Massachusetts has enacted data privacy and data security regulations that will make it eke out California for the most wide ranging state privacy and security laws\u2014laws that are likely to impact the policies, practices, procedures, contracts and training used by companies nationwide. The Massachusetts Office of Consumer Affairs and Business Regulation determined that there was a significant need for set of comprehensive standards that ensure businesses are taking practical steps to safeguard personal information. While many of these practices are probably adopted by most companies in some way, shape or form\u2014now a laundry list of minimum standards will be required. And, since it may be impractical for a company to treat information collected from Massachusetts residents differently than others\u2014many companies across the country will need to look holistically at their data privacy and security programs across the country to make sure that they meet the requirements of Massachusetts standards. Beginning on January 1, 2009, all businesses that collect personal data from or about Massachusetts residents will need to adopt a comprehensive written security program, conduct internal and external security reviews and complete employee training regarding their programs. While the efficacy of a security program will be determined based on the relative size of a company and the type and amount of data a company maintains, the standards clearly state that a security program needs to contain, at a minimum:\n \nDesignate one or more employees to maintain the security program. \nIdentify and assess the internal and external risks to the security, confidentiality, and\/or integrity of any electronic, paper or other records containing personal information. \nEvaluate current safeguards and means for detecting and preventing security system failures. \nImplement and evaluate ongoing employee training (which must include temporary and contract employees) . \nImplement and evaluate employee compliance with policies and procedures. \nDevelop security policies that set forth whether and how employees should be allowed to keep, access, and transport records containing personal information outside of business premises. \nDiscipline employees for violating program rules. \nPrevent terminated employees from accessing records containing personal information by immediately terminating access. \nTake reasonable steps to verify that third-party service providers with access to personal information have the capacity to protect such personal information, including: \n\nSelecting and retaining service providers that are capable of maintaining safeguards for personal information (i.e., conducting due diligence) \nContractually requiring service providers to maintain a security program that complies with the Standards \nLimiting the amount of personal information collected to that reasonably necessary to accomplish the legitimate purpose for which it is collected; limiting the time such information is retained to that reasonably necessary to accomplish such purpose; and limiting access to those persons who are reasonably required to know such information in order to accomplish such purpose or to comply with legal requirements\nRequire an audit\/inventory to identify paper, electronic and other records, computing systems, and storage media, including laptops and portable devices used to store personal information, to determine which records contain personal information, unless the security program provides for the handling of all records as if they all contained personal information. \nImplement reasonable restrictions upon physical access to records containing personal information, including a written procedure that sets forth the manner in which physical access to such records is restricted; and storage of such records and data in locked facilities, storage areas, or containers. \nRegularly monitor to ensure that the security program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personal information; and upgrade information safeguards as necessary to limit risks. \nReview the scope of the security measures on at least an annual basis or whenever there is a material change in business practices that may reasonably implicate the security or integrity of records containing personal information. \nDocument incident responses involving a breach of security, and changes in business practices resulting from the incidents. The standards also provide the following minimum technical requirements for computer systems that electronically store or transmit personal information regarding Massachusetts residents:\nSecure user authentication protocols including:\n\nControl user IDs and other identifiers. \nProvide a reasonably secure method of assigning and selecting passwords (or use an alternative authentication technology such as biometrics or token devices) . \nControl data security passwords to ensure that such passwords are kept in a location and\/or format that does not compromise the security of the data they protect. \nRestrict access to active users and active user accounts only. \nBlock access to user identification after multiple unsuccessful attempts to gain access or the limitation placed on access for the particular system. \nSecure access control measures that:\nRestrict access to records and files containing personal information to those who need such information to perform their job duties.\nAssign unique identifications plus passwords, which are not vendor supplied default passwords, to each person with computer access, that are reasonably designed to maintain the integrity of the security of the access controls.\nEncrypt (to the extent technically feasible) all transmitted records and files containing personal information that will travel across public networks, and encryption of all data to be transmitted wirelessly.\nImplement reasonable monitoring of systems, for unauthorized use of or access to personal information.\nEncrypt all personal information stored on laptops or other portable devices.\nProvide reasonably up-to-date firewall protection and operating system security patches for files containing personal information on a system that is connected to the Internet, designed to maintain the integrity of the personal information.\nProvide reasonably up-to-date versions of system security agent software, which must include malware protection and reasonably up-to-date patches and virus definitions, or a version of such software that can still be supported with up-to-date patches and virus definitions, and is set to receive the most current security updates on a regular basis.\nEducate and train employees on the proper use of the computer security system and the importance of personal information security.\nBart Lazar is a partner in the Chicago office of Seyfarth Shaw LLP. He assists clients in creating, commercializing and enforcing intellectual property rights, and counseling and litigation in intellectual property, privacy, advertising, promotion and related matters.