Codified Laws


Text Search


Enter the text to search for and click Search to get a list of statutes containing the text you entered. Tips:
  • Multiple words will be searched as a phrase. Entering Property Tax will return statutes that contain the complete phrase Property Tax.
  • Logical Operators are allowed. Hunting and Fishing will return statutes that containing both hunting and fishing. Hunting or Fishing will return statutes that contain hunting, fishing, or both.
  • Wild cards(*) are allowed. Entering Approp* will return statutes that contain Appropriation, Appropriate, Appropriated, etc..
  • Punctuation can also be used as operators. + = and, , = or. Searching for phrases that have , and will result in error unless you enclose the entire phrase in quotes.
The Filter option allows you to narrow your search results to a specific Title or Chapter. Here is a tip for using the filter option.
  • Use a dash (-) as the last character of your filter to refine searches. For example the filter "1-1" returns sections in 1-1, 1-10, 1-11, 1-12, etc. The filter "1-1-" returns only sections in Chapter 1-1.

Quick Find


Type the Statute number you are looking for in the form Title-Chapter-Section . Examples(1-1-1.1, 27A-11A-12, etc.)

The Get Statute button can be used to locate a specific statute. You may type in a title, chapter, or section number. Example: typing 1 will return the chapter list for Title 1, typing 1-1 will return the section list for chapter 1-1, typing 1-1-1 will return section 1-1-1 of the statutes.

The Get Chapter button can be used to load a complete chapter of the statutes. This function requires a title and a chapter number. Examples: 1-1, 57A-1, 1-3

 

22-40-19Definition of terms in §§ 22-40-19 to 22-40-26.

Terms in §§ 22-40-19 to 22-40-26, inclusive, mean:

(1)    "Breach of system security," the unauthorized acquisition of unencrypted computerized data or encrypted computerized data and the encryption key by any person that materially compromises the security, confidentiality, or integrity of personal or protected information maintained by the information holder. The term does not include the good faith acquisition of personal or protected information by an employee or agent of the information holder for the purposes of the information holder if the personal or protected information is not used or subject to further unauthorized disclosure;

(2)    "Encrypted," computerized data that is rendered unusable, unreadable, or indecipherable without the use of a decryption process or key or in accordance with the Federal Information Processing Standard 140-2 in effect on January 1, 2018;

(3)    "Information holder," any person or business that conducts business in this state, and that owns or licenses computerized personal or protected information of residents of this state;

(4)    "Personal information," a person's first name or first initial and last name, in combination with any one or more of the following data elements:

(a)    Social security number;

(b)    Driver license number or other unique identification number created or collected by a government body;

(c)    Account, credit card, or debit card number, in combination with any required security code, access code, password, routing number, PIN, or any additional information that would permit access to a person's financial account;

(d)    Health information as defined in 45 CFR 160.103; or

(e)    An identification number assigned to a person by the person's employer in combination with any required security code, access code, password, or biometric data generated from measurements or analysis of human body characteristics for authentication purposes.

The term does not include information that is lawfully made available to the general public from federal, state, or local government records or information that has been redacted, or otherwise made unusable; and

(5)    "Protected information," includes:

(a)    A user name or email address, in combination with a password, security question answer, or other information that permits access to an online account; and

(b)    Account number or credit or debit card number, in combination with any required security code, access code, or password that permits access to a person's financial account;

(6)    "Unauthorized person," any person not authorized to acquire or disclose personal information, or any person authorized by the information holder to access personal information who has acquired or disclosed the personal information outside the guidelines for access of disclosure established by the information holder.

Source: SL 2018, ch 135, § 1.


Get Chapter 22-40
Back to Chapter 22-40

Click message to listen