South Carolina Legislature


 

(Use of stop words in a search will not produce desired results.)
(For help with formatting search criteria, click here.)
business% found 1 time.    Next
H 3358
Session 120 (2013-2014)


H 3358 General Bill, By J.E. Smith

Similar(S 26) A BILL TO AMEND THE CODE OF LAWS OF SOUTH CAROLINA, 1976, BY ADDING SECTION 12-4-355 SO AS TO ESTABLISH IN THE STATE TREASURY THE DEPARTMENT OF REVENUE IDENTITY THEFT REIMBURSEMENT FUND, TO PROVIDE THAT PROCEEDS FROM THE FUND MUST BE USED TO REIMBURSE PEOPLE WHOSE PERSONALLY IDENTIFIABLE INFORMATION HAS BEEN OBTAINED BY A THIRD PARTY FROM A COMPROMISED COMPUTER SYSTEM MAINTAINED BY THE STATE OR A POLITICAL SUBDIVISION, AND TO DEFINE NECESSARY TERMS. 01/17/13 House Introduced and read first time (House Journal-page 8) 01/17/13 House Referred to Committee on Ways and Means (House Journal-page 8)


VERSIONS OF THIS BILL

1/17/2013



H. 3358

A BILL

TO AMEND THE CODE OF LAWS OF SOUTH CAROLINA, 1976, BY ADDING SECTION 12-4-355 SO AS TO ESTABLISH IN THE STATE TREASURY THE DEPARTMENT OF REVENUE IDENTITY THEFT REIMBURSEMENT FUND, TO PROVIDE THAT PROCEEDS FROM THE FUND MUST BE USED TO REIMBURSE PEOPLE WHOSE PERSONALLY IDENTIFIABLE INFORMATION HAS BEEN OBTAINED BY A THIRD PARTY FROM A COMPROMISED COMPUTER SYSTEM MAINTAINED BY THE STATE OR A POLITICAL SUBDIVISION, AND TO DEFINE NECESSARY TERMS.

Be it enacted by the General Assembly of the State of South Carolina:

SECTION    1.    Article 3, Chapter 4, Title 12 of the 1976 Code is amended by adding:

"Section 12-4-355.    (A)    For the purposes of this section:

(1)    'Eligible person' means a person whose personally identifiable information was obtained by a third party from a compromised computer system maintained by a state agency, board, committee, commission, public institution of higher learning, political subdivision, or other governmental or quasigovernmental entity.

(2)    'Eligible expenses' means the cost incurred by an eligible person related to purchasing and maintaining identity fraud and theft protection services, including, but not limited to, credit monitoring and alerts, identity theft insurance, and identity theft resolution services that are designed to detect, protect, and resolve potential identity theft and related matters.

(3)    'Person' means an individual, corporation, firm, association, joint venture, partnership, limited liability corporation, or any other business entity.

(4)    'Personally identifiable information' means information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual, including, but not limited to, social security numbers, debit card numbers, and credit card numbers.

(B)    There is established in the State Treasury the Department of Revenue Identity Theft Reimbursement Fund which must be maintained separately from the general fund of the State and all other funds. The proceeds of the fund must be utilized to reimburse eligible expenses incurred by an eligible person."

SECTION    2.    This act takes effect upon approval by the Governor.

----XX----




Legislative Services Agency
h t t p : / / w w w . s c s t a t e h o u s e . g o v