Securiti Ranked #1 DSPM Vendor by GigaOm

View

Wyoming: An Overview of Data Protection & Data Privacy Law

Published juillet 29, 2024

Contributors

Anas Baig

Product Marketing Manager at Securiti

Usman Tariq

Data Privacy Analyst at Securiti

CIPP/US

In the era of cybersecurity threats, protecting consumers’ personal and sensitive personal information has become paramount. To enable seamless protection of data and consumers’ privacy rights, comprehensive data privacy laws have been established.

Wyoming, like many other states in the US, recognizes the dire importance of such laws. However, it has yet to establish a state-wide regulation for ensuring personal data privacy and security. The blog aims to give readers a brief look at the state of privacy laws in Wyoming, outlining existing sectoral laws.

Wyoming Consumer Protection Act

The Wyoming Consumer Protection Act (the “Act”) restricts organizations from taking advantage of citizens through various unfair or deceptive practices or misrepresentations. Moreover, the act gives the Attorney General exclusive rights to investigate such matters and file lawsuits, provided that the AG has reasonable cause to believe that an organization breached the act in any manner whatsoever.

In the event of a violation of the terms of a permanent injunction, the enforcing authority may recover a civil penalty of not more than $5,000 from the violator on behalf of the state. Similarly, in the event of a willful violation, the violator will be liable for a civil penalty of not more than $10,000 per violation.

Wyoming Genetic Data Privacy Law

The Wyoming Genetic Data Privacy Law (HB 86) was signed into law in March 2022 and took effect on July 1, 2022. As the name suggests, the law primarily covers entities that collect or test consumers’ genetic data, specifically direct-to-consumer genetic testing companies. The law provides multiple privacy rights to consumers, such as the consumer may request access to their genetic data, the deletion of their account or genetic data, and they may also request entities to provide or destroy biological samples. HB 86 provides exclusive rights to the Attorney General to enforce violations regarding the law. Similarly, the AG may enforce a civil penalty of up to $2,500 each per violation, as well as attorney’s fees and actual damages cost.

Data Breach Notification Guidelines

The Consumer Protection Act provides a detailed guideline for data breach notification requirements under Article 5 of Credit Freeze Reports. The Data Breach Notification Guidelines require that organizations that experience a breach provide breach notifications to the affected parties without undue delay. The guidelines cover businesses operating in the state of Wyoming that experience a breach incident involving more than 10,000 residents or 500,000 individuals for businesses operating outside the state.

Apart from these sectoral laws, various other federal laws may apply to businesses in the state, such as GLBA, HIPAA, FCRA, etc. Hence, businesses must familiarize themselves with such laws to ensure compliance.

Partager

Rejoignez notre newsletter

Recevez toutes les dernières informations, les mises à jour de la loi et plus encore dans votre boîte de réception

Videos

Spotlight Talks

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Understanding Data Regulations in Australia’s Telecom Sector View More

Understanding Data Regulations in Australia’s Telecom Sector

1. Introduction Australia’s telecommunications sector plays a crucial role in connecting millions of people. However, with this connectivity comes the responsibility of safeguarding vast...

Data Security Governance View More

Data Security Governance: Key Principles and Best Practices for Protection

Learn about Data Security Governance, its importance in protecting sensitive data, ensuring compliance, and managing risks. Best practices for securing data.

ROPA View More

Records of Processing Activities (RoPA): A Cross-Jurisdictional Analysis

Download the whitepaper to gain a cross-jurisdictional analysis of records of processing activities (RoPA). Learn what RoPA is, why organizations should maintain it, and...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New