SB-0223, As Passed House, December 3, 2010
HOUSE SUBSTITUTE FOR
SENATE BILL NO. 223
A bill to amend 2004 PA 452, entitled
"Identity theft protection act,"
by amending sections 9, 11, 12, and 12b (MCL 445.69, 445.71,
445.72, and 445.72b), sections 12 and 12b as added by 2006 PA 566,
and by adding section 19.
THE PEOPLE OF THE STATE OF MICHIGAN ENACT:
Sec. 9. (1) Subject to subsection (6), a person who violates
section 5 or 7 is guilty of a felony punishable as follows:
(a) Except as otherwise provided in subdivisions (b) and (c),
by imprisonment for not more than 5 years or a fine of not more
than $25,000.00, or both.
(b) If the violation is a second violation of section 5 or 7,
by imprisonment for not more than 10 years or a fine of not more
than $50,000.00, or both.
(c) If the violation is a third or subsequent violation of
section 5 or 7, by imprisonment for not more than 15 years or a
fine of not more than $75,000.00, or both.
(2) Sections 5 and 7 apply whether an individual who is a
victim or intended victim of a violation of 1 of those sections is
alive or deceased at the time of the violation.
(3) This section does not prohibit a person from being charged
with, convicted of, or sentenced for any other violation of law
committed by that person using information obtained in violation of
this section or any other violation of law committed by that person
while violating or attempting to violate this section.
(4) The court may order that a term of imprisonment imposed
under this section be served consecutively to any term of
imprisonment imposed for a conviction of any other violation of law
committed by that person using the information obtained in
violation of this section or any other violation of law committed
by that person while violating or attempting to violate this
section.
(5) A person may assert as a defense in a civil action or as
an affirmative defense in a criminal prosecution for a violation of
section 5 or 7, and has the burden of proof on that defense by a
preponderance of the evidence, that the person lawfully
transferred, obtained, or attempted to obtain personal identifying
information of another person for the purpose of detecting,
preventing, or deterring identity theft or another crime or the
funding of a criminal activity.
(6) Subsection (1) does not apply to a violation of a statute
or rule administered by a regulatory board, commission, or officer
acting under authority of this state or the United States that
confers primary jurisdiction on that regulatory board, commission,
or officer to authorize, prohibit, or regulate the transactions and
conduct of that person, including, but not limited to, a state or
federal statute or rule governing a financial institution and the
insurance code of 1956, 1956 PA 218, MCL 500.100 to 500.8302, if
the act is committed by a person subject to and regulated by that
statute or rule, or by another person who has contracted with that
person to use personal identifying information.
Sec. 11. (1) A person shall not do any of the following in the
conduct of trade or commerce:
(a) Deny credit or public utility service to or reduce the
credit limit of a consumer solely because the consumer was a victim
of identity theft, if the person had prior knowledge that the
consumer was a victim of identity theft. A consumer is presumed to
be a victim of identity theft for the purposes of this subdivision
if he or she provides both of the following to the person:
(i) A copy of a police report evidencing the claim of the
victim of identity theft.
(ii) Either a properly completed copy of a standardized
affidavit of identity theft developed and made available by the
federal
trade commission pursuant to under 15 USC 1681g or an
affidavit of fact that is acceptable to the person for that
purpose.
(b) Solicit to extend credit to a consumer who does not have
an existing line of credit, or has not had or applied for a line of
credit within the preceding year, through the use of an unsolicited
check that includes personal identifying information other than the
recipient's name, address, and a partial, encoded, or truncated
personal identifying number. In addition to any other penalty or
remedy under this act or the Michigan consumer protection act, 1976
PA 331, MCL 445.901 to 445.922, a credit card issuer, financial
institution, or other lender that violates this subdivision, and
not the consumer, is liable for the amount of the instrument if the
instrument is used by an unauthorized user and for any fees
assessed to the consumer if the instrument is dishonored.
(c) Solicit to extend credit to a consumer who does not have a
current credit card, or has not had or applied for a credit card
within the preceding year, through the use of an unsolicited credit
card sent to the consumer. In addition to any other penalty or
remedy under this act or the Michigan consumer protection act, 1976
PA 331, MCL 445.901 to 445.922, a credit card issuer, financial
institution, or other lender that violates this subdivision, and
not the consumer, is liable for any charges if the credit card is
used by an unauthorized user and for any interest or finance
charges assessed to the consumer.
(d) Extend credit to a consumer without exercising reasonable
procedures to verify the identity of that consumer. Compliance with
regulations issued for depository institutions, and to be issued
for other financial institutions, by the United States department
of treasury under section 326 of the USA patriot act of 2001, 31
USC 5318, is considered compliance with this subdivision. This
subdivision does not apply to a purchase of a credit obligation in
an acquisition, merger, purchase of assets, or assumption of
liabilities or any change to or review of an existing credit
account.
(2) A person who knowingly or intentionally violates
subsection (1) is guilty of a misdemeanor punishable as follows:
(a) Except as otherwise provided in subdivisions (b) and (c),
by
imprisonment for not more than 30 93 days or a fine of not
more
than
$1,000.00, or both. This subsection
(b) For a second violation, by imprisonment for not more than
93 days or a fine of not more than $2,000.00, or both.
(c) For a third or subsequent violation, by imprisonment for
not more than 93 days or a fine of not more than $3,000.00, or
both.
(3)
Subsection (2) does not affect the
availability of
prohibit a person from being liable for any civil remedy for a
violation of this act, the Michigan consumer protection act, 1976
PA 331, MCL 445.901 to 445.922, or any other state or federal law.
Sec. 12. (1) Unless the person or agency determines that the
security breach has not or is not likely to cause substantial loss
or injury to, or result in identity theft with respect to, 1 or
more residents of this state, a person or agency that owns or
licenses data that are included in a database that discovers a
security breach, or receives notice of a security breach under
subsection (2), shall provide a notice of the security breach to
each resident of this state who meets 1 or more of the following:
(a) That resident's unencrypted and unredacted personal
information was accessed and acquired by an unauthorized person.
(b) That resident's personal information was accessed and
acquired in encrypted form by a person with unauthorized access to
the encryption key.
(2) Unless the person or agency determines that the security
breach has not or is not likely to cause substantial loss or injury
to, or result in identity theft with respect to, 1 or more
residents of this state, a person or agency that maintains a
database that includes data that the person or agency does not own
or license that discovers a breach of the security of the database
shall provide a notice to the owner or licensor of the information
of the security breach.
(3) In determining whether a security breach is not likely to
cause substantial loss or injury to, or result in identity theft
with respect to, 1 or more residents of this state under subsection
(1) or (2), a person or agency shall act with the care an
ordinarily prudent person or agency in like position would exercise
under similar circumstances.
(4) A person or agency shall provide any notice required under
this section without unreasonable delay. A person or agency may
delay providing notice without violating this subsection if either
of the following is met:
(a) A delay is necessary in order for the person or agency to
take any measures necessary to determine the scope of the security
breach and restore the reasonable integrity of the database.
However, the agency or person shall provide the notice required
under this subsection without unreasonable delay after the person
or agency completes the measures necessary to determine the scope
of the security breach and restore the reasonable integrity of the
database.
(b) A law enforcement agency determines and advises the agency
or person that providing a notice will impede a criminal or civil
investigation or jeopardize homeland or national security. However,
the agency or person shall provide the notice required under this
section without unreasonable delay after the law enforcement agency
determines that providing the notice will no longer impede the
investigation or jeopardize homeland or national security.
(5) Except as provided in subsection (11), an agency or person
shall provide any notice required under this section by providing 1
or more of the following to the recipient:
(a) Written notice sent to the recipient at the recipient's
postal address in the records of the agency or person.
(b) Written notice sent electronically to the recipient if any
of the following are met:
(i) The recipient has expressly consented to receive electronic
notice.
(ii) The person or agency has an existing business relationship
with the recipient that includes periodic electronic mail
communications and based on those communications the person or
agency reasonably believes that it has the recipient's current
electronic mail address.
(iii) The person or agency conducts its business primarily
through internet account transactions or on the internet.
(c) If not otherwise prohibited by state or federal law,
notice given by telephone by an individual who represents the
person or agency if all of the following are met:
(i) The notice is not given in whole or in part by use of a
recorded message.
(ii) The recipient has expressly consented to receive notice by
telephone, or if the recipient has not expressly consented to
receive notice by telephone, the person or agency also provides
notice under subdivision (a) or (b) if the notice by telephone does
not result in a live conversation between the individual
representing the person or agency and the recipient within 3
business days after the initial attempt to provide telephonic
notice.
(d) Substitute notice, if the person or agency demonstrates
that the cost of providing notice under subdivision (a), (b), or
(c) will exceed $250,000.00 or that the person or agency has to
provide notice to more than 500,000 residents of this state. A
person or agency provides substitute notice under this subdivision
by doing all of the following:
(i) If the person or agency has electronic mail addresses for
any of the residents of this state who are entitled to receive the
notice, providing electronic notice to those residents.
(ii) If the person or agency maintains a website, conspicuously
posting the notice on that website.
(iii) Notifying major statewide media. A notification under this
subparagraph shall include a telephone number or a website address
that a person may use to obtain additional assistance and
information.
(6)
A notice under this section shall meet do all of the
following:
(a) For a notice provided under subsection (5)(a) or (b), be
written in a clear and conspicuous manner and contain the content
required under subdivisions (c) to (g).
(b) For a notice provided under subsection (5)(c), clearly
communicate the content required under subdivisions (c) to (g) to
the recipient of the telephone call.
(c) Describe the security breach in general terms.
(d) Describe the type of personal information that is the
subject of the unauthorized access or use.
(e) If applicable, generally describe what the agency or
person providing the notice has done to protect data from further
security breaches.
(f) Include a telephone number where a notice recipient may
obtain assistance or additional information.
(g) Remind notice recipients of the need to remain vigilant
for incidents of fraud and identity theft.
(7) A person or agency may provide any notice required under
this section pursuant to an agreement between that person or agency
and another person or agency, if the notice provided pursuant to
the agreement does not conflict with any provision of this section.
(8) Except as provided in this subsection, after a person or
agency provides a notice under this section, the person or agency
shall notify each consumer reporting agency that compiles and
maintains files on consumers on a nationwide basis, as defined in
15 USC 1681a(p), of the security breach without unreasonable delay.
A notification under this subsection shall include the number of
notices that the person or agency provided to residents of this
state and the timing of those notices. This subsection does not
apply if either of the following is met:
(a) The person or agency is required under this section to
provide notice of a security breach to 1,000 or fewer residents of
this state.
(b)
The person or agency is subject to title V of the Gramm-
Leach-Bliley
act, 15 USC 6801 to 6809.
(9) A financial institution that is subject to, and has
notification procedures in place that are subject to examination by
the financial institution's appropriate regulator for compliance
with, the interagency guidance on response programs for
unauthorized access to customer information and customer notice
prescribed by the board of governors of the federal reserve system
and the other federal bank and thrift regulatory agencies, or
similar guidance prescribed and adopted by the national credit
union administration, and its affiliates, is considered to be in
compliance with this section.
(10) A person or agency that is subject to and complies with
the health insurance portability and accountability act of 1996,
Public Law 104-191, and with regulations promulgated under that
act, 45 CFR parts 160 and 164, for the prevention of unauthorized
access to customer information and customer notice is considered to
be in compliance with this section.
(11) A public utility that sends monthly billing or account
statements to the postal address of its customers may provide
notice of a security breach to its customers in the manner
described in subsection (5), or alternatively by providing all of
the following:
(a) As applicable, notice as described in subsection (5)(b).
(b) Notification to the media reasonably calculated to inform
the customers of the public utility of the security breach.
(c) Conspicuous posting of the notice of the security breach
on the website of the public utility.
(d) Written notice sent in conjunction with the monthly
billing or account statement to the customer at the customer's
postal address in the records of the public utility.
(12) A person that provides notice of a security breach in the
manner described in this section when a security breach has not
occurred, with the intent to defraud, is guilty of a misdemeanor
punishable as follows:
(a) Except as otherwise provided under subdivisions (b) and
(c),
by imprisonment for not more than 30
93 days or a fine of not
more than $250.00 for each violation, or both.
(b) For a second violation, by imprisonment for not more than
93 days or a fine of not more than $500.00 for each violation, or
both.
(c) For a third or subsequent violation, by imprisonment for
not more than 93 days or a fine of not more than $750.00 for each
violation, or both.
(13) Subject to subsection (14), a person that knowingly fails
to provide any notice of a security breach required under this
section may be ordered to pay a civil fine of not more than $250.00
for each failure to provide notice. The attorney general or a
prosecuting attorney may bring an action to recover a civil fine
under this section.
(14) The aggregate liability of a person for civil fines under
subsection (13) for multiple violations of subsection (13) that
arise from the same security breach shall not exceed $750,000.00.
(15) Subsections (12) and (13) do not affect the availability
of any civil remedy for a violation of state or federal law.
(16) This section applies to the discovery or notification of
a
breach of the security of a database that occurs on or after the
effective
date of the amendatory act that added this section July
2, 2006.
(17) This section does not apply to the access or acquisition
by a person or agency of federal, state, or local government
records or documents lawfully made available to the general public.
(18) This section deals with subject matter that is of
statewide concern, and any charter, ordinance, resolution,
regulation, rule, or other action by a municipal corporation or
other political subdivision of this state to regulate, directly or
indirectly, any matter expressly set forth in this section is
preempted.
Sec. 12b. (1) A person shall not distribute an advertisement
or make any other solicitation that misrepresents to the recipient
that a security breach has occurred that may affect the recipient.
(2) A person shall not distribute an advertisement or make any
other solicitation that is substantially similar to a notice
required under section 12(5) or by federal law, if the form of that
notice is prescribed by state or federal law, rule, or regulation.
(3) A person who knowingly or intentionally violates this
section is guilty of a misdemeanor punishable as follows:
(a) Except as otherwise provided in subdivisions (b) and (c),
by
imprisonment for not more than 30 93 days or a fine of not
more
than
$1,000.00 for each violation, or both. This subsection
(b) For a second violation, by imprisonment for not more than
93 days or a fine of not more than $2,000.00 for each violation, or
both.
(c) For a third or subsequent violation, by imprisonment for
not more than 93 days or a fine of not more than $3,000.00 for each
violation, or both.
(4) Subsection (3) does not affect the availability of any
civil remedy for a violation of this section or any other state or
federal law.
Sec. 19. (1) Except as provided in subsection (2), the
following property is subject to forfeiture:
(a) Any personal or real property that has been used,
possessed, or acquired in a felony violation of this act.
(b) Except as provided in subparagraphs (i) to (iii), a
conveyance, including an aircraft, vehicle, or vessel, used or
intended for use to transport, or in any manner to facilitate the
transportation of, for the purpose of sale or receipt, property
described in subdivision (a):
(i) A conveyance used by a person as a common carrier in the
transaction of business as a common carrier is not subject to
forfeiture unless it is determined that the owner or other person
in charge of the conveyance is a consenting party or privy to a
violation of this act.
(ii) A conveyance is not subject to forfeiture by reason of any
act or omission established by the owner of that conveyance to have
been committed or omitted without the owner's knowledge or consent.
(iii) A forfeiture of a conveyance encumbered by a bona fide
security interest is subject to the interest of the secured party
who neither had knowledge of nor consented to the act or omission.
(c) Books, records, computers, electronic equipment, and
research products and materials, including microfilm, digital
media, tapes, and data, used or intended for use in violation of
this act.
(d) Any money, negotiable instruments, securities, or any
other thing of value that is found in close proximity to any
property that is subject to forfeiture under subdivision (a), (b),
or (c) is presumed to be subject to forfeiture. This presumption
may be rebutted by clear and convincing evidence.
(2) Property used to commit a violation of this act is not
subject to forfeiture unless the owner of the property actively
participates in or consents to the violation of this act.
(3) Property of any of the following providers is not subject
to forfeiture under this act unless it is determined that the
provider is a consenting party or privy to a violation of this act:
(a) A telecommunication provider.
(b) An internet service provider.
(c) A computer network service provider.
(d) An interactive computer service provider.
Enacting section 1. This amendatory act takes effect April 1,
2011.
Enacting section 2. This amendatory act does not take effect
unless all of the following bills of the 95th Legislature are
enacted into law:
(a) Senate Bill No. 225.
(b) Senate Bill No. 226.
(c) House Bill No. 4325.