Vermont Attorney General Provides Guidance on Security Breach Notice Act

Jul 27, 2020

Reading Time : 2 min

By: Natasha G. Kohne, Rebecca Kocsis (Legal Project Analyst)

The AG’s guidance notes that it is not directed to entities regulated by the Vermont Department of Financial Regulation (DFR) (the Act mandates that data collectors report security breaches not only to affected consumers, but also to the AG or DFR, depending on whether they are regulated by the DFR or not). However, the guidance still provides helpful interpretations and applications of the Act that, while not legal advice, may shed light into how data collectors may best comply with the Act to avoid enforcement actions.

The guidance is organized as a set of helpful FAQ questions to assist data collectors determine if they are subject to the Act and provides a quick-reference guide for what to do if you are a business or state agency that has suffered (or suspects to have suffered) a data security breach. However, these steps should be viewed with caution, as they are written from the perspective of complying with the Act to avoid an AG enforcement action, and not necessarily to avoid civil litigation from consumers, vendors or even employees. Thus, data controllers should consult with outside counsel in the early stages of investigating a breach to ensure that proper protections are in place to minimize the risk of litigation and protect attorney-client communications.

Some of the most important takeaways from the guidance include real-world examples for determining what constitutes “personally identifiable information” (PII) under the recently amended Act, which included a substantive expansion to the definition of PII, whether a security breach has occurred and other key considerations. For example, in explaining the 45-day time limit to notify consumers of a breach, which starts when the data controller “discovers or is notified” of a breach, the AG provides numerous examples of scenarios that could start the notification clock. Importantly, the guidance explicitly provides that the “discovery date is not the date that an investigation is completed, it is the earliest date that an entity became aware of, or had a reasonable belief of, unauthorized activity.”1 Data controllers should thus have adequate policies and procedures in place to swiftly detect and report indicators of compromise or respond to external notifications of a potential breach.

We recommend that data collectors review the guidance in detail—whether or not they are located in Vermont—to become familiar with the Act’s strict requirements and the most common violations as noted by the AG. If you have any questions about your company’s obligations and compliance efforts, please contact a member of the Akin Gump Cybersecurity, Privacy and Data Protection team.


1 This point is reemphasized in another discussion of the deadlines, in which the AG notes “The 45-day outer limit incorporates the time it will take to conduct an investigation – it does not begin after the investigation is completed.”

Share This Insight

Previous Entries

Data Dive

March 3, 2025

On January 16, 2025, the Federal Trade Commission (FTC) issued a Final Rule updating the Children’s Online Privacy Protection (COPPA) Rule, significantly expanding compliance obligations for online services that collect, use, or disclose personal information from children under 13.1 The amendments impose new restrictions on targeted advertising, add data security requirements, refine parental consent mechanisms, and introduce additional compliance measures.

...

Read More

Data Dive

February 21, 2025

On January 8, 2025, the DOJ published a final rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

January 22, 2025

On January 17, 2025, days before the inauguration, former President Joe Biden issued an executive order titled Strengthening and Promoting Innovation in the Nation's Cybersecurity (EO 14144). Building on previous efforts, including Executive Order 14028, this directive seeks to bolster cybersecurity across federal systems, supply chains and critical infrastructure from adversarial nations, particularly from the People’s Republic of China (PRC).

...

Read More

Data Dive

January 10, 2025

UPDATE: The California Privacy Protection Agency (CPPA) has extended the deadline for submitting public comments from January 14 to February 19, 2025, in response to the recent California wildfires. This extension aims to afford stakeholders additional time to provide comprehensive and detailed feedback, considering the significant challenges posed by the wildfires.

...

Read More

Data Dive

November 25, 2024

Treasury has issued a Final Rule to implement President Biden’s 2023 EO targeting U.S. investments in Chinese companies engaged in certain activities related to semiconductors, quantum computing or AI.

...

Read More

Data Dive

November 19, 2024

The European Union’s AI Office published the inaugural General-Purpose AI Code of Practice on November 14, 2024. The Code is intended to assist providers of AI models in their preparations for compliance with the forthcoming EU AI Act, to be enforced from August 2, 2025. The Code is designed to be both forward-thinking and globally applicable, addressing the areas of transparency, risk evaluation, technical safeguards and governance. While adherence to the Code is not mandatory, it is anticipated to serve as a means of demonstrating compliance with the obligations under the EU AI Act. Following a consultation period that garnered approximately 430 responses, the AI Office will be empowered to apply these rules, with penalties for nonconformity potentially reaching 3% of worldwide turnover or €15 million. Three additional iterations of the Code are anticipated to be produced within the coming five months.

...

Read More

Data Dive

November 15, 2024

On October 29, 2024, the DOJ issued a proposed rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

October 17, 2024

During the course of any lending transaction, lenders will conduct a due diligence review of the borrower, including reviewing any relevant “know-your-customer” information.

...

Read More

© 2025 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.