Digital Data Destruction Regulations: Enterprise ITAD & E-Waste Recycling Compliances by State Wise

Every IT asset retirement in the United States is a layered compliance event, governed at minimum by (1) the destination-resident state’s breach-notification statute, (2) the destination-resident state’s records-disposal statute, (3) any applicable state comprehensive consumer privacy law, (4) any applicable biometric, genetic, insurance-licensee, or sector-specific overlay, (5) the federal HIPAA Security Rule, FTC Disposal Rule, FTC Safeguards Rule, GLBA, FAR 52.204-21, and DFARS 252.204-7012 baseline, and (6) the federal RCRA hazardous-waste program (delegated to 48 states; direct U.S. EPA jurisdiction in Alaska and Hawaii).

This reference consolidates all 50 jurisdictions into a single executive briefing for in-house compliance, legal, and procurement teams scoping multi-state IT Asset Disposition programs; each state row links to a full compliance page with statute citations, recent enforcement context, penalty bands.

Digital Data Destruction &Amp; E-Waste Recycling Regulations And Laws By State Wise

The National Landscape

Across the 50 U.S. states, the regulatory posture for digital data destruction can be summarized in seven dimensions:

  • Breach notification. All 50 states have enacted a breach-notification statute. South Dakota and Alabama were the final two states to enact (both 2018). The strictest standard is Colorado, Florida, Washington, and Maine at 30 calendar days, Vermont at 14 business days for the AG preliminary notice, Iowa at 5 business days for the AG window, and Idaho at 24 hours for the public-sector AG notice.
  • Records disposal. 47 states impose an explicit records-disposal duty with a reasonable-measures or unreadable-and-undecipherable outcome standard. Three states (Alabama, Kentucky public sector only, and a small number of others) operate disposal duty only through general consumer-protection carryover.
  • Comprehensive consumer privacy laws. 21 states have enacted a comprehensive consumer data privacy act covering controllers, processors, consumer rights, opt-out, and data protection assessments. California was first (CCPA effective January 1, 2020); Virginia was second (VCDPA effective January 1, 2023). The 2024-2026 wave includes Florida, Texas, Oregon, Montana, Tennessee, Iowa, Indiana, Delaware, New Hampshire, New Jersey, Maryland, Minnesota, Rhode Island.
  • NAIC Insurance Data Security Model Law adoption. 30 states have adopted the NAIC Insurance Data Security Model Law imposing a written information security program and annual board certification on insurance licensees. South Carolina was first (S.C. Code § 38-99, effective January 1, 2019).
  • Biometric, genetic, or sector-specific overlays. 16 states have a biometric or genetic privacy overlay. Illinois BIPA at 740 ILCS 14 ($1,000 negligent / $5,000 intentional per violation, private right of action) is the strongest U.S. biometric regime. Texas CUBI at Tex. BCC Chapter 503 ($25,000 per violation; July 2024 $1.4 billion Meta settlement) is the most aggressively enforced AG-only regime.
  • State e-waste programs. 25 states have an electronics-recycling extended producer responsibility (EPR) law and / or landfill ban on covered electronics. Maine (38 M.R.S. § 1610, 2004) was first; Hawaii HEWRRA (2008) was the earliest U.S. computer EPR. 25 states have no state EPR program; enterprise IT asset retirement in those states routes through the federal RCRA hazardous-waste channel.
  • Private right of action. Approximately 12 states provide a private right of action for breach, disposal, or UDAP-carryover claims: Texas CAPTURE Act, Illinois BIPA, California CCPA, Washington MHMDA / CPA, Virginia VCPA, Arkansas DTPA, West Virginia CCPA, Nebraska CPA (treble damages), New Jersey CFA (treble damages), Wyoming CPA, New Hampshire CPA, Pennsylvania UTPCPL, North Carolina UDTPA, and South Carolina § 39-1-90(I). The remaining 38 states limit enforcement to the AG or sectoral regulator.

50-State Master Comparison Table

Each state row in the table below links to a full compliance page covering that state’s statutes, regulators, penalty bands, federal-overlay preemption matrix, state sectoral regulators, recent enforcement context, and 11 statute-anchored FAQs. The master table is designed for at-a-glance scanning; the linked state page is the audit-defensible reference.

State Breach Notification Disposal Statute Comprehensive Privacy Law Biometric / Genetic Overlay NAIC Insurance Data Security Private Right of Action State E-Waste Program RCRA Authorization Headline Penalty Band
Alabama Code § 8-38-1
45 days; AG if > 1,000
No dedicated statute None None Not adopted NO (AG only) No EPR; hazardous-waste rules apply YES Up to $5,000 / day, up to $500,000 / breach
Alaska AS § 45.48.010
45 days
AS § 45.48.500 None Genetic AS § 18.13.010 YES
Jul 1, 2025
NO (AG only) No EPR; hazardous-waste rules apply NO (direct EPA jurisdiction) Up to $500 / resident; cap $50,000 government
Arizona A.R.S. § 18-552
45 days; broadened to ransomware 2018
A.R.S. § 44-7601 None None Not adopted NO (AG only) Voluntary recycling; no landfill ban YES Up to $500,000 per breach series; willful
Arkansas Ark. Code § 4-110-105
Most expedient time; AG if > 1,000
Ark. Code § 4-110-104 None Biometric + Genetic § 4-110-103 (2019) YES
Jan 1, 2022
YES (DTPA § 4-88-113(f)) No EPR; hazardous-waste rules apply YES DTPA up to $10,000 / violation
California Cal. Civ. Code § 1798.82
Most expedient time; AG if 500+
Cal. Civ. Code § 1798.81 CCPA / CPRA
Jan 1, 2020 (CCPA); Jan 1, 2023 (CPRA)
CCPA biometric / genetic Not adopted YES (CCPA § 1798.150 PRA) Electronic Waste Recycling Act (2003); landfill ban; SB 244 RtR Jul 1, 2024 YES CCPA $2,500 / $7,500 per violation; § 1798.150 $100–$750 per consumer
Colorado C.R.S. § 6-1-716
30 days (strictest in U.S.)
C.R.S. § 6-1-713 Colorado Privacy Act
Jul 1, 2023
CPA biometric (HB24-1130) Not adopted NO (AG / DA enforcement) E-waste landfill ban (Jul 2013); EPR programs HB22-1355 YES Up to $20,000 / violation
Connecticut Conn. Gen. Stat. § 36a-701b
60 days + 24-mo credit monitoring (SSN)
§ 36a-701b CTDPA
Jul 1, 2023
CTDPA biometric YES
Oct 1, 2019
NO (AG only) E-waste manufacturer takeback; battery EPR YES CUTPA up to $5,000 / violation
Delaware 6 Del. C. § 12B-101
60 days + 12-mo credit monitoring
6 Del. C. § 5002C DPDPA
Jan 1, 2025
DPDPA biometric / genetic YES
Jul 17, 2019
NO (AG only) No EPR; hazardous-waste rules apply YES Up to $10,000 / willful violation under DCFA
Florida Fla. Stat. § 501.171
30 days; AG if 500+
Fla. Stat. § 501.171(8) Florida Digital Bill of Rights
Jul 1, 2024
FDBR sensitive data incl. biometric / genetic Not adopted NO (AG only) No EPR; hazardous-waste rules apply YES Up to $500,000 per breach incident
Georgia O.C.G.A. § 10-1-912
Most expedient time
O.C.G.A. § 10-15-2 None None Not adopted NO (AG only) No EPR; hazardous-waste rules apply YES § 10-15-2 up to $2,500 / record
Hawaii HRS § 487N-2
Most expedient time; AG if 1,000+
HRS § 487R-2 None None YES
Jan 1, 2022
NO (AG only) HEWRRA earliest U.S. computer EPR (2008); landfill ban NO (direct EPA jurisdiction) Up to $2,500 / record (multiplicative)
Idaho Idaho Code § 28-51-105
Most expedient time; 24-hr public-sector AG
Idaho Code § 28-51-104 None None YES
Jul 1, 2020
NO (AG only) No EPR; hazardous-waste rules apply YES Up to $25,000 / breach under § 28-51-107
Illinois 815 ILCS 530/10
Most expedient time; AG if 500+
815 ILCS 530/40 None BIPA 740 ILCS 14 ($1,000 / $5,000 per violation) YES
Jul 1, 2019
YES (BIPA private action) EPRRA landfill ban since 2012 YES BIPA $1,000 negligent / $5,000 intentional per violation
Indiana Ind. Code § 24-4.9-3
Most expedient time
Ind. Code § 24-4-14-8 Indiana CDPA
Jan 1, 2026
Indiana CDPA biometric / genetic Not adopted NO (AG only) Indiana E-Waste Recycling Program manufacturer EPR YES Up to $150,000 / breach under § 24-4.9-4
Iowa Iowa Code § 715C.2
5 business days AG window
Iowa Code § 715A.8 Iowa CDPA
Jan 1, 2025
Iowa CDPA biometric / genetic YES
Jan 1, 2020
NO (AG only) No EPR; hazardous-waste rules apply YES Up to $40,000 / violation under § 714.16
Kansas K.S.A. § 50-7a02
Most expedient time
K.S.A. § 50-7a03 None None Not adopted NO (AG only) No EPR; hazardous-waste rules apply YES KCPA up to $10,000 / violation
Kentucky KRS 365.732
Most expedient time
KRS 365.720 None None Not adopted NO (AG only) No EPR; hazardous-waste rules apply YES KCPA up to $2,000 / willful violation
Louisiana La. R.S. § 51:3074
60 days + 10-day AG
La. R.S. § 51:3074 None None YES
Aug 1, 2020
NO (AG only) No EPR; hazardous-waste rules apply YES Up to $5,000 / violation
Maine 10 M.R.S. § 1348
30 days
10 M.R.S. § 1347 None None YES
Jan 1, 2022
NO (AG only) 38 M.R.S. § 1610 earliest state EPR (2004); landfill ban YES Up to $10,000 / violation under § 1348
Maryland Md. Comm. Code § 14-3504
45 days
Md. Comm. Code § 14-3502 MODPA
Oct 1, 2025
MODPA biometric / genetic / neural Not adopted NO (AG only) Maryland Computer Recycling Manufacturer Registration YES MPIPA up to $1,000 / violation
Massachusetts M.G.L. c. 93H § 3
Most expedient time
M.G.L. c. 93I None Biometric since Apr 2019 (M.G.L. c. 93) Not adopted NO (AG only) Cathode-ray tube landfill ban YES Up to $5,000 / violation; treble per Chapter 93A
Michigan MCL § 445.72
Most expedient time
MCL § 445.72a None None Not adopted NO (AG only) NREPA Part 173 e-waste; manufacturer registration YES Identity Theft Protection Act $250 / $1,000 / $5,000 per violation
Minnesota Minn. Stat. § 325E.61
Most expedient time
Minn. Stat. § 325M.05 MCDPA
Jul 31, 2025
MCDPA biometric / genetic Not adopted NO (AG only) Digital Fair Repair Act (broadest in U.S.); Electronics Recycling Act YES Up to $25,000 / violation under § 8.31
Mississippi Miss. Code § 75-24-29
Most expedient time
Miss. Code § 75-24-29 None None YES
Jul 1, 2019
NO (AG only) No EPR; hazardous-waste rules apply YES Up to $10,000 / violation under § 75-24-19
Missouri Mo. Rev. Stat. § 407.1500
Most expedient time
Mo. Rev. Stat. § 407.1500 None Medical info enumeration § 407.1500 YES
Aug 28, 2021
NO (AG only) No EPR; hazardous-waste rules apply YES Up to $150,000 / breach incident
Montana Mont. Code § 30-14-1704
Most expedient time
Mont. Code § 30-14-1703 MTCDPA
Oct 1, 2024
MTCDPA biometric / genetic; GIPA YES
Oct 1, 2020
NO (AG only) No EPR; hazardous-waste rules apply YES Up to $10,000 / violation under § 30-14-142
Nebraska Neb. Rev. Stat. § 87-803
Most expedient time
Neb. Rev. Stat. § 87-302 None Biometric (2016 amendment to § 87-803) Not adopted YES (CPA § 59-1609 treble damages) No EPR; hazardous-waste rules apply YES CPA up to $10,000 / violation; treble damages
Nevada NRS § 603A.220
Most expedient time
NRS § 603A.200 None None YES
Oct 1, 2023
NO (AG only) No EPR; hazardous-waste rules apply YES DTPA up to $5,000 / willful violation
New Hampshire RSA § 359-C:20
Most expedient time
RSA § 359-C:20 None None YES
Jan 1, 2021
YES (RSA 358-A private action) No EPR; hazardous-waste rules apply YES RSA 358-A actual or $1,000 / violation
New Jersey N.J.S.A. § 56:8-163
Most expedient time
N.J.S.A. § 56:8-162 NJDPA (2025)
Jan 15, 2025
NJDPA biometric / genetic Not adopted YES (CFA § 56:8-1 treble damages) Electronic Waste Management Act manufacturer EPR YES CFA treble damages + attorney fees
New Mexico NMSA § 57-12C-6
45 days
NMSA § 57-12C-3 None None YES
Jan 1, 2022
NO (AG only) No EPR; hazardous-waste rules apply YES Up to $25,000 / violation under § 57-12C-9
New York Gen. Bus. § 899-aa
Most expedient time
Gen. Bus. § 399-h None None YES
Mar 1, 2017 (NYDFS Part 500)
NO (AG / NYDFS only) NY E-Cycles manufacturer EPR; landfill ban YES Up to $250,000 per breach under SHIELD
North Carolina N.C.G.S. § 75-65
Most expedient time
N.C.G.S. § 75-64 None None Not adopted YES (UDTPA treble damages § 75-16) § 130A-309.130 manufacturer EPR; landfill ban YES UDTPA treble damages under § 75-16
North Dakota N.D.C.C. § 51-30
45 days; AG if 250+
N.D.C.C. § 51-30 None None YES
Aug 1, 2023
NO (AG only) No EPR; hazardous-waste rules apply YES Up to $5,000 / violation
Ohio Ohio R.C. § 1349.19
45 days; AG if 500+
Ohio R.C. § 1349.19 None None YES
Mar 20, 2019
NO (AG only) No EPR; hazardous-waste rules apply YES Up to $10,000 / day after 60 days
Oklahoma 24 O.S. § 163
Most expedient time
24 O.S. § 163 None None Not adopted NO (AG only) No EPR; hazardous-waste rules apply YES Up to $150,000 per breach under § 163.C
Oregon ORS § 646A.604
45 days; AG if 250+
ORS § 646A.622 Oregon Consumer Privacy Act
Jul 1, 2024
OCPA biometric / genetic sensitive Not adopted NO (AG only) Oregon E-Cycles manufacturer EPR; landfill ban YES ORS § 646A.624 up to $1,000 / violation per person
Pennsylvania 73 P.S. § 2303
Most expedient time (2022 amendments)
73 P.S. § 2303 None None Not adopted YES (UTPCPL § 201-9.2 private action) Covered Device Recycling Act 35 P.S. § 6051.301 EPR YES UTPCPL up to $1,000 / violation; treble actual damages
Rhode Island R.I.G.L. § 11-49.3-4
45 days
R.I.G.L. § 11-49.3-3 RIDTPPA
Jan 1, 2026
None YES
Jul 1, 2022
NO (AG only) 23-19.6 manufacturer EPR; landfill ban YES Up to $200 / violation under § 11-49.3-7
South Carolina S.C. Code § 39-1-90
Most expedient time
S.C. Code § 30-2-310 None None YES
Jan 1, 2019 (FIRST U.S. adoption)
YES (§ 39-1-90(I) private action) § 48-60 manufacturer EPR YES $1,000 / resident; SCUTPA treble damages
South Dakota SDCL § 22-40-19
Most expedient time (Jul 1, 2018)
SDCL § 22-40-22 None None YES
Jul 1, 2021
YES (DTPA § 37-24 private action) No EPR; hazardous-waste rules apply YES Up to $10,000 / day / violation
Tennessee Tenn. Code § 47-18-2107
45 days; AG if 100+
Tenn. Code § 47-18-2110 TIPA
Jul 1, 2025
TIPA biometric / genetic YES
Jul 1, 2022
NO (AG only) Tenn. Code § 68-211-1001 manufacturer EPR YES TIPA $7,500 / violation + treble for willful
Texas Tex. Bus. & Com. Code § 521.053
60 days
§ 521.052 TDPSA
Jul 1, 2024
Tex. BCC Chapter 503 CUBI ($25,000 / violation) Not adopted NO (AG only) TCEQ Texas Computer Equipment Recycling Program YES ITEPA up to $50,000 / violation; up to $250,000 / breach
Utah Utah Code § 13-44-202
Most expedient time
Utah Code § 13-44-201 UCPA
Dec 31, 2023
UCPA biometric Not adopted NO (AG only) No EPR; hazardous-waste rules apply YES UCPA up to $7,500 / violation
Vermont 9 V.S.A. § 2435
14-business-day AG preliminary; 45-day consumer
9 V.S.A. § 2445 None None YES
Jan 1, 2022
NO (AG only) 23-19.6 manufacturer EPR; landfill ban YES Up to $10,000 per violation
Virginia Va. Code § 18.2-186.6
Most expedient time
Va. Code § 59.1-443.2 VCDPA
Jan 1, 2023
VCDPA biometric / genetic YES
Jul 1, 2020
YES (VCPA § 59.1-196 PRA) No EPR; hazardous-waste rules apply YES Up to $150,000 per breach; VCPA $500 / $1,000 statutory
Washington RCW § 19.255.010
30 days; AG if 500+
RCW § 19.215.020 WAMHMDA
Mar 31, 2024
MHMDA biometric / consumer health (broadest health PRA) Not adopted YES (WAMHMDA + CPA private actions) RCW 70A.500 E-Cycle Washington manufacturer EPR YES MHMDA / CPA up to $7,500 / violation + private action
West Virginia W. Va. Code § 46A-2A-101
Most expedient time
§ 46A-2A-101 None None YES
Jan 1, 2021
YES (CCPA § 46A-6-106 private action) § 22-15A-22 manufacturer EPR (small business / household) YES CCPA up to $5,000 / violation
Wisconsin Wis. Stat. § 134.98
45 days
Wis. Stat. § 134.97 None None YES
Mar 1, 2022
NO (AG / DATCP only) E-Cycle Wisconsin § 287.17 manufacturer EPR; landfill ban YES Up to $1,000 / violation under § 134.98(4)
Wyoming Wyo. Stat. § 40-12-501
Most expedient time
§ 40-12-602 None Biometric (2015 expansion of § 40-12-501) YES
Jul 1, 2022
YES (CPA § 40-12-108 private action) No EPR; hazardous-waste rules apply YES CPA up to $5,000 / violation

Reading the table. Most state statutes use “in the most expedient time possible and without unreasonable delay” as the breach-notification deadline, which functions as an outer limit rather than a fixed window. States with a specific calendar deadline (30 days, 45 days, 60 days) typically apply that deadline to the consumer notice and impose a parallel deadline (often 24 hours, 5 business days, or 10 business days) for the AG notice when the breach exceeds a threshold (typically 250, 500, or 1,000 affected residents). The “Private Right of Action” column reflects whether the state’s breach, disposal, biometric, or UDAP statute provides a statutory private cause of action; common-law negligence and breach-of-contract claims may still be available in any state.

State-by-State Detailed Compliance Reference

The table above is the at-a-glance scanner. The table below is the deep-dive reference, structured around the five fields that most enterprise compliance, legal, and procurement teams need when scoping an IT asset retirement event in a given state: the operative statutes and citations, the key digital-data-destruction requirements, the entities and activities to which the duty applies, the statutory penalty range, and the state e-waste regime that determines how covered electronics are routed. Each row consolidates the relevant statute citations + the key digital-data requirements with citations to the underlying state research bundles. The state name in column one links to that state’s full v1.3.4 compliance page with regulator names, recent enforcement context, and 11 statute-anchored FAQs.

State Statute / Citation Key Requirements (Emphasis on Digital) Applicability Penalties E-Waste Law Notes
Alabama Breach: Code § 8-38-1 (45 days; AG if > 1,000)
Disposal: No dedicated statute
No dedicated records-disposal statute; Alabama Data Breach Notification Act of 2018 imposes reasonable safeguards duty on covered entities, breach notice within 45 days (consumer) and AG notice when more than 1,000 Alabamians affected. Physical loss of unencrypted media is a breach trigger; encryption + NIST SP 800-88 Rev. 2 verified sanitization are the audit-defensible safe harbor. Any covered entity (business, person, government) owning or licensing computerized data containing Alabamians’ sensitive personally identifying information. Public-sector retirement under Alabama state CIO / OIT policy. Sectoral overlays: HIPAA, GLBA / FTC Safeguards Rule, FAR 52.204-21 / DFARS 252.204-7012 / CMMC 2.0 for federal contractors. Up to $5,000 / day, up to $500,000 / breach. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Alaska Breach: AS § 45.48.010 (45 days)
Disposal: AS § 45.48.500
Records-disposal duty under AS § 45.48.500 to render personal information unreadable or undecipherable; breach notice in 45 days under AS § 45.48.010. Genetic privacy overlay under AS § 18.13.010 (Genetic Privacy Act). Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization functions as safe harbor. Any business owning or licensing personal information of an Alaska resident. Public-sector retirement under State of Alaska Office of Information Technology policy. Genetic privacy duty under AS § 18.13.010 for entities handling DNA samples or analyses. NAIC IDS-adopted; insurance licensees in scope. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $500 / resident; cap $50,000 government. Private right of action: AG only. No EPR; hazardous-waste rules apply. NO (direct EPA jurisdiction); hazardous-waste enforcement runs directly to U.S. EPA.
Arizona Breach: A.R.S. § 18-552 (45 days; broadened to ransomware 2018)
Disposal: A.R.S. § 44-7601
Records-disposal duty under A.R.S. § 44-7601 (outcome unreadable / undecipherable); 2018 SB 1212 expanded breach to ransomware and broadened personal-information definition. 45-day consumer notice. NIST SP 800-88 Rev. 2 sanitization defensible against breach trigger. Any person or business that conducts business in Arizona and owns / licenses computerized personal data. Public-sector retirement under Arizona State CIO / ADOA-ASET policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $500,000 per breach series; willful. Private right of action: AG only. Voluntary recycling; no landfill ban. EPA-authorized RCRA Subtitle C state.
Arkansas Breach: Ark. Code § 4-110-105 (Most expedient time; AG if > 1,000)
Disposal: Ark. Code § 4-110-104
Records-disposal duty under Ark. Code § 4-110-104; 2019 amendments added biometric + genetic information to consumer-rights provisions. DTPA § 4-88-113(f) provides private right of action with treble damages. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of an Arkansas resident. DTPA covers consumer-facing entities with private right of action. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Arkansas Office of Information Systems. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. DTPA up to $10,000 / violation. Private right of action: DTPA § 4-88-113(f. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
California Breach: Cal. Civ. Code § 1798.82 (Most expedient time; AG if 500+)
Disposal: Cal. Civ. Code § 1798.81
Comp. privacy: CCPA / CPRA (Jan 1, 2020 (CCPA); Jan 1, 2023 (CPRA))
Records-disposal duty under Cal. Civ. Code § 1798.81 (reasonable steps; modify, destroy, or shred); CCPA § 1798.150 statutory private right of action $100-$750 per consumer per incident. CCPA / CPRA right to deletion attaches to retired media that may still hold consumer data. SB 244 Right to Repair (Jul 1, 2024) extends product-lifecycle controls. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a California resident (CCPA / CPRA thresholds: $25M revenue, 100K+ consumers, or 50%+ revenue from selling consumer data). Public-sector retirement under Cal. Gov. Code § 11549 + State CISO policy. Sectoral overlays: HIPAA (CMIA extends covered-entity scope), GLBA / CFIPA, FAR / DFARS / CMMC. CCPA $2,500 / $7,500 per violation; § 1798.150 $100–$750 per consumer. Private right of action: CCPA § 1798.150 PRA. Electronic Waste Recycling Act (2003); landfill ban; SB 244 RtR Jul 1, 2024. EPA-authorized RCRA Subtitle C state.
Colorado Breach: C.R.S. § 6-1-716 (30 days (strictest in U.S.))
Disposal: C.R.S. § 6-1-713
Comp. privacy: Colorado Privacy Act (Jul 1, 2023)
Records-disposal duty under C.R.S. § 6-1-713; breach notice in 30 days (strictest U.S. deadline). Colorado Privacy Act (Jul 1, 2023) deletion right + HB24-1130 biometric amendments. HB 24-1121 Right to Repair (effective Jan 2026). Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 is safe harbor. Any covered entity that maintains, owns, or licenses computerized data containing Colorado-resident personal information. CPA applies to controllers processing data of 100K+ Colorado consumers or 25K+ where revenue includes data sale. Public-sector retirement under OIT / Colorado Cybersecurity Office. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $20,000 / violation. Private right of action: AG / DA enforcement. E-waste landfill ban (Jul 2013); EPR programs HB22-1355. EPA-authorized RCRA Subtitle C state.
Connecticut Breach: Conn. Gen. Stat. § 36a-701b (60 days + 24-mo credit monitoring (SSN))
Disposal: § 36a-701b
Comp. privacy: CTDPA (Jul 1, 2023)
Records-disposal duty under § 36a-701b (60 days + 24-month credit monitoring required if SSN exposed). CTDPA (Jul 1, 2023) consumer-data minimization + deletion. Among earliest NAIC IDS adopters (Oct 1, 2019). Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a Connecticut resident; CTDPA controller thresholds (100K+ consumers or 25K+ where 25%+ revenue from data sale). NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Connecticut Department of Administrative Services BEST policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. CUTPA up to $5,000 / violation. Private right of action: AG only. E-waste manufacturer takeback; battery EPR. EPA-authorized RCRA Subtitle C state.
Delaware Breach: 6 Del. C. § 12B-101 (60 days + 12-mo credit monitoring)
Disposal: 6 Del. C. § 5002C
Comp. privacy: DPDPA (Jan 1, 2025)
Records-disposal duty under 6 Del. C. § 5002C (outcome unreadable / undecipherable). 60-day breach notice + 12-month credit monitoring when SSN exposed. DPDPA effective Jan 1, 2025 expands consumer rights and sensitive-data definitions including biometric / genetic. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business that conducts business in Delaware or produces products / services targeted to Delaware residents and that processes the personal data of 35K+ consumers (DPDPA threshold). Public-sector retirement under Delaware Department of Technology and Information policy. NAIC IDS-adopted; insurance licensees in scope. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $10,000 / willful violation under DCFA. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Florida Breach: Fla. Stat. § 501.171 (30 days; AG if 500+)
Disposal: Fla. Stat. § 501.171(8)
Comp. privacy: Florida Digital Bill of Rights (Jul 1, 2024)
Records-disposal duty under Fla. Stat. § 501.171(8); breach notice in 30 days; AG notice when 500+ affected. Florida Digital Bill of Rights (Jul 1, 2024) strict opt-in for sensitive data including biometric / genetic. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a Florida resident; FDBR controller threshold $1B+ global revenue. Public-sector retirement under Florida Digital Service / DMS policy. Sectoral overlays: HIPAA, GLBA / FTC, FAR / DFARS / CMMC. Up to $500,000 per breach incident. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Georgia Breach: O.C.G.A. § 10-1-912 (Most expedient time)
Disposal: O.C.G.A. § 10-15-2
Records-disposal duty under O.C.G.A. § 10-15-2 ($2,500 per record); breach notice in most expedient time. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business owning or licensing personal information of a Georgia resident. Public-sector retirement under Georgia Technology Authority policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. § 10-15-2 up to $2,500 / record. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Hawaii Breach: HRS § 487N-2 (Most expedient time; AG if 1,000+)
Disposal: HRS § 487R-2
Records-disposal duty under HRS § 487R-2 (Disposal of Personal Information); AG notice when 1,000+ affected. NAIC IDS adopted Jan 1, 2022. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Hawaii is one of two non-RCRA-authorized states; hazardous-waste duties run directly to U.S. EPA Region 9. Any business owning or licensing personal information of a Hawaii resident. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under State of Hawaii Office of Enterprise Technology Services policy. Hawaii is one of two non-RCRA-authorized states; e-waste / hazardous-waste duties run directly to U.S. EPA Region 9. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $2,500 / record (multiplicative). Private right of action: AG only. HEWRRA earliest U.S. computer EPR (2008); landfill ban. NO (direct EPA jurisdiction); hazardous-waste enforcement runs directly to U.S. EPA.
Idaho Breach: Idaho Code § 28-51-105 (Most expedient time; 24-hr public-sector AG)
Disposal: Idaho Code § 28-51-104
Records-disposal duty under Idaho Code § 28-51-104; consumer notice in most expedient time; public-sector AG notice within 24 hours (strictest U.S. public-sector window). NAIC IDS adopted Jul 1, 2020. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of an Idaho resident. Public-sector entity 24-hour AG notification under § 28-51-105 (strictest U.S. public-sector window). NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Idaho Office of Information Technology Services. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $25,000 / breach under § 28-51-107. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Illinois Breach: 815 ILCS 530/10 (Most expedient time; AG if 500+)
Disposal: 815 ILCS 530/40
Records-disposal duty under 815 ILCS 530/40; BIPA at 740 ILCS 14 imposes $1,000 negligent / $5,000 intentional per violation with private right of action (strongest U.S. biometric regime). NAIC IDS adopted Jul 1, 2019. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any private entity that collects biometric identifiers or information of Illinois residents (BIPA scope). All businesses holding Illinois-resident personal information are in scope for breach notification. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Illinois Department of Innovation and Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. BIPA $1,000 negligent / $5,000 intentional per violation. Private right of action: BIPA private action. EPRRA landfill ban since 2012. EPA-authorized RCRA Subtitle C state.
Indiana Breach: Ind. Code § 24-4.9-3 (Most expedient time)
Disposal: Ind. Code § 24-4-14-8
Comp. privacy: Indiana CDPA (Jan 1, 2026)
Records-disposal duty under Ind. Code § 24-4-14-8 (outcome shred / incinerate / pulverize); breach notice in most expedient time. Indiana CDPA (Jan 1, 2026) adds biometric / genetic as sensitive data. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of an Indiana resident; Indiana CDPA threshold 100K+ consumers or 25K+ where revenue includes data sale. Public-sector retirement under Indiana Office of Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $150,000 / breach under § 24-4.9-4. Private right of action: AG only. Indiana E-Waste Recycling Program manufacturer EPR. EPA-authorized RCRA Subtitle C state.
Iowa Breach: Iowa Code § 715C.2 (5 business days AG window)
Disposal: Iowa Code § 715A.8
Comp. privacy: Iowa CDPA (Jan 1, 2025)
Records-disposal duty under Iowa Code § 715A.8; AG breach window only 5 business days (second-strictest in U.S.). Iowa CDPA (Jan 1, 2025) adds biometric / genetic as sensitive data. NAIC IDS adopted Jan 1, 2020. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of an Iowa resident; Iowa CDPA controller threshold 100K+ consumers or 25K+ where revenue includes data sale. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Iowa Office of the CIO policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $40,000 / violation under § 714.16. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Kansas Breach: K.S.A. § 50-7a02 (Most expedient time)
Disposal: K.S.A. § 50-7a03
Records-disposal duty under K.S.A. § 50-7a03 (Wayne Owen Act, named for an identity-theft victim); breach notice in most expedient time. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a Kansas resident. Public-sector retirement under Kansas Office of Information Technology Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. KCPA up to $10,000 / violation. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Kentucky Breach: KRS 365.732 (Most expedient time)
Disposal: KRS 365.720
Records-disposal duty under KRS 365.720 (consumer); KRS 61.931 imposes a parallel duty on public agencies and contractors. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a Kentucky resident. KRS 61.931 imposes parallel duty on public agencies and their contractors. Public-sector retirement under Commonwealth Office of Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. KCPA up to $2,000 / willful violation. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Louisiana Breach: La. R.S. § 51:3074 (60 days + 10-day AG)
Disposal: La. R.S. § 51:3074
Records-disposal duty + breach notice under La. R.S. § 51:3074; consumer notice in 60 days plus 10-day AG window. NAIC IDS adopted Aug 1, 2020. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a Louisiana resident. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Louisiana Office of Technology Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $5,000 / violation. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Maine Breach: 10 M.R.S. § 1348 (30 days)
Disposal: 10 M.R.S. § 1347
Records-disposal duty under 10 M.R.S. § 1347; breach notice in 30 days. NAIC IDS adopted Jan 1, 2022. 38 M.R.S. § 1610 (2004) established the earliest U.S. state e-waste EPR program. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a Maine resident. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Maine OIT policy. Earliest U.S. state with e-waste EPR (38 M.R.S. § 1610, 2004); landfill ban applies to covered electronics. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $10,000 / violation under § 1348. Private right of action: AG only. 38 M.R.S. § 1610 earliest state EPR (2004); landfill ban. EPA-authorized RCRA Subtitle C state.
Maryland Breach: Md. Comm. Code § 14-3504 (45 days)
Disposal: Md. Comm. Code § 14-3502
Comp. privacy: MODPA (Oct 1, 2025)
Records-disposal duty under Md. Comm. Code § 14-3502; breach notice in 45 days. MODPA (Oct 1, 2025) is the first U.S. comprehensive law treating neural data as sensitive (alongside biometric / genetic). Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a Maryland resident; MODPA effective Oct 1, 2025 expands sensitive data including neural data. Public-sector retirement under Maryland DoIT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. MPIPA up to $1,000 / violation. Private right of action: AG only. Maryland Computer Recycling Manufacturer Registration. EPA-authorized RCRA Subtitle C state.
Massachusetts Breach: M.G.L. c. 93H § 3 (Most expedient time)
Disposal: M.G.L. c. 93I
Records-disposal duty under M.G.L. c. 93I; 201 CMR 17.00 is the most prescriptive U.S. written-information-security-program (WISP) regulation. Chapter 93A treble damages for unfair / deceptive acts. Biometric privacy added Apr 2019. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any person or entity that receives, stores, maintains, processes, or otherwise has access to personal information of a Massachusetts resident (201 CMR 17.00 scope). Public-sector retirement under Massachusetts Executive Office of Technology Services and Security (EOTSS) policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $5,000 / violation; treble per Chapter 93A. Private right of action: AG only. Cathode-ray tube landfill ban. EPA-authorized RCRA Subtitle C state.
Michigan Breach: MCL § 445.72 (Most expedient time)
Disposal: MCL § 445.72a
Records-disposal duty under MCL § 445.72a; Identity Theft Protection Act civil penalties tiered $250 / $1,000 / $5,000 per violation. SSN Privacy Act MCL § 445.81 imposes additional safeguarding duty. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a Michigan resident. Identity Theft Protection Act + SSN Privacy Act dual safeguarding duty. Public-sector retirement under Michigan DTMB policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Identity Theft Protection Act $250 / $1,000 / $5,000 per violation. Private right of action: AG only. NREPA Part 173 e-waste; manufacturer registration. EPA-authorized RCRA Subtitle C state.
Minnesota Breach: Minn. Stat. § 325E.61 (Most expedient time)
Disposal: Minn. Stat. § 325M.05
Comp. privacy: MCDPA (Jul 31, 2025)
Records-disposal duty under Minn. Stat. § 325M.05; MCDPA (Jul 31, 2025) consumer-data minimization + deletion. Digital Fair Repair Act is the broadest U.S. Right to Repair regime. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business that conducts business in Minnesota or produces products / services targeted to Minnesota residents and that processes the personal data of 100K+ consumers (MCDPA threshold). Public-sector retirement under Minnesota IT Services (MNIT) policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $25,000 / violation under § 8.31. Private right of action: AG only. Digital Fair Repair Act (broadest in U.S.); Electronics Recycling Act. EPA-authorized RCRA Subtitle C state.
Mississippi Breach: Miss. Code § 75-24-29 (Most expedient time)
Disposal: Miss. Code § 75-24-29
Records-disposal duty under Miss. Code § 75-24-29; MCPA enforcement only (no comprehensive privacy law). NAIC IDS adopted Jul 1, 2019. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a Mississippi resident. NAIC IDS-adopted; insurance licensees in scope. MCPA enforcement only. Public-sector retirement under Mississippi Department of Information Technology Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $10,000 / violation under § 75-24-19. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Missouri Breach: Mo. Rev. Stat. § 407.1500 (Most expedient time)
Disposal: Mo. Rev. Stat. § 407.1500
Records-disposal duty + breach notice under Mo. Rev. Stat. § 407.1500; statute enumerates medical information in the personal-information definition. NAIC IDS adopted Aug 28, 2021. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a Missouri resident; statute enumerates medical information in the personal-information definition. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Missouri Office of Administration ITSD policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $150,000 / breach incident. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Montana Breach: Mont. Code § 30-14-1704 (Most expedient time)
Disposal: Mont. Code § 30-14-1703
Comp. privacy: MTCDPA (Oct 1, 2024)
Records-disposal duty under Mont. Code § 30-14-1703; MTCDPA (Oct 1, 2024) adds biometric / genetic as sensitive data. Genetic Information Privacy Act (GIPA) imposes separate consent + destruction duties. NAIC IDS adopted Oct 1, 2020. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business that conducts business in Montana or produces products / services targeted to Montana residents and that processes the personal data of 50K+ consumers (MTCDPA threshold). NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Montana SITSD policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $10,000 / violation under § 30-14-142. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Nebraska Breach: Neb. Rev. Stat. § 87-803 (Most expedient time)
Disposal: Neb. Rev. Stat. § 87-302
Records-disposal duty under Neb. Rev. Stat. § 87-302; biometric added by 2016 amendment to § 87-803. CPA § 59-1609 provides treble damages private right of action. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any commercial entity that conducts business in Nebraska and owns / licenses computerized data containing personal information of a Nebraskan. CPA private right of action with treble damages. Public-sector retirement under Nebraska Office of the CIO policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. CPA up to $10,000 / violation; treble damages. Private right of action: CPA § 59-1609 treble damages. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Nevada Breach: NRS § 603A.220 (Most expedient time)
Disposal: NRS § 603A.200
Records-disposal duty under NRS § 603A.200; NRS 597.970 IoT security law (Oct 1, 2020) requires reasonable security features on connected devices. NAIC IDS adopted Oct 1, 2023. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any data collector doing business in Nevada (NRS 603A definition). NRS 597.970 IoT manufacturer scope. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Nevada Office of the CIO policy. Gaming licensees: overlapping NV Gaming Control Board authority over patron-data controls. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. DTPA up to $5,000 / willful violation. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
New Hampshire Breach: RSA § 359-C:20 (Most expedient time)
Disposal: RSA § 359-C:20
Records-disposal duty + breach notice under RSA § 359-C:20; RSA 358-A Consumer Protection Act provides private right of action ($1,000 / violation). NAIC IDS adopted Jan 1, 2021. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a New Hampshire resident. RSA 358-A Consumer Protection Act provides private right of action. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under NH Department of Information Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. RSA 358-A actual or $1,000 / violation. Private right of action: RSA 358-A private action. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
New Jersey Breach: N.J.S.A. § 56:8-163 (Most expedient time)
Disposal: N.J.S.A. § 56:8-162
Comp. privacy: NJDPA (2025) (Jan 15, 2025)
Records-disposal duty under N.J.S.A. § 56:8-162; NJDPA (Jan 15, 2025) adds biometric / genetic as sensitive data. CFA § 56:8-1 provides treble damages + attorney fees. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a New Jersey resident; NJDPA effective Jan 15, 2025 controller threshold 100K+ consumers or 25K+ where revenue includes data sale. CFA treble damages + attorney fees private right of action. Public-sector retirement under NJ OIT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. CFA treble damages + attorney fees. Private right of action: CFA § 56:8-1 treble damages. Electronic Waste Management Act manufacturer EPR. EPA-authorized RCRA Subtitle C state.
New Mexico Breach: NMSA § 57-12C-6 (45 days)
Disposal: NMSA § 57-12C-3
Records-disposal duty under NMSA § 57-12C-3; breach notice in 45 days. NAIC IDS adopted Jan 1, 2022. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a New Mexico resident. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under NM Department of Information Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $25,000 / violation under § 57-12C-9. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
New York Breach: Gen. Bus. § 899-aa (Most expedient time)
Disposal: Gen. Bus. § 399-h
Records-disposal duty under Gen. Bus. § 399-h; SHIELD Act requires reasonable safeguards for any business holding NY-resident private information; NYDFS Part 500 (Mar 1, 2017; Nov 1, 2023 amendments) imposes cybersecurity-program duty on regulated financial institutions. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any person or business that owns or licenses computerized data of a New York resident (SHIELD Act scope). NYDFS-regulated financial institutions in scope for Part 500 cybersecurity-program duty. NAIC IDS-adopted (NYDFS Part 500 functions as state IDS standard). Public-sector retirement under NYS ITS policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $250,000 per breach under SHIELD. Private right of action: AG / NYDFS only. NY E-Cycles manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state.
North Carolina Breach: N.C.G.S. § 75-65 (Most expedient time)
Disposal: N.C.G.S. § 75-64
Records-disposal duty under N.C.G.S. § 75-64; UDTPA § 75-16 treble damages for unfair / deceptive trade practices. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a North Carolina resident. UDTPA treble damages private right of action. Public-sector retirement under N.C. Department of Information Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. UDTPA treble damages under § 75-16. Private right of action: UDTPA treble damages § 75-16. § 130A-309.130 manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state.
North Dakota Breach: N.D.C.C. § 51-30 (45 days; AG if 250+)
Disposal: N.D.C.C. § 51-30
Records-disposal duty + breach notice under N.D.C.C. § 51-30; AG notice when 250+ affected. § 51-33 SSN protection. NAIC IDS adopted Aug 1, 2023. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a North Dakota resident; AG notice when 250+ affected. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under NDIT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $5,000 / violation. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Ohio Breach: Ohio R.C. § 1349.19 (45 days; AG if 500+)
Disposal: Ohio R.C. § 1349.19
Records-disposal duty + breach notice under Ohio R.C. § 1349.19; 45-day consumer notice, AG notice when 500+ affected. Ohio Data Protection Act provides affirmative defense for entities aligned to a recognized cybersecurity framework (NIST, ISO, CIS). NAIC IDS adopted Mar 20, 2019. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of an Ohio resident. Ohio Data Protection Act provides affirmative defense for entities aligned to a recognized cybersecurity framework. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Ohio DAS / Office of IT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $10,000 / day after 60 days. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Oklahoma Breach: 24 O.S. § 163 (Most expedient time)
Disposal: 24 O.S. § 163
Records-disposal duty under 24 O.S. § 163; OCID Act 24 O.S. § 1781.1 prohibits SSN public posting. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of an Oklahoma resident. OCID Act 24 O.S. § 1781.1. Public-sector retirement under Oklahoma OMES Information Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $150,000 per breach under § 163.C. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Oregon Breach: ORS § 646A.604 (45 days; AG if 250+)
Disposal: ORS § 646A.622
Comp. privacy: Oregon Consumer Privacy Act (Jul 1, 2024)
Records-disposal duty under ORS § 646A.622; breach notice in 45 days; AG notice when 250+ affected. Oregon Consumer Privacy Act (Jul 1, 2024) adds biometric / genetic as sensitive data. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of an Oregon resident; OCPA controller threshold 100K+ consumers or 25K+ where revenue includes data sale. Public-sector retirement under Oregon Department of Administrative Services Enterprise Information Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. ORS § 646A.624 up to $1,000 / violation per person. Private right of action: AG only. Oregon E-Cycles manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state.
Pennsylvania Breach: 73 P.S. § 2303 (Most expedient time (2022 amendments))
Disposal: 73 P.S. § 2303
Records-disposal duty + breach notice under 73 P.S. § 2303 (2022 amendments expanded personal-information definition); UTPCPL § 201-9.2 provides private right of action with treble actual damages. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any entity that maintains, stores, or manages computerized data of a Pennsylvania resident. UTPCPL private right of action with treble damages. Public-sector retirement under Pennsylvania Office of Administration OA-OIT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. UTPCPL up to $1,000 / violation; treble actual damages. Private right of action: UTPCPL § 201-9.2 private action. Covered Device Recycling Act 35 P.S. § 6051.301 EPR. EPA-authorized RCRA Subtitle C state.
Rhode Island Breach: R.I.G.L. § 11-49.3-4 (45 days)
Disposal: R.I.G.L. § 11-49.3-3
Comp. privacy: RIDTPPA (Jan 1, 2026)
Records-disposal duty under R.I.G.L. § 11-49.3-3; breach notice in 45 days. RIDTPPA (Jan 1, 2026) consumer rights + data minimization. NAIC IDS adopted Jul 1, 2022. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a Rhode Island resident; RIDTPPA effective Jan 1, 2026 consumer rights + data minimization. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under RI Department of Administration ETSS policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $200 / violation under § 11-49.3-7. Private right of action: AG only. 23-19.6 manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state.
South Carolina Breach: S.C. Code § 39-1-90 (Most expedient time)
Disposal: S.C. Code § 30-2-310
Records-disposal duty under S.C. Code § 30-2-310; § 39-1-90 breach notification with private right of action ($1,000 per resident). S.C. Code § 38-99 was the FIRST U.S. NAIC Insurance Data Security adoption (Jan 1, 2019). SCUTPA treble damages. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a South Carolina resident. § 39-1-90(I) private right of action ($1,000 per resident). FIRST U.S. NAIC IDS adopter (Jan 1, 2019); insurance licensees in scope under S.C. Code § 38-99. Public-sector retirement under South Carolina Department of Administration DTO policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. $1,000 / resident; SCUTPA treble damages. Private right of action: § 39-1-90(I) private action. § 48-60 manufacturer EPR. EPA-authorized RCRA Subtitle C state.
South Dakota Breach: SDCL § 22-40-19 (Most expedient time (Jul 1, 2018))
Disposal: SDCL § 22-40-22
Records-disposal duty under SDCL § 22-40-22; SDCL § 22-40-19 (49th U.S. state to enact, Jul 1, 2018). DTPA § 37-24 provides private right of action. NAIC IDS adopted Jul 1, 2021. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any information holder doing business in South Dakota (SDCL § 22-40 scope; 49th U.S. state to enact, Jul 1, 2018). DTPA private right of action. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under SD BIT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $10,000 / day / violation. Private right of action: DTPA § 37-24 private action. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Tennessee Breach: Tenn. Code § 47-18-2107 (45 days; AG if 100+)
Disposal: Tenn. Code § 47-18-2110
Comp. privacy: TIPA (Jul 1, 2025)
Records-disposal duty under Tenn. Code § 47-18-2110; breach notice in 45 days, AG notice when 100+ affected. TIPA (Jul 1, 2025) is the ONLY U.S. comprehensive privacy law with NIST Privacy Framework affirmative defense. NAIC IDS adopted Jul 1, 2022. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business that conducts business in Tennessee or produces products / services targeted to Tennessee residents and that processes the personal data of 175K+ consumers (TIPA threshold, plus $25M+ revenue gating). TIPA NIST Privacy Framework affirmative defense (UNIQUE in U.S.). NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under TN STS policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. TIPA $7,500 / violation + treble for willful. Private right of action: AG only. Tenn. Code § 68-211-1001 manufacturer EPR. EPA-authorized RCRA Subtitle C state.
Texas Breach: Tex. Bus. & Com. Code § 521.053 (60 days)
Disposal: § 521.052
Comp. privacy: TDPSA (Jul 1, 2024)
Records-disposal duty under Tex. BCC § 521.052 + § 72.004 ($500 per record disposed in violation; § 72.004(b) safe harbor for certified third-party service); breach notice in 60 days, AG notice within 30 days when 250+ affected. TDPSA (Jul 1, 2024) consumer-data duties. CUBI ($25,000 per violation; $1.4B Meta settlement Jul 2024). Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business that conducts business in Texas or produces a product / service consumed by Texas residents and that processes consumers’ personal data (TDPSA Chapter 541 scope; no revenue or volume threshold, small-business carve-out per SBA definition). Tex. BCC § 521.052 reasonable-procedures duty universal. CUBI scope: any person who captures biometric identifiers for a commercial purpose. Public-sector retirement under Tex. Gov. Code § 2054.130 + DIR Texas Cybersecurity Framework. Sectoral overlays: HIPAA + TMRPA (broader than HIPAA), GLBA + Tex. Ins. Code Ch. 559 (NAIC IDS), FAR / DFARS / CMMC. ITEPA up to $50,000 / violation; up to $250,000 / breach. Private right of action: AG only. TCEQ Texas Computer Equipment Recycling Program. EPA-authorized RCRA Subtitle C state.
Utah Breach: Utah Code § 13-44-202 (Most expedient time)
Disposal: Utah Code § 13-44-201
Comp. privacy: UCPA (Dec 31, 2023)
Records-disposal duty under Utah Code § 13-44-201; UCPA (Dec 31, 2023) AG sole enforcer with up to $7,500 per violation. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any controller that conducts business in Utah or produces products / services targeted to Utah residents, has annual revenue of $25M+, and processes data of 100K+ consumers (UCPA threshold). Public-sector retirement under Utah DTS policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. UCPA up to $7,500 / violation. Private right of action: AG only. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Vermont Breach: 9 V.S.A. § 2435 (14-business-day AG preliminary; 45-day consumer)
Disposal: 9 V.S.A. § 2445
Records-disposal duty under 9 V.S.A. § 2445; breach notice 14 business days for AG preliminary, 45 days for consumer. 9 V.S.A. § 2446 was FIRST U.S. Data Broker Registration Law (Jan 1, 2019). NAIC IDS adopted Jan 1, 2022. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any data collector doing business in Vermont (9 V.S.A. § 2435 scope). 9 V.S.A. § 2446 data-broker registration applies to data brokers collecting Vermont-resident data. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Vermont Agency of Digital Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $10,000 per violation. Private right of action: AG only. 23-19.6 manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state.
Virginia Breach: Va. Code § 18.2-186.6 (Most expedient time)
Disposal: Va. Code § 59.1-443.2
Comp. privacy: VCDPA (Jan 1, 2023)
Records-disposal duty under Va. Code § 59.1-443.2; VCDPA (Jan 1, 2023) was SECOND U.S. comprehensive state privacy law. VCPA § 59.1-196 provides $500 / $1,000 statutory damages with private right of action. NAIC IDS adopted Jul 1, 2020. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business that conducts business in Virginia or produces products / services targeted to Virginia residents and that processes data of 100K+ consumers (VCDPA threshold). VCPA § 59.1-196 private right of action with $500 / $1,000 statutory damages. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Virginia VITA policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $150,000 per breach; VCPA $500 / $1,000 statutory. Private right of action: VCPA § 59.1-196 PRA. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.
Washington Breach: RCW § 19.255.010 (30 days; AG if 500+)
Disposal: RCW § 19.215.020
Comp. privacy: WAMHMDA (Mar 31, 2024)
Records-disposal duty under RCW § 19.215.020; breach notice in 30 days; AG notice when 500+ affected. WAMHMDA (Mar 31, 2024) is the broadest U.S. health-data private right of action. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any person or business that owns or licenses computerized data of a Washington resident. WAMHMDA covers any regulated entity processing consumer health data (broader than HIPAA covered entity). CPA private right of action available alongside AG action. Public-sector retirement under Washington WaTech policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. MHMDA / CPA up to $7,500 / violation + private action. Private right of action: WAMHMDA + CPA private actions. RCW 70A.500 E-Cycle Washington manufacturer EPR. EPA-authorized RCRA Subtitle C state.
West Virginia Breach: W. Va. Code § 46A-2A-101 (Most expedient time)
Disposal: § 46A-2A-101
Records-disposal duty under W. Va. Code § 46A-2A-101; CCPA § 46A-6-106 provides private right of action. NAIC IDS adopted Jan 1, 2021. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any business holding personal information of a West Virginia resident. CCPA § 46A-6-106 private right of action. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under WV OT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. CCPA up to $5,000 / violation. Private right of action: CCPA § 46A-6-106 private action. § 22-15A-22 manufacturer EPR (small business / household). EPA-authorized RCRA Subtitle C state.
Wisconsin Breach: Wis. Stat. § 134.98 (45 days)
Disposal: Wis. Stat. § 134.97
Records-disposal duty under Wis. Stat. § 134.97; breach notice in 45 days. NAIC IDS adopted Mar 1, 2022. E-Cycle Wisconsin (Wis. Stat. § 287.17) covered-electronics landfill ban. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any entity that owns or licenses computerized data of a Wisconsin resident. NAIC IDS-adopted; insurance licensees in scope. DATCP enforcement alongside AG. Public-sector retirement under Wisconsin DET policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. Up to $1,000 / violation under § 134.98(4). Private right of action: AG / DATCP only. E-Cycle Wisconsin § 287.17 manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state.
Wyoming Breach: Wyo. Stat. § 40-12-501 (Most expedient time)
Disposal: § 40-12-602
Records-disposal duty under § 40-12-602; 2015 amendments to Wyo. Stat. § 40-12-501 expanded personal-information definition (health-insurance + medical + biometric + shared user names). CPA § 40-12-108 provides private right of action. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Any individual or commercial entity that conducts business in Wyoming and owns / licenses computerized data of a Wyoming resident (2015 amendments expanded definition). CPA private right of action. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Wyoming ETS policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. CPA up to $5,000 / violation. Private right of action: CPA § 40-12-108 private action. No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state.

Reading the detailed reference. Each “Key Requirements” cell summarizes the state-specific records-disposal outcome standard, the breach-notification trigger (which in every state includes physical loss of unencrypted media or devices), the encryption / verified-sanitization safe harbor (every state recognizes encryption as a safe harbor under the breach statute, and NIST SP 800-88 Revision 2 sanitization removes data and the breach trigger from the asset entirely), the biometric or genetic privacy overlay where applicable, and the comprehensive consumer privacy law where applicable. The “Applicability” cell identifies the universe of covered entities + the public-sector retirement overlay administered by the state CIO / IT agency + the operative sectoral overlays (HIPAA, GLBA / FTC Safeguards Rule, NAIC IDS for insurance licensees, FAR 52.204-21 / DFARS 252.204-7012 / CMMC 2.0 for federal contractors). The “Penalties” cell consolidates the headline statutory penalty range with the private-right-of-action flag. The “E-Waste Law Notes” cell consolidates the state e-waste program type (EPR vs. landfill ban vs. no state program) with the state’s RCRA authorization status; 48 states administer RCRA Subtitle C through delegated authority while Alaska and Hawaii operate under direct U.S. EPA jurisdiction.

Quick-Filter Reference Tables

The master table answers “what does this state require?”; the quick-filter tables below answer “which states require X?” These are commonly used to scope multi-state IT asset retirement events, vendor due diligence, and risk acceptance memos.

States with the Strictest Breach-Notification Deadlines

Deadline States Citation
24 hours (public-sector AG) Idaho Idaho Code § 28-51-105
5 business days (AG window) Iowa Iowa Code § 715C.2
14 business days (AG preliminary) Vermont 9 V.S.A. § 2435
30 days Colorado, Florida, Maine, Washington C.R.S. § 6-1-716; Fla. Stat. § 501.171; 10 M.R.S. § 1348; RCW § 19.255.010
45 days Alabama, Alaska, Arizona, Maryland, New Mexico, North Dakota, Ohio, Oregon, Rhode Island, Tennessee, Wisconsin Code § 8-38; AS § 45.48; A.R.S. § 18-552; Md. Comm. Code § 14-3504; NMSA § 57-12C-6; N.D.C.C. § 51-30; Ohio R.C. § 1349.19; ORS § 646A.604; R.I.G.L. § 11-49.3-4; Tenn. Code § 47-18-2107; Wis. Stat. § 134.98
60 days Connecticut (+ 24-mo credit monitoring), Delaware (+ 12-mo credit monitoring), Louisiana (+ 10-day AG), Texas Conn. Gen. Stat. § 36a-701b; 6 Del. C. § 12B-101; La. R.S. § 51:3074; Tex. BCC § 521.053
“Most expedient time” All remaining states (outer-limit standard) Various

States with Private Right of Action

Twelve states provide a statutory private cause of action for breach, disposal, biometric, or UDAP-carryover violations. The remaining 38 states limit enforcement to the state AG or sectoral regulator.

State Statute Damages
Illinois BIPA 740 ILCS 14 $1,000 negligent / $5,000 intentional per violation; class-action exposure
California CCPA § 1798.150 $100 to $750 per consumer per incident statutory damages
Washington MHMDA + CPA CPA statutory damages + actual; MHMDA private action (broadest U.S. health-data PRA)
Virginia VCPA § 59.1-196 $500 / $1,000 statutory damages plus actual
New Jersey CFA N.J.S.A. § 56:8-1 Treble damages + reasonable attorney fees
Nebraska CPA § 59-1609 Treble damages
North Carolina UDTPA § 75-16 Treble damages
Pennsylvania UTPCPL § 201-9.2 Up to $1,000 / violation; treble actual damages
Arkansas DTPA § 4-88-113(f) Actual damages and reasonable attorney fees; up to $10,000 / violation
West Virginia CCPA § 46A-6-106 Actual damages; up to $5,000 / violation
Wyoming CPA § 40-12-108 Actual damages and reasonable attorney fees; up to $5,000 / violation
New Hampshire RSA 358-A Actual damages or $1,000 / violation
South Carolina § 39-1-90(I) + SCUTPA Actual damages; SCUTPA treble damages
South Dakota DTPA § 37-24 Actual damages
Texas DTPA + CAPTURE Act enforcement DTPA private action; CAPTURE Act AG only ($25K / violation)

States with Comprehensive Consumer Privacy Laws by Effective Date

Effective Date State / Law Citation Sensitive Data Notes
January 1, 2020 / 2023 California (CCPA / CPRA) (FIRST in U.S.) Cal. Civ. Code § 1798.100 Biometric + genetic sensitive; § 1798.150 PRA
January 1, 2023 Virginia (VCDPA) (SECOND in U.S.) Va. Code § 59.1-575 Biometric + genetic sensitive
July 1, 2023 Colorado (CPA), Connecticut (CTDPA) C.R.S. § 6-1-1301; Conn. Gen. Stat. § 42-515 Biometric sensitive (both)
December 31, 2023 Utah (UCPA) Utah Code § 13-61-101 AG sole enforcer
March 31, 2024 Washington (MHMDA) RCW § 19.373 Consumer health data; broadest U.S. health-data PRA
July 1, 2024 Florida (FDBR), Oregon (OCPA), Texas (TDPSA) Fla. Stat. § 501.171; ORS § 646A.570; Tex. BCC Chapter 541 Biometric + genetic sensitive
October 1, 2024 Montana (MTCDPA) Mont. Code § 30-14-2802 Biometric + genetic sensitive
January 1, 2025 Delaware (DPDPA), Iowa (Iowa CDPA), New Hampshire (NHPPDA), New Jersey (NJDPA) 6 Del. C. § 12D; Iowa Code § 715D; RSA § 507-H; N.J.S.A. § 56:8-166 Biometric + genetic sensitive (most)
July 1, 2025 Tennessee (TIPA) Tenn. Code § 47-18-3201 ONLY U.S. comprehensive law with NIST Privacy Framework affirmative defense
July 31, 2025 Minnesota (MCDPA) Minn. Stat. § 325O Biometric + genetic sensitive; phased to 2029 for small entities
October 1, 2025 Maryland (MODPA) Md. Comm. Code § 14-4601 Biometric + genetic + NEURAL sensitive
January 1, 2026 Indiana (CDPA), Rhode Island (RIDTPPA) Ind. Code § 24-15; R.I.G.L. § 6-48.5 Biometric + genetic sensitive (Indiana)

States with NAIC Insurance Data Security Model Law Adoption

30 states have adopted the NAIC Insurance Data Security Model Law imposing a written information security program with annual board certification on insurance licensees. South Carolina was the first U.S. state to adopt (effective January 1, 2019). The remaining 20 states have not adopted as of the research date.

Adoption Year States
2019 South Carolina (FIRST), Michigan, Mississippi, Ohio, Delaware, Connecticut, Alabama (partial)
2020 Iowa, Idaho, Louisiana, Montana, Virginia, New Hampshire (partial)
2021 New Hampshire, South Dakota, Missouri, West Virginia, Maine
2022 Hawaii, New Mexico, Vermont, Wisconsin, Wyoming, Tennessee, Rhode Island, Arkansas
2023 Nevada, North Dakota
2025 Alaska

States with Biometric or Genetic Privacy Overlays

State Statute Distinguishing Feature
Illinois BIPA 740 ILCS 14 $1,000 negligent / $5,000 intentional per violation; PRA; class-action exposure
Texas CUBI Tex. BCC Chapter 503 $25,000 / violation AG-only; $1.4B Meta settlement (Jul 2024)
Washington RCW § 19.375 + MHMDA Biometric Identifiers Act + My Health My Data Act
California CCPA / CPRA Biometric + genetic sensitive; § 1798.150 PRA
Maryland MODPA Md. Comm. Code § 14-4601 Biometric + genetic + NEURAL sensitive (effective Oct 1, 2025)
Arkansas Ark. Code § 4-110-103 Biometric + genetic consumer-rights provisions (2019 amendments)
Alaska AS § 18.13.010 Genetic data + criminal penalties for violations
Montana MTCDPA + Genetic Information Privacy Act (GIPA) Biometric + genetic sensitive; separate GIPA
Colorado CPA + HB24-1130 Biometric Act effective Jul 1, 2025
Massachusetts M.G.L. c. 93 (Apr 2019) Biometric in personal-information definition
Nebraska Neb. Rev. Stat. § 87-803 (2016) Biometric added to personal-information by 2016 amendment
Wyoming Wyo. Stat. § 40-12-501 (2015) 2015 amendments significantly expanded definition (biometric, medical, health-insurance)
Connecticut, Delaware, Florida, Indiana, Iowa, New Jersey, Oregon, Tennessee, Virginia Various state comprehensive privacy acts Biometric + genetic as sensitive data under each act

States with Manufacturer E-Waste Extended Producer Responsibility (EPR)

25 states have a manufacturer-funded electronics takeback program. Maine (38 M.R.S. § 1610, 2004) was the first state to enact; Hawaii HEWRRA (2008) was the earliest computer-specific EPR. Most state EPR programs cover consumer devices and small businesses; enterprise bulk disposal in EPR states usually routes through the federal RCRA hazardous-waste channel.

  • Manufacturer EPR + landfill ban: California (Electronic Waste Recycling Act, 2003), Maine (38 M.R.S. § 1610, 2004), Connecticut, Hawaii (HEWRRA), Illinois (EPRRA), Indiana, Maryland, Michigan (NREPA Part 173), Minnesota, New Jersey, New York (NY E-Cycles), North Carolina (§ 130A-309.130), Oregon (Oregon E-Cycles), Pennsylvania (Covered Device Recycling Act 35 P.S. § 6051.301), Rhode Island, South Carolina (§ 48-60), Tennessee, Vermont, Washington (RCW 70A.500 E-Cycle Washington), West Virginia (§ 22-15A-22 small business / household), Wisconsin (E-Cycle Wisconsin § 287.17), Colorado (HB22-1355).
  • No state EPR program (federal RCRA only): Alabama, Arizona, Arkansas, Delaware, Florida, Georgia, Idaho, Iowa, Kansas, Kentucky, Louisiana, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Mexico, North Dakota, Ohio, Oklahoma, South Dakota, Texas, Utah, Wyoming.

Federal Overlay Reference Card

A regulated enterprise must satisfy the stricter of (1) the destination-resident state’s breach, disposal, comprehensive privacy, biometric, insurance-licensee, and sector-specific statutes, (2) the federal sector-rule baseline below, and (3) customer or prime-contract clauses. The federal baseline applies regardless of state alignment.

Federal Regime Citation ITAD Relevance
HIPAA Security Rule 45 C.F.R. § 164.310(d)(2) Device and media disposal must implement policies for final disposition of electronic protected health information and the hardware and electronic media on which it is stored.
HIPAA Breach Notification Rule 45 C.F.R. § 164.400 Physical loss of unencrypted media triggers breach notification; NIST SP 800-88 verified sanitization is HHS safe harbor.
GLBA Safeguards Rule 16 C.F.R. Part 314 Written information security program with periodic risk assessment, encryption, access controls, secure disposal, and incident response for financial institutions.
FTC Disposal Rule 16 C.F.R. § 682.3 Reasonable measures to dispose of consumer report information; explicit reference to sanitization standards.
FAR 52.204-21 Federal Acquisition Regulation Basic safeguarding of covered contractor information systems including disposal of federal contract information.
DFARS 252.204-7012 Defense FAR Supplement NIST SP 800-171 controls for covered defense information including media sanitization per NIST SP 800-88; CMMC 2.0 transition through 2025-2026.
NIST SP 800-88 Revision 2 Federal civilian baseline (Sept 26, 2025) Clear / Purge / Destroy taxonomy and verification standard; HIPAA and HHS safe harbor; effectively the U.S. audit-defensible standard.
NIST SP 800-171 Revision 3 Protecting Controlled Unclassified Information Required for federal contractors and subcontractors handling CUI; media protection (MP) and media sanitization (MP-6) controls reference NIST SP 800-88.
RCRA (Resource Conservation and Recovery Act) 42 U.S.C. § 6901; 40 C.F.R. Parts 260-279 Cradle-to-grave hazardous-waste management; 48 states are authorized to administer their own RCRA programs. Alaska and Hawaii are direct U.S. EPA jurisdiction. CRT rules at 40 C.F.R. § 261.39 apply.
CMMC 2.0 Cybersecurity Maturity Model Certification (DoD) Three-tier certification (Level 1 / Level 2 / Level 3) for DoD contractors; Level 2 incorporates NIST SP 800-171; phased rollout through 2025-2028.

Integration with State E-Waste Regulations

Digital data destruction obligations and electronics recycling obligations are two regulatory regimes that intersect on the same device but operate under different statutes, different agencies, and different enforcement theories. Most enterprises handle them separately, treating data destruction as an information-security event and e-waste recycling as an environmental compliance event. That separation creates the single largest blindspot in U.S. IT asset disposition: the device that triggers a state breach-notification statute is the same device that may trigger a state e-waste landfill ban or a federal RCRA hazardous-waste rule, but the documentation, the vendor, and the audit trail are typically managed by different teams.

Twenty-five U.S. states have enacted electronics-recycling statutes. Twenty-five have not. Of the twenty-five with statutes, most operate as manufacturer-funded extended-producer-responsibility (EPR) programs designed for consumer takebacks, not enterprise bulk disposal. The practical effect: a Fortune 500 enterprise retiring 10,000 leased laptops typically falls outside its home state’s manufacturer-takeback program because the program is structured for households dropping off three devices, not enterprises decommissioning a fleet. That gap shifts the obligation back to the enterprise itself, operating through its own recycler, under its own contractual flow-downs, with its own Certificate of Recycling documentation chain.

Where State E-Waste Statutes Sit Relative to Data Destruction

The states with the broadest e-waste programs are California (Electronic Waste Recycling Act, 2003), Maine (38 M.R.S. § 1610, first state EPR in 2004), Washington (RCW 70A.500, 2006), Oregon (ORS 459A.305-365, 2007), Minnesota (Minn. Stat. § 115A.1310-1330, 2007), Connecticut (CGS § 22a-630, 2007), New Jersey (N.J.S.A. 13:1E-99.94, 2008), Illinois (415 ILCS 150, 2008), Michigan (MCL 324.17301, 2008), and Hawaii (Hawaii Electronic Waste Recycling and Recovery Act, 2008, the first U.S. computer-specific EPR). Each pairs with a state breach-notification statute that operates separately. A single retired laptop containing California-resident personal information is simultaneously subject to CCPA disposal duties (Cal. Civ. Code § 1798.105) AND California Electronic Waste Recycling Act (Public Resources Code § 42460-42486). One enforcement risk is the state Attorney General; the other is CalRecycle.

RCRA Subtitle C and the Hazardous-Waste Dimension

Federal Resource Conservation and Recovery Act (RCRA) Subtitle C governs hazardous waste, including the lead in cathode ray tube (CRT) monitors, mercury in older liquid-crystal-display backlights, certain rechargeable batteries (the Universal Waste rule at 40 C.F.R. Part 273), and circuit boards exceeding hazardous thresholds. Forty-eight U.S. states are authorized by the U.S. Environmental Protection Agency to administer their own RCRA Subtitle C programs. Alaska and Hawaii are not RCRA-authorized; federal EPA administers hazardous-waste rules directly in those two states. The practical implication: an enterprise retiring CRT monitors or older notebook batteries must comply with state-administered RCRA rules in 48 states and federal-administered RCRA rules in 2 states, in addition to any state-specific e-waste statute and in addition to data-destruction obligations.

Landfill Bans and Direct Enforcement Risk

Twenty-one U.S. states and territories have enacted landfill bans on covered electronics. The bans operate as direct enforcement risk: a haulier or generator that disposes of covered electronics in municipal solid waste landfill is subject to fines per device. California, Massachusetts, Pennsylvania, Connecticut, Minnesota, and Maine maintain the most aggressive landfill-ban enforcement. A typical fine schedule reaches $5,000 to $25,000 per violation. For an enterprise retiring 10,000 devices, a single mis-routed pallet can produce a $250,000+ landfill-ban exposure separate from any data-destruction exposure.

The Enterprise vs Consumer Applicability Gap

The most important strategic point: state electronics-recycling statutes are largely written for consumer takebacks, not enterprise bulk disposal. The covered-entity definition in most state EPR statutes targets manufacturers, retailers, and households, not commercial generators of end-of-life IT assets. The practical effect is that an enterprise must operate its own ITAD program, contract its own R2v3-certified or e-Stewards-certified recycler, retain its own Certificate of Recycling documentation, and assume its own enforcement risk under the landfill ban and RCRA rules. The state’s manufacturer-funded EPR program does not absorb commercial bulk disposal. Certified electronics recycling aligned to R2v3 framework with serialized Certificate of Recycling documentation closes that gap.

Federal Regulations and Best Practices

State data-destruction statutes operate on top of a federal regulatory architecture that establishes minimum substantive standards, defines covered entities by sector, and provides safe-harbor language that state laws incorporate by reference. An executive scoping enterprise IT asset disposition compliance must understand the federal regime first, then layer the state-by-state matrix on top. Federal rules establish the floor; state rules raise the ceiling.

HIPAA Security Rule and Breach Notification Rule

The HIPAA Security Rule at 45 C.F.R. § 164.310(d)(2)(i)-(ii) requires covered entities and business associates to implement policies and procedures for the disposal of electronic protected health information (ePHI) and the media on which it is stored. The HIPAA Breach Notification Rule at 45 C.F.R. § 164.408 requires a 60-day notification timeline to affected individuals and to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights. The encryption safe harbor at 45 C.F.R. § 164.402 means that PHI rendered unusable, unreadable, or indecipherable to unauthorized individuals through encryption or destruction satisfying NIST guidance is presumed to remove the breach-notification duty. HHS OCR has consistently invoked NIST SP 800-88 (now Revision 2 effective September 26, 2025) as the audit-defensible media-sanitization standard.

GLBA Safeguards Rule and the 2023 FTC Final Rule

The Gramm-Leach-Bliley Act Safeguards Rule at 16 C.F.R. Part 314 requires financial institutions to develop, implement, and maintain a comprehensive information-security program with administrative, technical, and physical safeguards. The FTC’s final rule amending the Safeguards Rule became effective June 9, 2023. The amended rule requires multifactor authentication, encryption of customer information at rest and in transit, secure disposal of customer information no later than two years after the most recent use, a written incident-response plan, annual reporting to the board of directors by a qualified individual, and continuous monitoring. The secure-disposal element extends to retired IT assets: every device that held customer information at any point in its life must be sanitized to NIST guidance before disposition.

FACTA Disposal Rule

The Fair and Accurate Credit Transactions Act (FACTA) Disposal Rule at 16 C.F.R. § 682.3 applies to any person, entity, or business that possesses or maintains consumer report information for a business purpose. The rule requires reasonable measures to protect against unauthorized access to or use of the information in connection with its disposal. Compliance methods named in the rule include burning, pulverizing, or shredding papers; destroying or erasing electronic media so the information cannot practicably be read or reconstructed; and conducting due diligence on a document-destruction contractor. The Morgan Stanley OCC enforcement action ($60 million, 2020) for unencrypted server-decommission drives is the leading FACTA-Disposal-Rule precedent on enterprise IT asset disposition.

FAR 52.204-21 and Federal Contractor Information Systems

FAR 52.204-21 (Basic Safeguarding of Covered Contractor Information Systems) imposes 15 baseline NIST security controls on every federal contractor or subcontractor that processes federal contract information. Control (b)(1)(viii) requires sanitization or destruction of information system media containing federal contract information before disposal or release for reuse. The clause flows down to every level of the federal supply chain regardless of contract size and applies to commercial subcontractors holding federal contract information.

DFARS 252.204-7012 and NIST SP 800-171 Revision 3

DFARS 252.204-7012 (Safeguarding Covered Defense Information and Cyber Incident Reporting) imposes the full set of NIST SP 800-171 controls on defense contractors and subcontractors handling Controlled Unclassified Information (CUI). NIST SP 800-171 Revision 3 (published May 14, 2024) is the operative version. Control MP.L2-3.8.3 requires sanitization or destruction of system media containing CUI before disposal or release for reuse, using mechanisms with strength and integrity commensurate with the security category or classification of the information. NIST SP 800-88 Revision 2 is the implementation standard.

CMMC 2.0 Rolling Enforcement

The Cybersecurity Maturity Model Certification (CMMC) 2.0 program is the Department of Defense’s third-party assessment mechanism for NIST SP 800-171 compliance in the defense industrial base. CMMC 2.0 final rule was published in October 2024; rolling enforcement through DFARS clause inclusion runs through 2028. Level 1 (self-attestation) applies to federal contract information; Level 2 (third-party assessment for prioritized contracts, self-assessment for others) applies to CUI; Level 3 (DCMA-led assessment) applies to the highest-priority CUI. Media sanitization (MP.L2-3.8.3) is a required practice at Level 2 and Level 3. The strategic implication for non-defense enterprises: commercial customers, federal civilian customers, and state government customers are increasingly flowing down CMMC-aligned media-sanitization requirements through their own vendor contracts.

RCRA Subtitle C and Universal Waste Rule

The federal Resource Conservation and Recovery Act (RCRA) Subtitle C at 42 U.S.C. § 6921-6939g governs hazardous waste from generation through transportation, treatment, storage, and disposal. The Universal Waste Rule at 40 C.F.R. Part 273 streamlines compliance for batteries, certain pesticides, mercury-containing equipment, and lamps. For enterprise IT asset disposition, the RCRA dimension is materially significant for CRT monitors (lead glass), older notebook batteries, mercury-backlit LCDs, and circuit boards exceeding hazardous-characteristic thresholds. Enterprises operating across multiple states must understand that 48 states administer RCRA directly while Alaska and Hawaii are under direct federal EPA RCRA jurisdiction.

NIST SP 800-88 Revision 2 and the U.S. Defensible Baseline

NIST Special Publication 800-88 Revision 2 (Guidelines for Media Sanitization), effective September 26, 2025, is the U.S. civilian audit-defensible media-sanitization standard. It defines three sanitization categories: Clear (logical techniques such as cryptographic erase or overwrite), Purge (physical or logical techniques such as degaussing or block erase that resist sophisticated laboratory-level recovery), and Destroy (physical destruction such as shredding, disintegration, pulverizing, melting, or incineration). Revision 2 was published in two phases (initial public draft January 2025, final September 26, 2025) and aligns with IEEE 2883-2022 (Standard for Sanitizing Storage). State breach-notification statutes that include an encryption-or-sanitization safe harbor incorporate NIST 800-88 by reference, explicitly or implicitly. The single most important operational decision an enterprise can make in IT asset disposition is to require NIST SP 800-88 Revision 2 verified sanitization on every retired device, regardless of the state the data resides in. Secure data destruction certified to NIST SP 800-88 Revision 2 with serialized Certificate of Destruction satisfies the substantive outcome standard of every U.S. state simultaneously.

Enforcement, Penalties, and Compliance Challenges

The penalty bands listed in state statutes understate the actual enforcement risk an enterprise carries on retired IT assets. The headline numbers (per-record fines, statutory maximums, per-day caps) are the floor. The real enforcement risk operates through a stack of overlapping regulators, private rights of action, contractual flow-downs, insurance underwriting consequences, and reputational damage that compounds across the stack. Executives scoping compliance posture must understand the full enforcement picture, not just the per-statute numbers.

Leading Enforcement Actions Against Enterprise IT Asset Disposition Failures

The Morgan Stanley OCC enforcement action ($60 million civil money penalty, October 2020) is the leading U.S. enforcement precedent on enterprise IT asset disposition failures. The Office of the Comptroller of the Currency found that Morgan Stanley failed to exercise proper oversight of the 2016 decommissioning of two wealth-management data centers; the bank engaged a vendor that resold servers without sanitizing customer data; unencrypted server drives surfaced on online auction sites. The OCC penalty operated under 12 C.F.R. § 30 Safety and Soundness Standards (which incorporate GLBA Safeguards Rule expectations) and the FACTA Disposal Rule. Morgan Stanley separately faced class-action settlements exceeding $60 million on the same incident.

The U.S. Department of Health and Human Services Office for Civil Rights (HHS OCR) has consistently enforced HIPAA disposal rules. Representative settlements include Affinity Health Plan ($1.2 million, 2013, for failing to sanitize copier hard drives before returning leased units), Cottage Health ($3 million, 2018, for breach of unsecured ePHI on test environment servers), Anthem ($16 million, 2018, for breach affecting 78.8 million individuals), and Athens Orthopedic Clinic ($1.5 million, 2020, for breach affecting 208,557 individuals).

Illinois Biometric Information Privacy Act (BIPA) class-action settlements have set the U.S. high-water mark for biometric-data exposure. Facebook settled BIPA claims for $650 million (2020). TikTok settled BIPA claims for $92 million (2021). Snapchat settled for $35 million (2022). Each of these settlements operated under BIPA’s private right of action at 740 ILCS 14/20 with $1,000 statutory damages for negligent violations and $5,000 for intentional or reckless violations, multiplied by the affected class size.

California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA) enforcement actions include the Sephora $1.2 million California Attorney General settlement (2022) for selling personal information without disclosure and DoorDash $375,000 (2024) for similar failures. The CCPA private right of action at Cal. Civ. Code § 1798.150 provides statutory damages of $100 to $750 per consumer per incident for breach of personal information resulting from a covered entity’s failure to maintain reasonable security procedures and practices.

New York Department of Financial Services (NYDFS) enforcement under 23 NYCRR 500 (Cybersecurity Requirements for Financial Services Companies) has produced consistent multi-million-dollar settlements: First American Financial ($1.5 million, 2022), Robinhood Crypto ($30 million, 2022), and EyeMed Vision Care ($4.5 million, 2022, in coordination with the New York Attorney General). NYDFS examines retired-device sanitization documentation as part of every routine cybersecurity examination of regulated entities.

Multi-State Breach Notification as the Number-One Logistical Challenge

A single retired-device incident affecting a multi-state customer base can trigger 30 to 50 state breach-notification obligations simultaneously. Each state operates a different timeline (24-hour public-sector Attorney General notice in Idaho; 14-business-day preliminary AG notice in Vermont; 30 days in Florida, Colorado, Maine, Washington; 45 days in Ohio, Wisconsin, Tennessee, Indiana; 60 days in Texas, Connecticut, Rhode Island; “most expedient time” elsewhere), a different content requirement for consumer notice, a different content requirement for AG notice, a different attestation requirement for free credit monitoring, a different threshold for AG-only notice, and a different mechanism for substitute notice. An enterprise that retires a single multi-state laptop fleet without verified sanitization has converted a single operational event into a 30-state regulatory-coordination event with statutory damages exposure under each state’s penalty band.

Compliance Challenges in Modern IT Asset Disposition

Beyond statute timing, enterprise IT asset disposition compliance carries five recurring operational challenges: vendor management (downstream recycler chain-of-custody integrity, R2v3 or e-Stewards certification verification, contractual flow-down of safeguards); work-from-home device returns (the home-to-office transit gap where personal-use data may be commingled with corporate data on devices that never touched the corporate office); lost-device scenarios (laptop misplaced at airport, courier delivery exception, theft during transit, the question whether physical loss of unencrypted media is itself a breach trigger under each state’s statute); device-lease end-of-term returns (the manufacturer-takeback program disposes of the device but provides no Certificate of Destruction to the enterprise, leaving an audit gap); and acquired-company device inventories (M&A diligence routinely surfaces target-company devices that were retired without documentation, creating successor-liability exposure).

Audit Defense and Documentation Burden

The audit-defense burden falls on the enterprise, not the recycler. SOC 2 Type II audits, ISO 27001 certification audits, HIPAA OCR audits, NYDFS examinations, federal customer audits under FAR 52.204-21 and DFARS 252.204-7012, state customer audits under public-sector IT-disposal posture, and customer due-diligence audits under SOC 2 sub-service-organization rules all require the enterprise to produce serialized Certificates of Destruction, chain-of-custody logs, environmental disposition records, hazardous-waste manifests where applicable, and contracted-service safeguard terms. An enterprise that did not require its IT asset disposition vendor to produce this documentation at the time of disposition has no path to reconstruct it after the fact.

Why Enterprises Must Go Beyond Minimum Legal Requirements

The state statutory minimums catalogued in the 50-state tables above are the floor of enterprise IT asset disposition compliance, not the ceiling. Sophisticated enterprises operate above the floor for seven business reasons that have nothing to do with avoiding statutory penalties. Each reason carries financial impact that, individually, exceeds the statutory penalty band of any single state.

Reason 1: Reputational Risk Exceeds Statutory Penalty

A single dumpster-find incident, eBay-find incident, or online-auction-find incident creates national press coverage, social-media amplification, customer churn, employee-trust erosion, and brand-equity damage that materially exceeds any state statutory penalty. The Morgan Stanley OCC penalty was $60 million; the reputational and litigation cost over the next 24 months exceeded $120 million by reasonable estimate. The statutory penalty is the visible piece of the iceberg; the reputational impact is the submerged mass.

Reason 2: Cyber-Liability Insurance Underwriting

Cyber-liability and technology errors-and-omissions insurance underwriters now ask, as part of the standard application: Do you require NIST SP 800-88 sanitization on every retired device? Do you maintain serialized Certificates of Destruction? Do you maintain chain-of-custody documentation from generator to downstream recycler? Do you require R2v3 or e-Stewards certification of your IT asset disposition vendor? Negative answers trigger premium increases of 15 to 40 percent, coverage exclusions for retired-device incidents, sub-limits on disposal-related claims, and in some cases coverage decline. A single Certificate of Destruction infrastructure investment frequently pays back through reduced premiums within the first renewal cycle.

Reason 3: Mergers and Acquisitions Diligence

Acquirer diligence routinely includes the question: produce the Certificate of Destruction inventory for every retired device over the past three years. Gaps result in price reductions, escrow withholds, representation-and-warranty insurance carve-outs, and in extreme cases deal collapse. A target company that operationalized Certificate of Destruction documentation from the start has a defensible answer; a target that did not is exposed.

Reason 4: Contractual Flow-Down from Federal and Commercial Customers

Federal customers under FAR 52.204-21 and DFARS 252.204-7012 require flow-down of media-sanitization obligations to every subcontractor at every tier. Commercial customers under SOC 2 require flow-down to service providers and sub-service organizations. ISO 27001 customers require flow-down to vendors processing in-scope information. HIPAA covered entities require Business Associate Agreements with downstream business associates. The enterprise that operationalizes NIST 800-88 Revision 2 sanitization once has a single answer that satisfies every contractual flow-down simultaneously.

Reason 5: SOC 2, ISO 27001, HIPAA, and PCI DSS Audit Requirements

Every major audit framework requires documented media-sanitization procedures and serialized destruction evidence. SOC 2 Type II Common Criteria CC6.5 (the entity discontinues use of physical devices and removable media when an authorized user leaves the entity or after the device’s authorized use period); ISO 27001 Annex A 7.10 (storage media) and A 7.14 (secure disposal or reuse of equipment); HIPAA Security Rule 45 C.F.R. § 164.310(d)(2)(i)-(ii); PCI DSS Requirement 9.4.7 (disposal of media containing cardholder data). The same NIST 800-88 Revision 2 evidence packet satisfies all of them.

Reason 6: ESG, Sustainability, and Investor Reporting

Institutional investors, customers, and ratings agencies increasingly ask for e-waste recycling tonnage, R2v3 or e-Stewards certification status of downstream recyclers, reuse rate vs recycling rate vs landfill rate, embodied-carbon disclosure on retired assets, and downstream-vendor environmental compliance status. The ITAD program is increasingly a sustainability program reported in 10-K disclosures, CDP submissions, and ESG ratings. A defensible ITAD program is a defensible ESG narrative.

Reason 7: Ransomware Claim Payout and Insurance Carrier Conditions

Cyber-insurance carriers paying ransomware claims now condition payout on the insured’s ability to demonstrate retired-device chain-of-custody and sanitization documentation. Insurers do this to confirm that the ransomware vector did not enter through an inadequately sanitized retired device that was somehow returned to the supply chain. Enterprises without serialized Certificate of Destruction documentation face delayed payouts and contested claims.

The Defensible Baseline That Satisfies Every Driver Above the Floor

A single operating baseline satisfies every state breach-notification safe harbor, every federal regime, every major audit framework, every cyber-insurance underwriting question, every M&A diligence request, and every ESG reporting expectation: NIST SP 800-88 Revision 2 verified sanitization (Clear, Purge, or Destroy, selected per data sensitivity and media type), serialized Certificate of Destruction per device, chain-of-custody log with timestamped handoffs from generator to downstream recycler, R2v3-certified or e-Stewards-certified downstream recycler, Certificate of Recycling at the disposition end-state, and environmental disposition record reconciled against the inbound serialized asset list. The enterprise that operationalizes that baseline once is defensible everywhere at once.

Why Choose All Green Recycling, LLC. for State and Federal Compliance

The 50-state regulatory matrix documented above is the operating environment for every U.S. enterprise retiring IT assets. All Green Recycling, LLC is the IT asset disposition partner that operationalizes the defensible baseline across all 50 states from a single point of engagement, with serialized documentation that withstands regulator inquiry, audit examination, customer due diligence, M&A diligence, and insurance underwriting review.

Certifications and Frameworks

All Green Recycling, LLC operates an integrated certification architecture covering data-security, environmental, quality, and occupational safety:

  • R2v3 (Responsible Recycling Version 3): the leading electronics-recycling framework with downstream-vendor traceability and data-sanitization core requirements.
  • e-Stewards: the Basel Action Network certification with the strictest restrictions on hazardous-waste export.
  • NAID AAA (National Association for Information Destruction): the leading data-destruction industry certification with operational, security, employee, vehicle, and process audits.
  • ISO 14001: environmental management system.
  • ISO 45001: occupational health and safety management system.
  • ISO 9001: quality management system.
  • NIST SP 800-88 Revision 2 alignment: every retired device is sanitized to the U.S. civilian audit-defensible baseline.

50-State Service Coverage from a Single Engagement

All Green Recycling, LLC delivers IT asset disposition services across all 50 U.S. states from a single point of engagement, with consistent serialized documentation, consistent chain-of-custody handling, and consistent Certificate of Destruction packaging regardless of which state the asset originated in. The multi-state operational footprint eliminates the vendor-by-state coordination overhead that fragments compliance posture and creates audit gaps.

Documentation Packet for Compliance, Legal, Audit, and Insurance

Every IT asset disposition engagement produces a documentation packet retrievable in a single retrieval through IT asset reporting:

  • Serialized inbound asset list with make, model, serial number, asset tag, and condition.
  • Chain-of-custody log with timestamped handoffs from generator pickup through receipt, processing, sanitization, and downstream disposition.
  • Certificate of Destruction per device, referencing NIST SP 800-88 Revision 2 (Clear, Purge, or Destroy), with operator identification and timestamp.
  • Certificate of Recycling at the disposition end-state, identifying downstream R2v3 or e-Stewards certified vendor.
  • Environmental disposition record reconciled against the inbound asset list.
  • Hazardous-waste manifest where the asset profile triggers RCRA Subtitle C handling (CRT lead glass, mercury LCDs, batteries, circuit boards exceeding hazardous thresholds).
  • Contracted-service safeguard terms aligned to FTC Safeguards Rule and HIPAA Business Associate expectations.

Service Capability Across Every Sanitization Outcome

All Green Recycling, LLC operates the full sanitization capability stack to match every data sensitivity and media type to the appropriate NIST SP 800-88 Revision 2 outcome:

Sector-Specific Compliance Experience

All Green Recycling, LLC operates programmatic engagement models across the regulated sectors most exposed to IT asset disposition risk:

  • Healthcare (HIPAA Security Rule, HIPAA Breach Notification Rule, HITECH, state health-information privacy overlays, state genetic-data laws).
  • Financial services (GLBA Safeguards Rule, FACTA Disposal Rule, NYDFS 23 NYCRR 500, state insurance department supervision, NAIC Insurance Data Security Model Law adoptions).
  • Defense industrial base (FAR 52.204-21, DFARS 252.204-7012, NIST SP 800-171 Revision 3, CMMC 2.0, ITAR/EAR, NISPOM at 32 C.F.R. Part 117).
  • Education (FERPA, state student-data privacy statutes including California SOPIPA at Cal. Bus. & Prof. Code § 22584 and similar laws in 15 states).
  • Government (state public-sector IT-disposal posture, federal civilian agency IT asset disposition, state CIO and CISO office standards).
  • Insurance (NAIC Insurance Data Security Model Law adopted in 30 states beginning with South Carolina § 38-99 effective January 1, 2019).
  • Technology, retail, manufacturing, and professional services exposed through state comprehensive consumer privacy laws (21 states with effective dates from January 1, 2020 through January 1, 2026).

Programmatic Engagement Model for Multi-Site Enterprise Retirements

All Green Recycling, LLC operates a programmatic engagement model for multi-state, multi-site enterprise IT asset retirements: single point of contact, integrated IT equipment packaging and transportation, consolidated reverse logistics and chain-of-custody tracking, scheduled audit-defense support for regulator inquiry, and post-engagement asset remarketing for qualifying devices with residual value recovery applied against the engagement cost.

Engagement Path

Enterprises scoping IT asset disposition with multi-state regulatory exposure can engage All Green Recycling, LLC through any of the service entry points: IT asset disposition for end-to-end engagement management, secure data destruction for sanitization-only programs, certified electronics recycling for environmental disposition, secure equipment destruction for non-data sensitive assets, or asset remarketing for residual-value recovery engagements. Each engagement produces the full IT asset reporting documentation packet aligned to the 50-state compliance architecture documented above.

Frequently Asked Questions

Which state has the strictest data destruction standard?

No single state has the strictest standard across all dimensions; “strictest” depends on the dimension. For breach notification timeline, Idaho (24-hour public-sector AG notice) and Vermont (14-business-day AG preliminary) are strictest. For records-disposal outcome standard, Massachusetts 201 CMR 17.00 WISP is the most prescriptive U.S. WISP. For biometric exposure, Illinois BIPA at 740 ILCS 14 is the strongest private right of action. For e-waste, Maine (38 M.R.S. § 1610, 2004) was first and California Electronic Waste Recycling Act (2003) imposes the broadest landfill ban. Enterprises operating across multiple states should design to NIST SP 800-88 Revision 2 verified sanitization, which satisfies the substantive outcome standard of every state simultaneously.

Which states have no records-disposal statute?

A small minority of states do not have a dedicated records-disposal statute; disposal duty in those states operates through (1) the breach-notification statute, (2) the state Consumer Protection Act or UDAP statute as a carryover claim, (3) sector-specific overlays such as healthcare or insurance data security, and (4) the federal FTC Disposal Rule at 16 C.F.R. § 682.3. The absence of a state disposal statute does not eliminate the disposal duty; it shifts the regulatory hook to consumer-protection or sector-specific authority.

Does encryption or verified sanitization remove the breach-notification duty?

Yes in most states. The vast majority of state breach-notification statutes define “personal information” to exclude data that is encrypted with a key not also compromised, or that has been rendered unreadable through verified sanitization. NIST SP 800-88 Revision 2 verified sanitization (Clear, Purge, or Destroy depending on data sensitivity and media type) is the operative U.S. civilian baseline and HHS / HIPAA safe harbor. The per-state pages document each state’s exact safe-harbor language; the federal FTC Disposal Rule and HIPAA Breach Notification Rule operate as the floor.

Which states have adopted the NAIC Insurance Data Security Model Law?

30 states have adopted the NAIC Insurance Data Security Model Law as of the research date. South Carolina was the first U.S. state to adopt (S.C. Code § 38-99, effective January 1, 2019). The complete adoption table is in the Quick-Filter Reference section above. The model imposes a written information security program with annual board certification on insurance licensees, including disposal-of-nonpublic-information duties that survive hardware retirement.

Which states have a comprehensive consumer privacy law?

21 states have enacted a comprehensive consumer data privacy act as of the research date. California was first (CCPA effective January 1, 2020); Virginia was second (VCDPA effective January 1, 2023). The full list with effective dates is in the Quick-Filter Reference section above; Tennessee TIPA (effective July 1, 2025) is unique in providing a NIST Privacy Framework affirmative defense.

Which states have a private right of action for breach or disposal failures?

Approximately 12 to 15 states provide a statutory private cause of action for breach, disposal, biometric, or UDAP-carryover violations. Illinois BIPA ($1,000 negligent / $5,000 intentional per violation) and California CCPA § 1798.150 ($100 to $750 per consumer per incident) are the most exposure-heavy. New Jersey CFA, Nebraska CPA, North Carolina UDTPA, and Pennsylvania UTPCPL provide treble damages. The complete list is in the Quick-Filter Reference section above.

Which states have a manufacturer-funded electronics takeback program?

25 states have a manufacturer extended producer responsibility (EPR) program covering electronics. Maine (38 M.R.S. § 1610, 2004) was the first state to enact; Hawaii HEWRRA (2008) was the earliest computer-specific EPR. Most state EPR programs cover consumer devices and small businesses; enterprise bulk disposal usually routes through the federal RCRA hazardous-waste channel even in EPR states. The complete list is in the Quick-Filter Reference section above.

What are Alaska and Hawaii’s RCRA situations?

Alaska and Hawaii are the two U.S. states that have not received federal authorization to administer their own RCRA hazardous-waste program. In both states, RCRA enforcement is direct U.S. EPA jurisdiction (EPA Region 10 for Alaska; EPA Region 9 for Hawaii). The substantive federal hazardous-waste rules at 40 C.F.R. Parts 260-279 apply identically; the regulator and the administrative enforcement path are federal rather than state.

How should an enterprise document compliance across all 50 states for a single ITAD engagement?

Document compliance to the strictest applicable state plus the federal baseline. For data on retired hardware, the documentation packet should include: (1) serialized asset list with serial numbers, media types, and data classifications, (2) chain-of-custody log with timestamped handoffs from enterprise custody through final disposition, (3) Certificate of Data Destruction per asset referencing NIST SP 800-88 Revision 2 (Clear, Purge, or Destroy), (4) Certificate of Recycling with downstream disposition, (5) environmental disposition record and hazardous-waste manifests where applicable, (6) certifications-and-frameworks alignment statement (ISO 14001, ISO 45001, R2v3, NAID AAA, e-Stewards), and (7) the contracted-service safeguard terms. This packet satisfies the documentation expectations of every state AG, every sector regulator (HHS OCR, FTC, NYDFS, OCC), and every federal prime contractor.

Which media-sanitization standard is the U.S. audit-defensible standard?

NIST Special Publication 800-88 Revision 2 (operative September 26, 2025) is the U.S. civilian audit-defensible standard. NIST SP 800-88 Revision 2 defines a Clear / Purge / Destroy taxonomy aligned to media type and data sensitivity, requires verification of sanitization (not just attestation), and is referenced by HIPAA, HHS, FTC, NYDFS, and DoD. NIST SP 800-88 Revision 2 supersedes Revision 1 and is the operative standard for all current ITAD engagements.

Where can I review a single state’s full compliance posture?

Each state name in the master comparison table above is a link to that state’s dedicated v1.3.4 compliance page. Each state page covers the breach-notification statute, records-disposal statute, comprehensive privacy law if applicable, biometric / genetic / sector-specific overlays, NAIC Insurance Data Security adoption, federal preemption matrix, public-sector IT disposal posture, ITAD-specific safe-harbor analysis, enterprise / commercial e-waste applicability, RCRA authorization status, statutory penalty schedule with private-right-of-action determinations, state sectoral regulators (banking, insurance, health, higher-education, public-utility commission), and 11 statute-anchored FAQs.

Compliance as Continuous Risk-Management Posture

Digital data destruction compliance across 50 states is a continuous control posture, not a periodic disposal event. The state-by-state patchwork is real, but the audit-defensible documentation packet is consistent: serialized destruction records aligned to NIST SP 800-88 Revision 2, chain-of-custody continuity, environmental disposition evidence, hazardous-waste manifests where applicable, and the contracted-service safeguard terms. Enterprises that operationalize that record set carry defensible compliance posture across regulator inquiry (state AG, HHS OCR, FTC, NYDFS, state insurance department), audit cycle (SOC 2, HIPAA, GLBA, DFARS / CMMC, customer due diligence), and incident response.

All Green Recycling, LLC operationalizes that posture through IT asset disposition, secure data destruction, certified electronics recycling, secure equipment destruction, and reverse logistics and chain-of-custody tracking with serialized documentation aligned to the state-by-state architecture above.

Service Reference