rules,
492regulations, procedures, or guidelines established by the
493primary or functional federal regulator in the event of a breach
494of security of the system.
495     (10)(a)  Notwithstanding subsection (2), notification is
496not required if, after an appropriate investigation and after
497consultation with relevant federal, state, and local agencies
498responsible for law enforcement, the person reasonably
499determines that the breach has not and will not likely result in
500harm to the individuals whose personal information has been
501acquired and accessed. Such a determination must be documented
502in writing and the documentation must be maintained for 5 years.
503     (b)  Any person required to document a failure to notify
504affected persons who fails to document the failure as required
505in this subsection or who, if documentation was created, fails
506to maintain the documentation for the full 5 years as required
507in this subsection is liable for an administrative fine in the
508amount of up to $50,000 for such failure.
509     (c)  The administrative sanctions outlined in this
510subsection shall not apply in the case of personal information
511in the custody of any governmental agency or subdivision, unless
512that governmental agency or subdivision has entered into a
513contract with a contractor or third-party administrator to
514provide governmental services. In such case the contractor or
515third-party administrator shall be a person to whom the
516administrative sanctions outlined in this subsection would
517apply, although such contractor or third-party administrator
518found in violation of the documentation and maintenance of
519documentation requirements in this subsection would not have an
520action for contribution or set-off available against the
521employing agency or subdivision.
522     (11)  The Department of Legal Affairs may institute
523proceedings to assess and collect the fines provided in this
524section.
525     Section 3.  This act shall take effect July 1, 2005.


CODING: Words stricken are deletions; words underlined are additions.