Bill Full Text
Home
-
Bills
-
Bill
-
Authors
-
Dates
-
Locations
-
Analyses
-
Organizations
<?xml version="1.0" ?>
<ns0:MeasureDoc xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://lc.ca.gov/legalservices/schemas/caml.1#" xmlns:ns3="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="1.0" xsi:schemaLocation="http://lc.ca.gov/legalservices/schemas/caml.1# xca.1.xsd">
<ns0:Description>
<ns0:Id>20250SB__046899INT</ns0:Id>
<ns0:VersionNum>99</ns0:VersionNum>
<ns0:History>
<ns0:Action>
<ns0:ActionText>INTRODUCED</ns0:ActionText>
<ns0:ActionDate>2025-02-19</ns0:ActionDate>
</ns0:Action>
</ns0:History>
<ns0:LegislativeInfo>
<ns0:SessionYear>2025</ns0:SessionYear>
<ns0:SessionNum>0</ns0:SessionNum>
<ns0:MeasureType>SB</ns0:MeasureType>
<ns0:MeasureNum>468</ns0:MeasureNum>
<ns0:MeasureState>INT</ns0:MeasureState>
</ns0:LegislativeInfo>
<ns0:AuthorText authorType="LEAD_AUTHOR">Introduced by Senator Becker</ns0:AuthorText>
<ns0:Authors>
<ns0:Legislator>
<ns0:Contribution>LEAD_AUTHOR</ns0:Contribution>
<ns0:House>SENATE</ns0:House>
<ns0:Name>Becker</ns0:Name>
</ns0:Legislator>
</ns0:Authors>
<ns0:Title> An act to add Title 1.81.28 (commencing with Section 1798.91.2) to Part 4 of Division 3 of the Civil Code, relating to artificial intelligence. </ns0:Title>
<ns0:RelatingClause>artificial intelligence</ns0:RelatingClause>
<ns0:GeneralSubject>
<ns0:Subject>High-risk artificial intelligence systems: duty to protect personal information.</ns0:Subject>
</ns0:GeneralSubject>
<ns0:DigestText>
<html:p>Existing law, the California Consumer Privacy Act of 2018 (CCPA), grants a consumer various rights with respect to personal information that is collected or sold by a business. The CCPA defines various terms for these purposes. The California Privacy Rights Act of 2020 (CPRA), approved by the voters as Proposition 24 at the November 3, 2020, statewide general election, amended, added to, and reenacted the CCPA and establishes the California Privacy Protection Agency (agency) and vests the agency with full administrative power, authority, and jurisdiction to enforce the CCPA. </html:p>
<html:p>Existing law requires, on or before January 1, 2026, and before each time thereafter that a generative artificial intelligence system or service, as defined, or a substantial modification to a generative artificial intelligence system or service, released
on or after January 1, 2022, is made available to Californians for use, regardless of whether the terms of that use include compensation, a developer of the system or service to post on the developer’s internet website documentation, as specified, regarding the data used to train the generative artificial intelligence system or service. </html:p>
<html:p>This bill would impose a duty on a covered deployer, defined as a business that deploys a high-risk artificial intelligence system that processes personal information, to protect personal information held by the covered deployer, subject to certain requirements. In this regard, the bill would require a covered deployer whose high-risk artificial intelligence systems process personal information to develop, implement, and maintain a comprehensive information security program, as specified, that contains administrative, technical, and physical safeguards that are appropriate for, among other things, the covered
deployer’s size, scope, and type of business. The bill would require the program described above to meet specified requirements, including, among other things, that the program incorporates safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under applicable state or federal laws and regulations. </html:p>
<html:p>Existing law, the Unfair Competition Law, establishes a statutory cause of action for unfair competition, including any unlawful, unfair, or fraudulent business act or practice and unfair, deceptive, untrue, or misleading advertising, and establishes remedies and penalties in that regard, including injunctive relief and civil penalties. </html:p>
<html:p>This bill would specify that a violation of the above-described provisions relating to the duty of a covered deployer to protect information, including the requirement that a covered deployer
maintain the comprehensive information security program described above, constitute a deceptive trade act or practice under that law.</html:p>
<html:p>Existing law, the Administrative Procedure Act, governs the procedure for the adoption, amendment, or repeal of regulations by state agencies and for the review of those regulatory actions by the Office of Administrative Law.</html:p>
<html:p>This bill would authorize the agency to adopt regulations pursuant to the act to implement these provisions, and would exempt, notwithstanding that provision, any regulations adopted by the agency to establish fees from the act. The bill would define various terms for these purposes.</html:p>
<html:p>The California Privacy Rights Act of 2020 authorizes the Legislature to amend the act to further the purposes and intent of the act by a majority vote of both houses of the Legislature, as specified.</html:p>
<html:p>This bill would declare that its provisions further the purposes and intent of the California Privacy Rights Act of 2020. </html:p>
</ns0:DigestText>
<ns0:DigestKey>
<ns0:VoteRequired>MAJORITY</ns0:VoteRequired>
<ns0:Appropriation>NO</ns0:Appropriation>
<ns0:FiscalCommittee>YES</ns0:FiscalCommittee>
<ns0:LocalProgram>NO</ns0:LocalProgram>
</ns0:DigestKey>
<ns0:MeasureIndicators>
<ns0:ImmediateEffect>NO</ns0:ImmediateEffect>
<ns0:ImmediateEffectFlags>
<ns0:Urgency>NO</ns0:Urgency>
<ns0:TaxLevy>NO</ns0:TaxLevy>
<ns0:Election>NO</ns0:Election>
<ns0:UsualCurrentExpenses>NO</ns0:UsualCurrentExpenses>
<ns0:BudgetBill>NO</ns0:BudgetBill>
<ns0:Prop25TrailerBill>NO</ns0:Prop25TrailerBill>
</ns0:ImmediateEffectFlags>
</ns0:MeasureIndicators>
</ns0:Description>
<ns0:Bill id="bill">
<ns0:Preamble>The people of the State of California do enact as follows:</ns0:Preamble>
<ns0:BillSection id="id_5B54F546-96A5-4A88-8641-49430CBCFBE5">
<ns0:Num>SECTION 1.</ns0:Num>
<ns0:ActionLine action="IS_ADDED" ns3:type="locator" ns3:href="urn:caml:codes:CIV:caml#xpointer(%2Fcaml%3ALawDoc%2Fcaml%3ACode%2Fcaml%3ALawHeading%5B%40type%3D'DIVISION'%20and%20caml%3ANum%3D'3.'%5D%2Fcaml%3ALawHeading%5B%40type%3D'PART'%20and%20caml%3ANum%3D'4.'%5D%2Fcaml%3ALawHeading%5B%40type%3D'TITLE'%20and%20caml%3ANum%3D'1.81.28.'%5D)" ns3:label="fractionType: LAW_SPREAD||commencingWith: 1798.91.2">
Title 1.81.28 (commencing with Section 1798.91.2) is added to Part 4 of Division 3 of the
<ns0:DocName>Civil Code</ns0:DocName>
, to read:
</ns0:ActionLine>
<ns0:Fragment>
<ns0:LawHeading type="TITLE" id="id_CEC56A9E-1F23-4CFE-997D-E826A5F6DFE7">
<ns0:Num>1.81.28.</ns0:Num>
<ns0:LawHeadingVersion id="id_C8AB1A74-4BF0-40BA-A5B0-1F1A4DD21BB0">
<ns0:LawHeadingText>High-risk Artificial Intelligence Systems</ns0:LawHeadingText>
</ns0:LawHeadingVersion>
<ns0:LawSection id="id_15D26A09-5E56-4886-B9DD-9A91FB863913">
<ns0:Num>1798.91.2.</ns0:Num>
<ns0:LawSectionVersion id="id_378AF6D9-3695-4212-A58C-FEDFE86599B7">
<ns0:Content>
<html:p>For purposes of this title, the following definitions shall apply:</html:p>
<html:p>
(a)
<html:span class="EnSpace"/>
“Artificial intelligence” has the same meaning as that term is defined in Section 11546.45.5 of the Government Code.
</html:p>
<html:p>
(b)
<html:span class="EnSpace"/>
“Business” has the same meaning as that term is defined in Section 1798.140.
</html:p>
<html:p>
(c)
<html:span class="EnSpace"/>
“Consumer” has the same meaning as that term is defined in Section 1798.140.
</html:p>
<html:p>
(d)
<html:span class="EnSpace"/>
“Covered deployer” means a business that deploys a high-risk artificial intelligence system that processes personal information.
</html:p>
<html:p>
(e)
<html:span class="EnSpace"/>
“Deploy” means to put
into effect or commercialize.
</html:p>
<html:p>
(f)
<html:span class="EnSpace"/>
“Deployer” means a person doing business in this state that deploys a high-risk artificial intelligence system.
</html:p>
<html:p>
(g)
<html:span class="EnSpace"/>
“High-risk artificial intelligence system” has the same meaning as “high-risk automated decision system,” as that term is defined in Section 11546.45.5 of the Government Code.
</html:p>
<html:p>
(h)
<html:span class="EnSpace"/>
“Personal information” has the same meaning as that term is defined in Section 1798.140.
</html:p>
<html:p>
(i)
<html:span class="EnSpace"/>
“Processes” or “processing” have the same meaning as “processing,” as that term is defined in Section 1798.140.
</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
<ns0:LawSection id="id_DB35AFC1-DB0C-4BCB-A26F-46E89CF456E8">
<ns0:Num>1798.91.3.</ns0:Num>
<ns0:LawSectionVersion id="id_56132DA9-97C1-4EEB-9180-41D525FFD7D3">
<ns0:Content>
<html:p>
(a)
<html:span class="EnSpace"/>
A covered deployer conducting business in this state shall have a duty to protect personal information held by the covered deployer as provided by this section.
</html:p>
<html:p>
(b)
<html:span class="EnSpace"/>
A covered deployer whose high-risk artificial intelligence systems process personal information shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate for all of the following:
</html:p>
<html:p>
(1)
<html:span class="EnSpace"/>
The covered deployer’s size, scope, and type of business.
</html:p>
<html:p>
(2)
<html:span class="EnSpace"/>
The amount of resources available to
the covered deployer.
</html:p>
<html:p>
(3)
<html:span class="EnSpace"/>
The amount of data stored by the covered deployer.
</html:p>
<html:p>
(4)
<html:span class="EnSpace"/>
The need for security and confidentiality of personal information stored by the covered deployer.
</html:p>
<html:p>
(c)
<html:span class="EnSpace"/>
The comprehensive information security program required by subdivision (a) shall meet all of the following requirements:
</html:p>
<html:p>
(1)
<html:span class="EnSpace"/>
The program shall incorporate safeguards that are consistent with the safeguards for the protection of personal information and information of a similar character under state or federal laws and regulations applicable to the covered deployer.
</html:p>
<html:p>
(2)
<html:span class="EnSpace"/>
The program shall include the designation of one or more employees of the covered deployer to maintain the program.
</html:p>
<html:p>
(3)
<html:span class="EnSpace"/>
The program shall require the identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of any electronic, paper, or other record containing personal information, and the establishment of a process for evaluating and improving, as necessary, the effectiveness of the current safeguards for limiting those risks, including by all of the following:
</html:p>
<html:p>
(A)
<html:span class="EnSpace"/>
Requiring ongoing employee and contractor education and training, including education and training for temporary employees and contractors of the covered deployer, on the proper use of security procedures and protocols and the importance of personal information security.
</html:p>
<html:p>
(B)
<html:span class="EnSpace"/>
Mandating employee compliance with policies and procedures established under the program.
</html:p>
<html:p>
(C)
<html:span class="EnSpace"/>
Providing a means for detecting and preventing security system failures.
</html:p>
<html:p>
(4)
<html:span class="EnSpace"/>
The program shall include security policies for the covered deployer’s employees relating to the storage, access, and transportation of records containing personal information outside of the covered deployer’s physical business premises.
</html:p>
<html:p>
(5)
<html:span class="EnSpace"/>
The program shall provide disciplinary measures for violations of a policy or procedure established under the program.
</html:p>
<html:p>
(6)
<html:span class="EnSpace"/>
The program shall include measures for preventing a terminated employee from accessing records containing personal information.
</html:p>
<html:p>
(7)
<html:span class="EnSpace"/>
The program shall provide policies for the supervision of third-party service providers that include both of the
following:
</html:p>
<html:p>
(A)
<html:span class="EnSpace"/>
Taking reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect personal information consistent with applicable law.
</html:p>
<html:p>
(B)
<html:span class="EnSpace"/>
Requiring third-party service providers by contract to implement and maintain appropriate security measures for personal information.
</html:p>
<html:p>
(8)
<html:span class="EnSpace"/>
The program shall provide reasonable restrictions on physical access to records containing personal information, including by requiring the records containing the data to be stored in a locked facility, storage area, or container.
</html:p>
<html:p>
(9)
<html:span class="EnSpace"/>
The program shall include regular monitoring to ensure that the program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized
use of personal information and, as necessary, upgrading information safeguards to limit the risk of unauthorized access to or unauthorized use of personal information.
</html:p>
<html:p>
(10)
<html:span class="EnSpace"/>
The program shall require the regular review of the scope of the program’s security measures that must occur subject to both of the following timeframes:
</html:p>
<html:p>
(A)
<html:span class="EnSpace"/>
At least annually.
</html:p>
<html:p>
(B)
<html:span class="EnSpace"/>
Whenever there is a material change in the covered deployer’s business practices that may reasonably affect the security or integrity of records containing personal information.
</html:p>
<html:p>
(11)
<html:span class="EnSpace"/>
The program shall require the documentation of responsive actions taken in connection with any incident involving a breach of security, including a mandatory postincident review of each event and the actions taken, if any, in
response to that event to make changes in business practices relating to protection of personal information.
</html:p>
<html:p>
(12)
<html:span class="EnSpace"/>
The program shall, to the extent feasible, include all of the following procedures and protocols with respect to computer system security requirements or procedures and protocols providing a higher degree of security, for the protection of personal information:
</html:p>
<html:p>
(A)
<html:span class="EnSpace"/>
The use of secure user authentication protocols that include all of the following features:
</html:p>
<html:p>
(i)
<html:span class="EnSpace"/>
The control of user login credentials and other identifiers.
</html:p>
<html:p>
(ii)
<html:span class="EnSpace"/>
The use of a reasonably secure method of assigning and selecting passwords or using unique identifier technologies, which may include biometrics or token devices.
</html:p>
<html:p>
(iii)
<html:span class="EnSpace"/>
The control of data security passwords to ensure that the passwords are kept in a location and a format that do not compromise the security of the data the passwords protect.
</html:p>
<html:p>
(iv)
<html:span class="EnSpace"/>
The restriction of access to only active users and active user accounts.
</html:p>
<html:p>
(v)
<html:span class="EnSpace"/>
The blocking of access to user credentials or identification after multiple unsuccessful attempts to gain access.
</html:p>
<html:p>
(B)
<html:span class="EnSpace"/>
The use of secure access control measures that include both of the following:
</html:p>
<html:p>
(i)
<html:span class="EnSpace"/>
The restriction of access to records and files containing personal information to only employees or contractors who need access to that personal information to perform the job duties of the employees or contractors.
</html:p>
<html:p>
(ii)
<html:span class="EnSpace"/>
The
assignment of a unique identification and a password to each employee or contractor with access to a computer containing personal information, that may not be a vendor-supplied default password, or the use of another protocol reasonably designed to maintain the integrity of the security of the access controls to personal information.
</html:p>
<html:p>
(C)
<html:span class="EnSpace"/>
The encryption of both of the following:
</html:p>
<html:p>
(i)
<html:span class="EnSpace"/>
Transmitted records and files containing personal information that will travel across public networks.
</html:p>
<html:p>
(ii)
<html:span class="EnSpace"/>
Data containing personal information that is transmitted wirelessly.
</html:p>
<html:p>
(D)
<html:span class="EnSpace"/>
The use of reasonable monitoring of systems for unauthorized use of or access to personal information.
</html:p>
<html:p>
(E)
<html:span class="EnSpace"/>
The encryption of all
personal information stored on laptop computers or other portable devices.
</html:p>
<html:p>
(F)
<html:span class="EnSpace"/>
For files containing personal information on a system that is connected to the internet, the use of reasonably current firewall protection and operating system security patches that are reasonably designed to maintain the integrity of the personal information.
</html:p>
<html:p>
(G)
<html:span class="EnSpace"/>
The use of both of the following:
</html:p>
<html:p>
(i)
<html:span class="EnSpace"/>
A reasonably current version of system security agent software that shall include malware protection and reasonably current patches and virus definitions.
</html:p>
<html:p>
(ii)
<html:span class="EnSpace"/>
A version of a system security agent software that is supportable with current patches and virus definitions, and is set to receive the most current security updates on a regular basis.
</html:p>
<html:p>
(d)
<html:span class="EnSpace"/>
A violation of this section by a covered deployer constitutes a deceptive trade act or practice under the Unfair Competition Law (Chapter 5 (commencing with Section 17200) of Part 2 of Division 7 of the Business and Professions Code).
</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
<ns0:LawSection id="id_E5289B37-4567-42E3-8204-5CB063C1F001">
<ns0:Num>1798.91.4.</ns0:Num>
<ns0:LawSectionVersion id="id_650FDCFF-1E3B-488C-B8C6-896FF6D76A91">
<ns0:Content>
<html:p>
(a)
<html:span class="EnSpace"/>
Except as provided in subdivision (b), the California Privacy Protection Agency may adopt regulations pursuant to the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code) to implement and administer this title.
</html:p>
<html:p>
(b)
<html:span class="EnSpace"/>
Notwithstanding subdivision (a), any regulation adopted by the California Privacy Protection Agency to establish fees authorized by this title shall be exempt from the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code).
</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
</ns0:LawHeading>
</ns0:Fragment>
</ns0:BillSection>
<ns0:BillSection id="id_BD8D2B69-17E8-430A-8110-AF74083A897C">
<ns0:Num>SEC. 2.</ns0:Num>
<ns0:Content>
<html:p>The Legislature finds and declares that this act furthers the purposes and intent of the California Privacy Rights Act of 2020 by ensuring consumers’ rights, including the constitutional right to privacy, are protected by enabling and empowering Californians to request that covered deployers secure their high-risk artificial intelligence systems that process personal information.</html:p>
</ns0:Content>
</ns0:BillSection>
</ns0:Bill>
</ns0:MeasureDoc>