Every IT asset retirement in the United States is a layered compliance event, governed at minimum by (1) the destination-resident state’s breach-notification statute, (2) the destination-resident state’s records-disposal statute, (3) any applicable state comprehensive consumer privacy law, (4) any applicable biometric, genetic, insurance-licensee, or sector-specific overlay, (5) the federal HIPAA Security Rule, FTC Disposal Rule, FTC Safeguards Rule, GLBA, FAR 52.204-21, and DFARS 252.204-7012 baseline, and (6) the federal RCRA hazardous-waste program (delegated to 48 states; direct U.S. EPA jurisdiction in Alaska and Hawaii).
This reference consolidates all 50 jurisdictions into a single executive briefing for in-house compliance, legal, and procurement teams scoping multi-state IT Asset Disposition programs; each state row links to a full compliance page with statute citations, recent enforcement context, penalty bands.

Across the 50 U.S. states, the regulatory posture for digital data destruction can be summarized in seven dimensions:
Each state row in the table below links to a full compliance page covering that state’s statutes, regulators, penalty bands, federal-overlay preemption matrix, state sectoral regulators, recent enforcement context, and 11 statute-anchored FAQs. The master table is designed for at-a-glance scanning; the linked state page is the audit-defensible reference.
| State | Breach Notification | Disposal Statute | Comprehensive Privacy Law | Biometric / Genetic Overlay | NAIC Insurance Data Security | Private Right of Action | State E-Waste Program | RCRA Authorization | Headline Penalty Band |
|---|---|---|---|---|---|---|---|---|---|
| Alabama | Code § 8-38-1 45 days; AG if > 1,000 |
No dedicated statute | None | None | Not adopted | NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $5,000 / day, up to $500,000 / breach |
| Alaska | AS § 45.48.010 45 days |
AS § 45.48.500 | None | Genetic AS § 18.13.010 | YES Jul 1, 2025 |
NO (AG only) | No EPR; hazardous-waste rules apply | NO (direct EPA jurisdiction) | Up to $500 / resident; cap $50,000 government |
| Arizona | A.R.S. § 18-552 45 days; broadened to ransomware 2018 |
A.R.S. § 44-7601 | None | None | Not adopted | NO (AG only) | Voluntary recycling; no landfill ban | YES | Up to $500,000 per breach series; willful |
| Arkansas | Ark. Code § 4-110-105 Most expedient time; AG if > 1,000 |
Ark. Code § 4-110-104 | None | Biometric + Genetic § 4-110-103 (2019) | YES Jan 1, 2022 |
YES (DTPA § 4-88-113(f)) | No EPR; hazardous-waste rules apply | YES | DTPA up to $10,000 / violation |
| California | Cal. Civ. Code § 1798.82 Most expedient time; AG if 500+ |
Cal. Civ. Code § 1798.81 | CCPA / CPRA Jan 1, 2020 (CCPA); Jan 1, 2023 (CPRA) |
CCPA biometric / genetic | Not adopted | YES (CCPA § 1798.150 PRA) | Electronic Waste Recycling Act (2003); landfill ban; SB 244 RtR Jul 1, 2024 | YES | CCPA $2,500 / $7,500 per violation; § 1798.150 $100–$750 per consumer |
| Colorado | C.R.S. § 6-1-716 30 days (strictest in U.S.) |
C.R.S. § 6-1-713 | Colorado Privacy Act Jul 1, 2023 |
CPA biometric (HB24-1130) | Not adopted | NO (AG / DA enforcement) | E-waste landfill ban (Jul 2013); EPR programs HB22-1355 | YES | Up to $20,000 / violation |
| Connecticut | Conn. Gen. Stat. § 36a-701b 60 days + 24-mo credit monitoring (SSN) |
§ 36a-701b | CTDPA Jul 1, 2023 |
CTDPA biometric | YES Oct 1, 2019 |
NO (AG only) | E-waste manufacturer takeback; battery EPR | YES | CUTPA up to $5,000 / violation |
| Delaware | 6 Del. C. § 12B-101 60 days + 12-mo credit monitoring |
6 Del. C. § 5002C | DPDPA Jan 1, 2025 |
DPDPA biometric / genetic | YES Jul 17, 2019 |
NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $10,000 / willful violation under DCFA |
| Florida | Fla. Stat. § 501.171 30 days; AG if 500+ |
Fla. Stat. § 501.171(8) | Florida Digital Bill of Rights Jul 1, 2024 |
FDBR sensitive data incl. biometric / genetic | Not adopted | NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $500,000 per breach incident |
| Georgia | O.C.G.A. § 10-1-912 Most expedient time |
O.C.G.A. § 10-15-2 | None | None | Not adopted | NO (AG only) | No EPR; hazardous-waste rules apply | YES | § 10-15-2 up to $2,500 / record |
| Hawaii | HRS § 487N-2 Most expedient time; AG if 1,000+ |
HRS § 487R-2 | None | None | YES Jan 1, 2022 |
NO (AG only) | HEWRRA earliest U.S. computer EPR (2008); landfill ban | NO (direct EPA jurisdiction) | Up to $2,500 / record (multiplicative) |
| Idaho | Idaho Code § 28-51-105 Most expedient time; 24-hr public-sector AG |
Idaho Code § 28-51-104 | None | None | YES Jul 1, 2020 |
NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $25,000 / breach under § 28-51-107 |
| Illinois | 815 ILCS 530/10 Most expedient time; AG if 500+ |
815 ILCS 530/40 | None | BIPA 740 ILCS 14 ($1,000 / $5,000 per violation) | YES Jul 1, 2019 |
YES (BIPA private action) | EPRRA landfill ban since 2012 | YES | BIPA $1,000 negligent / $5,000 intentional per violation |
| Indiana | Ind. Code § 24-4.9-3 Most expedient time |
Ind. Code § 24-4-14-8 | Indiana CDPA Jan 1, 2026 |
Indiana CDPA biometric / genetic | Not adopted | NO (AG only) | Indiana E-Waste Recycling Program manufacturer EPR | YES | Up to $150,000 / breach under § 24-4.9-4 |
| Iowa | Iowa Code § 715C.2 5 business days AG window |
Iowa Code § 715A.8 | Iowa CDPA Jan 1, 2025 |
Iowa CDPA biometric / genetic | YES Jan 1, 2020 |
NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $40,000 / violation under § 714.16 |
| Kansas | K.S.A. § 50-7a02 Most expedient time |
K.S.A. § 50-7a03 | None | None | Not adopted | NO (AG only) | No EPR; hazardous-waste rules apply | YES | KCPA up to $10,000 / violation |
| Kentucky | KRS 365.732 Most expedient time |
KRS 365.720 | None | None | Not adopted | NO (AG only) | No EPR; hazardous-waste rules apply | YES | KCPA up to $2,000 / willful violation |
| Louisiana | La. R.S. § 51:3074 60 days + 10-day AG |
La. R.S. § 51:3074 | None | None | YES Aug 1, 2020 |
NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $5,000 / violation |
| Maine | 10 M.R.S. § 1348 30 days |
10 M.R.S. § 1347 | None | None | YES Jan 1, 2022 |
NO (AG only) | 38 M.R.S. § 1610 earliest state EPR (2004); landfill ban | YES | Up to $10,000 / violation under § 1348 |
| Maryland | Md. Comm. Code § 14-3504 45 days |
Md. Comm. Code § 14-3502 | MODPA Oct 1, 2025 |
MODPA biometric / genetic / neural | Not adopted | NO (AG only) | Maryland Computer Recycling Manufacturer Registration | YES | MPIPA up to $1,000 / violation |
| Massachusetts | M.G.L. c. 93H § 3 Most expedient time |
M.G.L. c. 93I | None | Biometric since Apr 2019 (M.G.L. c. 93) | Not adopted | NO (AG only) | Cathode-ray tube landfill ban | YES | Up to $5,000 / violation; treble per Chapter 93A |
| Michigan | MCL § 445.72 Most expedient time |
MCL § 445.72a | None | None | Not adopted | NO (AG only) | NREPA Part 173 e-waste; manufacturer registration | YES | Identity Theft Protection Act $250 / $1,000 / $5,000 per violation |
| Minnesota | Minn. Stat. § 325E.61 Most expedient time |
Minn. Stat. § 325M.05 | MCDPA Jul 31, 2025 |
MCDPA biometric / genetic | Not adopted | NO (AG only) | Digital Fair Repair Act (broadest in U.S.); Electronics Recycling Act | YES | Up to $25,000 / violation under § 8.31 |
| Mississippi | Miss. Code § 75-24-29 Most expedient time |
Miss. Code § 75-24-29 | None | None | YES Jul 1, 2019 |
NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $10,000 / violation under § 75-24-19 |
| Missouri | Mo. Rev. Stat. § 407.1500 Most expedient time |
Mo. Rev. Stat. § 407.1500 | None | Medical info enumeration § 407.1500 | YES Aug 28, 2021 |
NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $150,000 / breach incident |
| Montana | Mont. Code § 30-14-1704 Most expedient time |
Mont. Code § 30-14-1703 | MTCDPA Oct 1, 2024 |
MTCDPA biometric / genetic; GIPA | YES Oct 1, 2020 |
NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $10,000 / violation under § 30-14-142 |
| Nebraska | Neb. Rev. Stat. § 87-803 Most expedient time |
Neb. Rev. Stat. § 87-302 | None | Biometric (2016 amendment to § 87-803) | Not adopted | YES (CPA § 59-1609 treble damages) | No EPR; hazardous-waste rules apply | YES | CPA up to $10,000 / violation; treble damages |
| Nevada | NRS § 603A.220 Most expedient time |
NRS § 603A.200 | None | None | YES Oct 1, 2023 |
NO (AG only) | No EPR; hazardous-waste rules apply | YES | DTPA up to $5,000 / willful violation |
| New Hampshire | RSA § 359-C:20 Most expedient time |
RSA § 359-C:20 | None | None | YES Jan 1, 2021 |
YES (RSA 358-A private action) | No EPR; hazardous-waste rules apply | YES | RSA 358-A actual or $1,000 / violation |
| New Jersey | N.J.S.A. § 56:8-163 Most expedient time |
N.J.S.A. § 56:8-162 | NJDPA (2025) Jan 15, 2025 |
NJDPA biometric / genetic | Not adopted | YES (CFA § 56:8-1 treble damages) | Electronic Waste Management Act manufacturer EPR | YES | CFA treble damages + attorney fees |
| New Mexico | NMSA § 57-12C-6 45 days |
NMSA § 57-12C-3 | None | None | YES Jan 1, 2022 |
NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $25,000 / violation under § 57-12C-9 |
| New York | Gen. Bus. § 899-aa Most expedient time |
Gen. Bus. § 399-h | None | None | YES Mar 1, 2017 (NYDFS Part 500) |
NO (AG / NYDFS only) | NY E-Cycles manufacturer EPR; landfill ban | YES | Up to $250,000 per breach under SHIELD |
| North Carolina | N.C.G.S. § 75-65 Most expedient time |
N.C.G.S. § 75-64 | None | None | Not adopted | YES (UDTPA treble damages § 75-16) | § 130A-309.130 manufacturer EPR; landfill ban | YES | UDTPA treble damages under § 75-16 |
| North Dakota | N.D.C.C. § 51-30 45 days; AG if 250+ |
N.D.C.C. § 51-30 | None | None | YES Aug 1, 2023 |
NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $5,000 / violation |
| Ohio | Ohio R.C. § 1349.19 45 days; AG if 500+ |
Ohio R.C. § 1349.19 | None | None | YES Mar 20, 2019 |
NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $10,000 / day after 60 days |
| Oklahoma | 24 O.S. § 163 Most expedient time |
24 O.S. § 163 | None | None | Not adopted | NO (AG only) | No EPR; hazardous-waste rules apply | YES | Up to $150,000 per breach under § 163.C |
| Oregon | ORS § 646A.604 45 days; AG if 250+ |
ORS § 646A.622 | Oregon Consumer Privacy Act Jul 1, 2024 |
OCPA biometric / genetic sensitive | Not adopted | NO (AG only) | Oregon E-Cycles manufacturer EPR; landfill ban | YES | ORS § 646A.624 up to $1,000 / violation per person |
| Pennsylvania | 73 P.S. § 2303 Most expedient time (2022 amendments) |
73 P.S. § 2303 | None | None | Not adopted | YES (UTPCPL § 201-9.2 private action) | Covered Device Recycling Act 35 P.S. § 6051.301 EPR | YES | UTPCPL up to $1,000 / violation; treble actual damages |
| Rhode Island | R.I.G.L. § 11-49.3-4 45 days |
R.I.G.L. § 11-49.3-3 | RIDTPPA Jan 1, 2026 |
None | YES Jul 1, 2022 |
NO (AG only) | 23-19.6 manufacturer EPR; landfill ban | YES | Up to $200 / violation under § 11-49.3-7 |
| South Carolina | S.C. Code § 39-1-90 Most expedient time |
S.C. Code § 30-2-310 | None | None | YES Jan 1, 2019 (FIRST U.S. adoption) |
YES (§ 39-1-90(I) private action) | § 48-60 manufacturer EPR | YES | $1,000 / resident; SCUTPA treble damages |
| South Dakota | SDCL § 22-40-19 Most expedient time (Jul 1, 2018) |
SDCL § 22-40-22 | None | None | YES Jul 1, 2021 |
YES (DTPA § 37-24 private action) | No EPR; hazardous-waste rules apply | YES | Up to $10,000 / day / violation |
| Tennessee | Tenn. Code § 47-18-2107 45 days; AG if 100+ |
Tenn. Code § 47-18-2110 | TIPA Jul 1, 2025 |
TIPA biometric / genetic | YES Jul 1, 2022 |
NO (AG only) | Tenn. Code § 68-211-1001 manufacturer EPR | YES | TIPA $7,500 / violation + treble for willful |
| Texas | Tex. Bus. & Com. Code § 521.053 60 days |
§ 521.052 | TDPSA Jul 1, 2024 |
Tex. BCC Chapter 503 CUBI ($25,000 / violation) | Not adopted | NO (AG only) | TCEQ Texas Computer Equipment Recycling Program | YES | ITEPA up to $50,000 / violation; up to $250,000 / breach |
| Utah | Utah Code § 13-44-202 Most expedient time |
Utah Code § 13-44-201 | UCPA Dec 31, 2023 |
UCPA biometric | Not adopted | NO (AG only) | No EPR; hazardous-waste rules apply | YES | UCPA up to $7,500 / violation |
| Vermont | 9 V.S.A. § 2435 14-business-day AG preliminary; 45-day consumer |
9 V.S.A. § 2445 | None | None | YES Jan 1, 2022 |
NO (AG only) | 23-19.6 manufacturer EPR; landfill ban | YES | Up to $10,000 per violation |
| Virginia | Va. Code § 18.2-186.6 Most expedient time |
Va. Code § 59.1-443.2 | VCDPA Jan 1, 2023 |
VCDPA biometric / genetic | YES Jul 1, 2020 |
YES (VCPA § 59.1-196 PRA) | No EPR; hazardous-waste rules apply | YES | Up to $150,000 per breach; VCPA $500 / $1,000 statutory |
| Washington | RCW § 19.255.010 30 days; AG if 500+ |
RCW § 19.215.020 | WAMHMDA Mar 31, 2024 |
MHMDA biometric / consumer health (broadest health PRA) | Not adopted | YES (WAMHMDA + CPA private actions) | RCW 70A.500 E-Cycle Washington manufacturer EPR | YES | MHMDA / CPA up to $7,500 / violation + private action |
| West Virginia | W. Va. Code § 46A-2A-101 Most expedient time |
§ 46A-2A-101 | None | None | YES Jan 1, 2021 |
YES (CCPA § 46A-6-106 private action) | § 22-15A-22 manufacturer EPR (small business / household) | YES | CCPA up to $5,000 / violation |
| Wisconsin | Wis. Stat. § 134.98 45 days |
Wis. Stat. § 134.97 | None | None | YES Mar 1, 2022 |
NO (AG / DATCP only) | E-Cycle Wisconsin § 287.17 manufacturer EPR; landfill ban | YES | Up to $1,000 / violation under § 134.98(4) |
| Wyoming | Wyo. Stat. § 40-12-501 Most expedient time |
§ 40-12-602 | None | Biometric (2015 expansion of § 40-12-501) | YES Jul 1, 2022 |
YES (CPA § 40-12-108 private action) | No EPR; hazardous-waste rules apply | YES | CPA up to $5,000 / violation |
Reading the table. Most state statutes use “in the most expedient time possible and without unreasonable delay” as the breach-notification deadline, which functions as an outer limit rather than a fixed window. States with a specific calendar deadline (30 days, 45 days, 60 days) typically apply that deadline to the consumer notice and impose a parallel deadline (often 24 hours, 5 business days, or 10 business days) for the AG notice when the breach exceeds a threshold (typically 250, 500, or 1,000 affected residents). The “Private Right of Action” column reflects whether the state’s breach, disposal, biometric, or UDAP statute provides a statutory private cause of action; common-law negligence and breach-of-contract claims may still be available in any state.
The table above is the at-a-glance scanner. The table below is the deep-dive reference, structured around the five fields that most enterprise compliance, legal, and procurement teams need when scoping an IT asset retirement event in a given state: the operative statutes and citations, the key digital-data-destruction requirements, the entities and activities to which the duty applies, the statutory penalty range, and the state e-waste regime that determines how covered electronics are routed. Each row consolidates the relevant statute citations + the key digital-data requirements with citations to the underlying state research bundles. The state name in column one links to that state’s full v1.3.4 compliance page with regulator names, recent enforcement context, and 11 statute-anchored FAQs.
| State | Statute / Citation | Key Requirements (Emphasis on Digital) | Applicability | Penalties | E-Waste Law Notes |
|---|---|---|---|---|---|
| Alabama | Breach: Code § 8-38-1 (45 days; AG if > 1,000) Disposal: No dedicated statute |
No dedicated records-disposal statute; Alabama Data Breach Notification Act of 2018 imposes reasonable safeguards duty on covered entities, breach notice within 45 days (consumer) and AG notice when more than 1,000 Alabamians affected. Physical loss of unencrypted media is a breach trigger; encryption + NIST SP 800-88 Rev. 2 verified sanitization are the audit-defensible safe harbor. | Any covered entity (business, person, government) owning or licensing computerized data containing Alabamians’ sensitive personally identifying information. Public-sector retirement under Alabama state CIO / OIT policy. Sectoral overlays: HIPAA, GLBA / FTC Safeguards Rule, FAR 52.204-21 / DFARS 252.204-7012 / CMMC 2.0 for federal contractors. | Up to $5,000 / day, up to $500,000 / breach. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Alaska | Breach: AS § 45.48.010 (45 days) Disposal: AS § 45.48.500 |
Records-disposal duty under AS § 45.48.500 to render personal information unreadable or undecipherable; breach notice in 45 days under AS § 45.48.010. Genetic privacy overlay under AS § 18.13.010 (Genetic Privacy Act). Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization functions as safe harbor. | Any business owning or licensing personal information of an Alaska resident. Public-sector retirement under State of Alaska Office of Information Technology policy. Genetic privacy duty under AS § 18.13.010 for entities handling DNA samples or analyses. NAIC IDS-adopted; insurance licensees in scope. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $500 / resident; cap $50,000 government. Private right of action: AG only. | No EPR; hazardous-waste rules apply. NO (direct EPA jurisdiction); hazardous-waste enforcement runs directly to U.S. EPA. |
| Arizona | Breach: A.R.S. § 18-552 (45 days; broadened to ransomware 2018) Disposal: A.R.S. § 44-7601 |
Records-disposal duty under A.R.S. § 44-7601 (outcome unreadable / undecipherable); 2018 SB 1212 expanded breach to ransomware and broadened personal-information definition. 45-day consumer notice. NIST SP 800-88 Rev. 2 sanitization defensible against breach trigger. | Any person or business that conducts business in Arizona and owns / licenses computerized personal data. Public-sector retirement under Arizona State CIO / ADOA-ASET policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $500,000 per breach series; willful. Private right of action: AG only. | Voluntary recycling; no landfill ban. EPA-authorized RCRA Subtitle C state. |
| Arkansas | Breach: Ark. Code § 4-110-105 (Most expedient time; AG if > 1,000) Disposal: Ark. Code § 4-110-104 |
Records-disposal duty under Ark. Code § 4-110-104; 2019 amendments added biometric + genetic information to consumer-rights provisions. DTPA § 4-88-113(f) provides private right of action with treble damages. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of an Arkansas resident. DTPA covers consumer-facing entities with private right of action. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Arkansas Office of Information Systems. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | DTPA up to $10,000 / violation. Private right of action: DTPA § 4-88-113(f. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| California | Breach: Cal. Civ. Code § 1798.82 (Most expedient time; AG if 500+) Disposal: Cal. Civ. Code § 1798.81 Comp. privacy: CCPA / CPRA (Jan 1, 2020 (CCPA); Jan 1, 2023 (CPRA)) |
Records-disposal duty under Cal. Civ. Code § 1798.81 (reasonable steps; modify, destroy, or shred); CCPA § 1798.150 statutory private right of action $100-$750 per consumer per incident. CCPA / CPRA right to deletion attaches to retired media that may still hold consumer data. SB 244 Right to Repair (Jul 1, 2024) extends product-lifecycle controls. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a California resident (CCPA / CPRA thresholds: $25M revenue, 100K+ consumers, or 50%+ revenue from selling consumer data). Public-sector retirement under Cal. Gov. Code § 11549 + State CISO policy. Sectoral overlays: HIPAA (CMIA extends covered-entity scope), GLBA / CFIPA, FAR / DFARS / CMMC. | CCPA $2,500 / $7,500 per violation; § 1798.150 $100–$750 per consumer. Private right of action: CCPA § 1798.150 PRA. | Electronic Waste Recycling Act (2003); landfill ban; SB 244 RtR Jul 1, 2024. EPA-authorized RCRA Subtitle C state. |
| Colorado | Breach: C.R.S. § 6-1-716 (30 days (strictest in U.S.)) Disposal: C.R.S. § 6-1-713 Comp. privacy: Colorado Privacy Act (Jul 1, 2023) |
Records-disposal duty under C.R.S. § 6-1-713; breach notice in 30 days (strictest U.S. deadline). Colorado Privacy Act (Jul 1, 2023) deletion right + HB24-1130 biometric amendments. HB 24-1121 Right to Repair (effective Jan 2026). Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 is safe harbor. | Any covered entity that maintains, owns, or licenses computerized data containing Colorado-resident personal information. CPA applies to controllers processing data of 100K+ Colorado consumers or 25K+ where revenue includes data sale. Public-sector retirement under OIT / Colorado Cybersecurity Office. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $20,000 / violation. Private right of action: AG / DA enforcement. | E-waste landfill ban (Jul 2013); EPR programs HB22-1355. EPA-authorized RCRA Subtitle C state. |
| Connecticut | Breach: Conn. Gen. Stat. § 36a-701b (60 days + 24-mo credit monitoring (SSN)) Disposal: § 36a-701b Comp. privacy: CTDPA (Jul 1, 2023) |
Records-disposal duty under § 36a-701b (60 days + 24-month credit monitoring required if SSN exposed). CTDPA (Jul 1, 2023) consumer-data minimization + deletion. Among earliest NAIC IDS adopters (Oct 1, 2019). Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a Connecticut resident; CTDPA controller thresholds (100K+ consumers or 25K+ where 25%+ revenue from data sale). NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Connecticut Department of Administrative Services BEST policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | CUTPA up to $5,000 / violation. Private right of action: AG only. | E-waste manufacturer takeback; battery EPR. EPA-authorized RCRA Subtitle C state. |
| Delaware | Breach: 6 Del. C. § 12B-101 (60 days + 12-mo credit monitoring) Disposal: 6 Del. C. § 5002C Comp. privacy: DPDPA (Jan 1, 2025) |
Records-disposal duty under 6 Del. C. § 5002C (outcome unreadable / undecipherable). 60-day breach notice + 12-month credit monitoring when SSN exposed. DPDPA effective Jan 1, 2025 expands consumer rights and sensitive-data definitions including biometric / genetic. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business that conducts business in Delaware or produces products / services targeted to Delaware residents and that processes the personal data of 35K+ consumers (DPDPA threshold). Public-sector retirement under Delaware Department of Technology and Information policy. NAIC IDS-adopted; insurance licensees in scope. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $10,000 / willful violation under DCFA. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Florida | Breach: Fla. Stat. § 501.171 (30 days; AG if 500+) Disposal: Fla. Stat. § 501.171(8) Comp. privacy: Florida Digital Bill of Rights (Jul 1, 2024) |
Records-disposal duty under Fla. Stat. § 501.171(8); breach notice in 30 days; AG notice when 500+ affected. Florida Digital Bill of Rights (Jul 1, 2024) strict opt-in for sensitive data including biometric / genetic. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a Florida resident; FDBR controller threshold $1B+ global revenue. Public-sector retirement under Florida Digital Service / DMS policy. Sectoral overlays: HIPAA, GLBA / FTC, FAR / DFARS / CMMC. | Up to $500,000 per breach incident. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Georgia | Breach: O.C.G.A. § 10-1-912 (Most expedient time) Disposal: O.C.G.A. § 10-15-2 |
Records-disposal duty under O.C.G.A. § 10-15-2 ($2,500 per record); breach notice in most expedient time. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business owning or licensing personal information of a Georgia resident. Public-sector retirement under Georgia Technology Authority policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | § 10-15-2 up to $2,500 / record. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Hawaii | Breach: HRS § 487N-2 (Most expedient time; AG if 1,000+) Disposal: HRS § 487R-2 |
Records-disposal duty under HRS § 487R-2 (Disposal of Personal Information); AG notice when 1,000+ affected. NAIC IDS adopted Jan 1, 2022. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. Hawaii is one of two non-RCRA-authorized states; hazardous-waste duties run directly to U.S. EPA Region 9. | Any business owning or licensing personal information of a Hawaii resident. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under State of Hawaii Office of Enterprise Technology Services policy. Hawaii is one of two non-RCRA-authorized states; e-waste / hazardous-waste duties run directly to U.S. EPA Region 9. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $2,500 / record (multiplicative). Private right of action: AG only. | HEWRRA earliest U.S. computer EPR (2008); landfill ban. NO (direct EPA jurisdiction); hazardous-waste enforcement runs directly to U.S. EPA. |
| Idaho | Breach: Idaho Code § 28-51-105 (Most expedient time; 24-hr public-sector AG) Disposal: Idaho Code § 28-51-104 |
Records-disposal duty under Idaho Code § 28-51-104; consumer notice in most expedient time; public-sector AG notice within 24 hours (strictest U.S. public-sector window). NAIC IDS adopted Jul 1, 2020. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of an Idaho resident. Public-sector entity 24-hour AG notification under § 28-51-105 (strictest U.S. public-sector window). NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Idaho Office of Information Technology Services. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $25,000 / breach under § 28-51-107. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Illinois | Breach: 815 ILCS 530/10 (Most expedient time; AG if 500+) Disposal: 815 ILCS 530/40 |
Records-disposal duty under 815 ILCS 530/40; BIPA at 740 ILCS 14 imposes $1,000 negligent / $5,000 intentional per violation with private right of action (strongest U.S. biometric regime). NAIC IDS adopted Jul 1, 2019. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any private entity that collects biometric identifiers or information of Illinois residents (BIPA scope). All businesses holding Illinois-resident personal information are in scope for breach notification. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Illinois Department of Innovation and Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | BIPA $1,000 negligent / $5,000 intentional per violation. Private right of action: BIPA private action. | EPRRA landfill ban since 2012. EPA-authorized RCRA Subtitle C state. |
| Indiana | Breach: Ind. Code § 24-4.9-3 (Most expedient time) Disposal: Ind. Code § 24-4-14-8 Comp. privacy: Indiana CDPA (Jan 1, 2026) |
Records-disposal duty under Ind. Code § 24-4-14-8 (outcome shred / incinerate / pulverize); breach notice in most expedient time. Indiana CDPA (Jan 1, 2026) adds biometric / genetic as sensitive data. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of an Indiana resident; Indiana CDPA threshold 100K+ consumers or 25K+ where revenue includes data sale. Public-sector retirement under Indiana Office of Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $150,000 / breach under § 24-4.9-4. Private right of action: AG only. | Indiana E-Waste Recycling Program manufacturer EPR. EPA-authorized RCRA Subtitle C state. |
| Iowa | Breach: Iowa Code § 715C.2 (5 business days AG window) Disposal: Iowa Code § 715A.8 Comp. privacy: Iowa CDPA (Jan 1, 2025) |
Records-disposal duty under Iowa Code § 715A.8; AG breach window only 5 business days (second-strictest in U.S.). Iowa CDPA (Jan 1, 2025) adds biometric / genetic as sensitive data. NAIC IDS adopted Jan 1, 2020. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of an Iowa resident; Iowa CDPA controller threshold 100K+ consumers or 25K+ where revenue includes data sale. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Iowa Office of the CIO policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $40,000 / violation under § 714.16. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Kansas | Breach: K.S.A. § 50-7a02 (Most expedient time) Disposal: K.S.A. § 50-7a03 |
Records-disposal duty under K.S.A. § 50-7a03 (Wayne Owen Act, named for an identity-theft victim); breach notice in most expedient time. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a Kansas resident. Public-sector retirement under Kansas Office of Information Technology Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | KCPA up to $10,000 / violation. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Kentucky | Breach: KRS 365.732 (Most expedient time) Disposal: KRS 365.720 |
Records-disposal duty under KRS 365.720 (consumer); KRS 61.931 imposes a parallel duty on public agencies and contractors. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a Kentucky resident. KRS 61.931 imposes parallel duty on public agencies and their contractors. Public-sector retirement under Commonwealth Office of Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | KCPA up to $2,000 / willful violation. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Louisiana | Breach: La. R.S. § 51:3074 (60 days + 10-day AG) Disposal: La. R.S. § 51:3074 |
Records-disposal duty + breach notice under La. R.S. § 51:3074; consumer notice in 60 days plus 10-day AG window. NAIC IDS adopted Aug 1, 2020. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a Louisiana resident. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Louisiana Office of Technology Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $5,000 / violation. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Maine | Breach: 10 M.R.S. § 1348 (30 days) Disposal: 10 M.R.S. § 1347 |
Records-disposal duty under 10 M.R.S. § 1347; breach notice in 30 days. NAIC IDS adopted Jan 1, 2022. 38 M.R.S. § 1610 (2004) established the earliest U.S. state e-waste EPR program. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a Maine resident. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Maine OIT policy. Earliest U.S. state with e-waste EPR (38 M.R.S. § 1610, 2004); landfill ban applies to covered electronics. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $10,000 / violation under § 1348. Private right of action: AG only. | 38 M.R.S. § 1610 earliest state EPR (2004); landfill ban. EPA-authorized RCRA Subtitle C state. |
| Maryland | Breach: Md. Comm. Code § 14-3504 (45 days) Disposal: Md. Comm. Code § 14-3502 Comp. privacy: MODPA (Oct 1, 2025) |
Records-disposal duty under Md. Comm. Code § 14-3502; breach notice in 45 days. MODPA (Oct 1, 2025) is the first U.S. comprehensive law treating neural data as sensitive (alongside biometric / genetic). Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a Maryland resident; MODPA effective Oct 1, 2025 expands sensitive data including neural data. Public-sector retirement under Maryland DoIT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | MPIPA up to $1,000 / violation. Private right of action: AG only. | Maryland Computer Recycling Manufacturer Registration. EPA-authorized RCRA Subtitle C state. |
| Massachusetts | Breach: M.G.L. c. 93H § 3 (Most expedient time) Disposal: M.G.L. c. 93I |
Records-disposal duty under M.G.L. c. 93I; 201 CMR 17.00 is the most prescriptive U.S. written-information-security-program (WISP) regulation. Chapter 93A treble damages for unfair / deceptive acts. Biometric privacy added Apr 2019. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any person or entity that receives, stores, maintains, processes, or otherwise has access to personal information of a Massachusetts resident (201 CMR 17.00 scope). Public-sector retirement under Massachusetts Executive Office of Technology Services and Security (EOTSS) policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $5,000 / violation; treble per Chapter 93A. Private right of action: AG only. | Cathode-ray tube landfill ban. EPA-authorized RCRA Subtitle C state. |
| Michigan | Breach: MCL § 445.72 (Most expedient time) Disposal: MCL § 445.72a |
Records-disposal duty under MCL § 445.72a; Identity Theft Protection Act civil penalties tiered $250 / $1,000 / $5,000 per violation. SSN Privacy Act MCL § 445.81 imposes additional safeguarding duty. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a Michigan resident. Identity Theft Protection Act + SSN Privacy Act dual safeguarding duty. Public-sector retirement under Michigan DTMB policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Identity Theft Protection Act $250 / $1,000 / $5,000 per violation. Private right of action: AG only. | NREPA Part 173 e-waste; manufacturer registration. EPA-authorized RCRA Subtitle C state. |
| Minnesota | Breach: Minn. Stat. § 325E.61 (Most expedient time) Disposal: Minn. Stat. § 325M.05 Comp. privacy: MCDPA (Jul 31, 2025) |
Records-disposal duty under Minn. Stat. § 325M.05; MCDPA (Jul 31, 2025) consumer-data minimization + deletion. Digital Fair Repair Act is the broadest U.S. Right to Repair regime. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business that conducts business in Minnesota or produces products / services targeted to Minnesota residents and that processes the personal data of 100K+ consumers (MCDPA threshold). Public-sector retirement under Minnesota IT Services (MNIT) policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $25,000 / violation under § 8.31. Private right of action: AG only. | Digital Fair Repair Act (broadest in U.S.); Electronics Recycling Act. EPA-authorized RCRA Subtitle C state. |
| Mississippi | Breach: Miss. Code § 75-24-29 (Most expedient time) Disposal: Miss. Code § 75-24-29 |
Records-disposal duty under Miss. Code § 75-24-29; MCPA enforcement only (no comprehensive privacy law). NAIC IDS adopted Jul 1, 2019. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a Mississippi resident. NAIC IDS-adopted; insurance licensees in scope. MCPA enforcement only. Public-sector retirement under Mississippi Department of Information Technology Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $10,000 / violation under § 75-24-19. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Missouri | Breach: Mo. Rev. Stat. § 407.1500 (Most expedient time) Disposal: Mo. Rev. Stat. § 407.1500 |
Records-disposal duty + breach notice under Mo. Rev. Stat. § 407.1500; statute enumerates medical information in the personal-information definition. NAIC IDS adopted Aug 28, 2021. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a Missouri resident; statute enumerates medical information in the personal-information definition. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Missouri Office of Administration ITSD policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $150,000 / breach incident. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Montana | Breach: Mont. Code § 30-14-1704 (Most expedient time) Disposal: Mont. Code § 30-14-1703 Comp. privacy: MTCDPA (Oct 1, 2024) |
Records-disposal duty under Mont. Code § 30-14-1703; MTCDPA (Oct 1, 2024) adds biometric / genetic as sensitive data. Genetic Information Privacy Act (GIPA) imposes separate consent + destruction duties. NAIC IDS adopted Oct 1, 2020. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business that conducts business in Montana or produces products / services targeted to Montana residents and that processes the personal data of 50K+ consumers (MTCDPA threshold). NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Montana SITSD policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $10,000 / violation under § 30-14-142. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Nebraska | Breach: Neb. Rev. Stat. § 87-803 (Most expedient time) Disposal: Neb. Rev. Stat. § 87-302 |
Records-disposal duty under Neb. Rev. Stat. § 87-302; biometric added by 2016 amendment to § 87-803. CPA § 59-1609 provides treble damages private right of action. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any commercial entity that conducts business in Nebraska and owns / licenses computerized data containing personal information of a Nebraskan. CPA private right of action with treble damages. Public-sector retirement under Nebraska Office of the CIO policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | CPA up to $10,000 / violation; treble damages. Private right of action: CPA § 59-1609 treble damages. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Nevada | Breach: NRS § 603A.220 (Most expedient time) Disposal: NRS § 603A.200 |
Records-disposal duty under NRS § 603A.200; NRS 597.970 IoT security law (Oct 1, 2020) requires reasonable security features on connected devices. NAIC IDS adopted Oct 1, 2023. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any data collector doing business in Nevada (NRS 603A definition). NRS 597.970 IoT manufacturer scope. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Nevada Office of the CIO policy. Gaming licensees: overlapping NV Gaming Control Board authority over patron-data controls. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | DTPA up to $5,000 / willful violation. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| New Hampshire | Breach: RSA § 359-C:20 (Most expedient time) Disposal: RSA § 359-C:20 |
Records-disposal duty + breach notice under RSA § 359-C:20; RSA 358-A Consumer Protection Act provides private right of action ($1,000 / violation). NAIC IDS adopted Jan 1, 2021. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a New Hampshire resident. RSA 358-A Consumer Protection Act provides private right of action. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under NH Department of Information Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | RSA 358-A actual or $1,000 / violation. Private right of action: RSA 358-A private action. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| New Jersey | Breach: N.J.S.A. § 56:8-163 (Most expedient time) Disposal: N.J.S.A. § 56:8-162 Comp. privacy: NJDPA (2025) (Jan 15, 2025) |
Records-disposal duty under N.J.S.A. § 56:8-162; NJDPA (Jan 15, 2025) adds biometric / genetic as sensitive data. CFA § 56:8-1 provides treble damages + attorney fees. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a New Jersey resident; NJDPA effective Jan 15, 2025 controller threshold 100K+ consumers or 25K+ where revenue includes data sale. CFA treble damages + attorney fees private right of action. Public-sector retirement under NJ OIT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | CFA treble damages + attorney fees. Private right of action: CFA § 56:8-1 treble damages. | Electronic Waste Management Act manufacturer EPR. EPA-authorized RCRA Subtitle C state. |
| New Mexico | Breach: NMSA § 57-12C-6 (45 days) Disposal: NMSA § 57-12C-3 |
Records-disposal duty under NMSA § 57-12C-3; breach notice in 45 days. NAIC IDS adopted Jan 1, 2022. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a New Mexico resident. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under NM Department of Information Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $25,000 / violation under § 57-12C-9. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| New York | Breach: Gen. Bus. § 899-aa (Most expedient time) Disposal: Gen. Bus. § 399-h |
Records-disposal duty under Gen. Bus. § 399-h; SHIELD Act requires reasonable safeguards for any business holding NY-resident private information; NYDFS Part 500 (Mar 1, 2017; Nov 1, 2023 amendments) imposes cybersecurity-program duty on regulated financial institutions. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any person or business that owns or licenses computerized data of a New York resident (SHIELD Act scope). NYDFS-regulated financial institutions in scope for Part 500 cybersecurity-program duty. NAIC IDS-adopted (NYDFS Part 500 functions as state IDS standard). Public-sector retirement under NYS ITS policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $250,000 per breach under SHIELD. Private right of action: AG / NYDFS only. | NY E-Cycles manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state. |
| North Carolina | Breach: N.C.G.S. § 75-65 (Most expedient time) Disposal: N.C.G.S. § 75-64 |
Records-disposal duty under N.C.G.S. § 75-64; UDTPA § 75-16 treble damages for unfair / deceptive trade practices. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a North Carolina resident. UDTPA treble damages private right of action. Public-sector retirement under N.C. Department of Information Technology policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | UDTPA treble damages under § 75-16. Private right of action: UDTPA treble damages § 75-16. | § 130A-309.130 manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state. |
| North Dakota | Breach: N.D.C.C. § 51-30 (45 days; AG if 250+) Disposal: N.D.C.C. § 51-30 |
Records-disposal duty + breach notice under N.D.C.C. § 51-30; AG notice when 250+ affected. § 51-33 SSN protection. NAIC IDS adopted Aug 1, 2023. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a North Dakota resident; AG notice when 250+ affected. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under NDIT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $5,000 / violation. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Ohio | Breach: Ohio R.C. § 1349.19 (45 days; AG if 500+) Disposal: Ohio R.C. § 1349.19 |
Records-disposal duty + breach notice under Ohio R.C. § 1349.19; 45-day consumer notice, AG notice when 500+ affected. Ohio Data Protection Act provides affirmative defense for entities aligned to a recognized cybersecurity framework (NIST, ISO, CIS). NAIC IDS adopted Mar 20, 2019. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of an Ohio resident. Ohio Data Protection Act provides affirmative defense for entities aligned to a recognized cybersecurity framework. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Ohio DAS / Office of IT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $10,000 / day after 60 days. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Oklahoma | Breach: 24 O.S. § 163 (Most expedient time) Disposal: 24 O.S. § 163 |
Records-disposal duty under 24 O.S. § 163; OCID Act 24 O.S. § 1781.1 prohibits SSN public posting. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of an Oklahoma resident. OCID Act 24 O.S. § 1781.1. Public-sector retirement under Oklahoma OMES Information Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $150,000 per breach under § 163.C. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Oregon | Breach: ORS § 646A.604 (45 days; AG if 250+) Disposal: ORS § 646A.622 Comp. privacy: Oregon Consumer Privacy Act (Jul 1, 2024) |
Records-disposal duty under ORS § 646A.622; breach notice in 45 days; AG notice when 250+ affected. Oregon Consumer Privacy Act (Jul 1, 2024) adds biometric / genetic as sensitive data. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of an Oregon resident; OCPA controller threshold 100K+ consumers or 25K+ where revenue includes data sale. Public-sector retirement under Oregon Department of Administrative Services Enterprise Information Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | ORS § 646A.624 up to $1,000 / violation per person. Private right of action: AG only. | Oregon E-Cycles manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state. |
| Pennsylvania | Breach: 73 P.S. § 2303 (Most expedient time (2022 amendments)) Disposal: 73 P.S. § 2303 |
Records-disposal duty + breach notice under 73 P.S. § 2303 (2022 amendments expanded personal-information definition); UTPCPL § 201-9.2 provides private right of action with treble actual damages. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any entity that maintains, stores, or manages computerized data of a Pennsylvania resident. UTPCPL private right of action with treble damages. Public-sector retirement under Pennsylvania Office of Administration OA-OIT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | UTPCPL up to $1,000 / violation; treble actual damages. Private right of action: UTPCPL § 201-9.2 private action. | Covered Device Recycling Act 35 P.S. § 6051.301 EPR. EPA-authorized RCRA Subtitle C state. |
| Rhode Island | Breach: R.I.G.L. § 11-49.3-4 (45 days) Disposal: R.I.G.L. § 11-49.3-3 Comp. privacy: RIDTPPA (Jan 1, 2026) |
Records-disposal duty under R.I.G.L. § 11-49.3-3; breach notice in 45 days. RIDTPPA (Jan 1, 2026) consumer rights + data minimization. NAIC IDS adopted Jul 1, 2022. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a Rhode Island resident; RIDTPPA effective Jan 1, 2026 consumer rights + data minimization. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under RI Department of Administration ETSS policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $200 / violation under § 11-49.3-7. Private right of action: AG only. | 23-19.6 manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state. |
| South Carolina | Breach: S.C. Code § 39-1-90 (Most expedient time) Disposal: S.C. Code § 30-2-310 |
Records-disposal duty under S.C. Code § 30-2-310; § 39-1-90 breach notification with private right of action ($1,000 per resident). S.C. Code § 38-99 was the FIRST U.S. NAIC Insurance Data Security adoption (Jan 1, 2019). SCUTPA treble damages. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a South Carolina resident. § 39-1-90(I) private right of action ($1,000 per resident). FIRST U.S. NAIC IDS adopter (Jan 1, 2019); insurance licensees in scope under S.C. Code § 38-99. Public-sector retirement under South Carolina Department of Administration DTO policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | $1,000 / resident; SCUTPA treble damages. Private right of action: § 39-1-90(I) private action. | § 48-60 manufacturer EPR. EPA-authorized RCRA Subtitle C state. |
| South Dakota | Breach: SDCL § 22-40-19 (Most expedient time (Jul 1, 2018)) Disposal: SDCL § 22-40-22 |
Records-disposal duty under SDCL § 22-40-22; SDCL § 22-40-19 (49th U.S. state to enact, Jul 1, 2018). DTPA § 37-24 provides private right of action. NAIC IDS adopted Jul 1, 2021. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any information holder doing business in South Dakota (SDCL § 22-40 scope; 49th U.S. state to enact, Jul 1, 2018). DTPA private right of action. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under SD BIT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $10,000 / day / violation. Private right of action: DTPA § 37-24 private action. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Tennessee | Breach: Tenn. Code § 47-18-2107 (45 days; AG if 100+) Disposal: Tenn. Code § 47-18-2110 Comp. privacy: TIPA (Jul 1, 2025) |
Records-disposal duty under Tenn. Code § 47-18-2110; breach notice in 45 days, AG notice when 100+ affected. TIPA (Jul 1, 2025) is the ONLY U.S. comprehensive privacy law with NIST Privacy Framework affirmative defense. NAIC IDS adopted Jul 1, 2022. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business that conducts business in Tennessee or produces products / services targeted to Tennessee residents and that processes the personal data of 175K+ consumers (TIPA threshold, plus $25M+ revenue gating). TIPA NIST Privacy Framework affirmative defense (UNIQUE in U.S.). NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under TN STS policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | TIPA $7,500 / violation + treble for willful. Private right of action: AG only. | Tenn. Code § 68-211-1001 manufacturer EPR. EPA-authorized RCRA Subtitle C state. |
| Texas | Breach: Tex. Bus. & Com. Code § 521.053 (60 days) Disposal: § 521.052 Comp. privacy: TDPSA (Jul 1, 2024) |
Records-disposal duty under Tex. BCC § 521.052 + § 72.004 ($500 per record disposed in violation; § 72.004(b) safe harbor for certified third-party service); breach notice in 60 days, AG notice within 30 days when 250+ affected. TDPSA (Jul 1, 2024) consumer-data duties. CUBI ($25,000 per violation; $1.4B Meta settlement Jul 2024). Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business that conducts business in Texas or produces a product / service consumed by Texas residents and that processes consumers’ personal data (TDPSA Chapter 541 scope; no revenue or volume threshold, small-business carve-out per SBA definition). Tex. BCC § 521.052 reasonable-procedures duty universal. CUBI scope: any person who captures biometric identifiers for a commercial purpose. Public-sector retirement under Tex. Gov. Code § 2054.130 + DIR Texas Cybersecurity Framework. Sectoral overlays: HIPAA + TMRPA (broader than HIPAA), GLBA + Tex. Ins. Code Ch. 559 (NAIC IDS), FAR / DFARS / CMMC. | ITEPA up to $50,000 / violation; up to $250,000 / breach. Private right of action: AG only. | TCEQ Texas Computer Equipment Recycling Program. EPA-authorized RCRA Subtitle C state. |
| Utah | Breach: Utah Code § 13-44-202 (Most expedient time) Disposal: Utah Code § 13-44-201 Comp. privacy: UCPA (Dec 31, 2023) |
Records-disposal duty under Utah Code § 13-44-201; UCPA (Dec 31, 2023) AG sole enforcer with up to $7,500 per violation. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any controller that conducts business in Utah or produces products / services targeted to Utah residents, has annual revenue of $25M+, and processes data of 100K+ consumers (UCPA threshold). Public-sector retirement under Utah DTS policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | UCPA up to $7,500 / violation. Private right of action: AG only. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Vermont | Breach: 9 V.S.A. § 2435 (14-business-day AG preliminary; 45-day consumer) Disposal: 9 V.S.A. § 2445 |
Records-disposal duty under 9 V.S.A. § 2445; breach notice 14 business days for AG preliminary, 45 days for consumer. 9 V.S.A. § 2446 was FIRST U.S. Data Broker Registration Law (Jan 1, 2019). NAIC IDS adopted Jan 1, 2022. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any data collector doing business in Vermont (9 V.S.A. § 2435 scope). 9 V.S.A. § 2446 data-broker registration applies to data brokers collecting Vermont-resident data. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Vermont Agency of Digital Services policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $10,000 per violation. Private right of action: AG only. | 23-19.6 manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state. |
| Virginia | Breach: Va. Code § 18.2-186.6 (Most expedient time) Disposal: Va. Code § 59.1-443.2 Comp. privacy: VCDPA (Jan 1, 2023) |
Records-disposal duty under Va. Code § 59.1-443.2; VCDPA (Jan 1, 2023) was SECOND U.S. comprehensive state privacy law. VCPA § 59.1-196 provides $500 / $1,000 statutory damages with private right of action. NAIC IDS adopted Jul 1, 2020. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business that conducts business in Virginia or produces products / services targeted to Virginia residents and that processes data of 100K+ consumers (VCDPA threshold). VCPA § 59.1-196 private right of action with $500 / $1,000 statutory damages. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Virginia VITA policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $150,000 per breach; VCPA $500 / $1,000 statutory. Private right of action: VCPA § 59.1-196 PRA. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
| Washington | Breach: RCW § 19.255.010 (30 days; AG if 500+) Disposal: RCW § 19.215.020 Comp. privacy: WAMHMDA (Mar 31, 2024) |
Records-disposal duty under RCW § 19.215.020; breach notice in 30 days; AG notice when 500+ affected. WAMHMDA (Mar 31, 2024) is the broadest U.S. health-data private right of action. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any person or business that owns or licenses computerized data of a Washington resident. WAMHMDA covers any regulated entity processing consumer health data (broader than HIPAA covered entity). CPA private right of action available alongside AG action. Public-sector retirement under Washington WaTech policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | MHMDA / CPA up to $7,500 / violation + private action. Private right of action: WAMHMDA + CPA private actions. | RCW 70A.500 E-Cycle Washington manufacturer EPR. EPA-authorized RCRA Subtitle C state. |
| West Virginia | Breach: W. Va. Code § 46A-2A-101 (Most expedient time) Disposal: § 46A-2A-101 |
Records-disposal duty under W. Va. Code § 46A-2A-101; CCPA § 46A-6-106 provides private right of action. NAIC IDS adopted Jan 1, 2021. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any business holding personal information of a West Virginia resident. CCPA § 46A-6-106 private right of action. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under WV OT policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | CCPA up to $5,000 / violation. Private right of action: CCPA § 46A-6-106 private action. | § 22-15A-22 manufacturer EPR (small business / household). EPA-authorized RCRA Subtitle C state. |
| Wisconsin | Breach: Wis. Stat. § 134.98 (45 days) Disposal: Wis. Stat. § 134.97 |
Records-disposal duty under Wis. Stat. § 134.97; breach notice in 45 days. NAIC IDS adopted Mar 1, 2022. E-Cycle Wisconsin (Wis. Stat. § 287.17) covered-electronics landfill ban. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any entity that owns or licenses computerized data of a Wisconsin resident. NAIC IDS-adopted; insurance licensees in scope. DATCP enforcement alongside AG. Public-sector retirement under Wisconsin DET policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | Up to $1,000 / violation under § 134.98(4). Private right of action: AG / DATCP only. | E-Cycle Wisconsin § 287.17 manufacturer EPR; landfill ban. EPA-authorized RCRA Subtitle C state. |
| Wyoming | Breach: Wyo. Stat. § 40-12-501 (Most expedient time) Disposal: § 40-12-602 |
Records-disposal duty under § 40-12-602; 2015 amendments to Wyo. Stat. § 40-12-501 expanded personal-information definition (health-insurance + medical + biometric + shared user names). CPA § 40-12-108 provides private right of action. Physical loss of unencrypted media is a breach trigger; NIST SP 800-88 Rev. 2 sanitization is safe harbor. | Any individual or commercial entity that conducts business in Wyoming and owns / licenses computerized data of a Wyoming resident (2015 amendments expanded definition). CPA private right of action. NAIC IDS-adopted; insurance licensees in scope. Public-sector retirement under Wyoming ETS policy. Sectoral overlays: HIPAA, GLBA, FAR / DFARS / CMMC. | CPA up to $5,000 / violation. Private right of action: CPA § 40-12-108 private action. | No EPR; hazardous-waste rules apply. EPA-authorized RCRA Subtitle C state. |
Reading the detailed reference. Each “Key Requirements” cell summarizes the state-specific records-disposal outcome standard, the breach-notification trigger (which in every state includes physical loss of unencrypted media or devices), the encryption / verified-sanitization safe harbor (every state recognizes encryption as a safe harbor under the breach statute, and NIST SP 800-88 Revision 2 sanitization removes data and the breach trigger from the asset entirely), the biometric or genetic privacy overlay where applicable, and the comprehensive consumer privacy law where applicable. The “Applicability” cell identifies the universe of covered entities + the public-sector retirement overlay administered by the state CIO / IT agency + the operative sectoral overlays (HIPAA, GLBA / FTC Safeguards Rule, NAIC IDS for insurance licensees, FAR 52.204-21 / DFARS 252.204-7012 / CMMC 2.0 for federal contractors). The “Penalties” cell consolidates the headline statutory penalty range with the private-right-of-action flag. The “E-Waste Law Notes” cell consolidates the state e-waste program type (EPR vs. landfill ban vs. no state program) with the state’s RCRA authorization status; 48 states administer RCRA Subtitle C through delegated authority while Alaska and Hawaii operate under direct U.S. EPA jurisdiction.
The master table answers “what does this state require?”; the quick-filter tables below answer “which states require X?” These are commonly used to scope multi-state IT asset retirement events, vendor due diligence, and risk acceptance memos.
| Deadline | States | Citation |
|---|---|---|
| 24 hours (public-sector AG) | Idaho | Idaho Code § 28-51-105 |
| 5 business days (AG window) | Iowa | Iowa Code § 715C.2 |
| 14 business days (AG preliminary) | Vermont | 9 V.S.A. § 2435 |
| 30 days | Colorado, Florida, Maine, Washington | C.R.S. § 6-1-716; Fla. Stat. § 501.171; 10 M.R.S. § 1348; RCW § 19.255.010 |
| 45 days | Alabama, Alaska, Arizona, Maryland, New Mexico, North Dakota, Ohio, Oregon, Rhode Island, Tennessee, Wisconsin | Code § 8-38; AS § 45.48; A.R.S. § 18-552; Md. Comm. Code § 14-3504; NMSA § 57-12C-6; N.D.C.C. § 51-30; Ohio R.C. § 1349.19; ORS § 646A.604; R.I.G.L. § 11-49.3-4; Tenn. Code § 47-18-2107; Wis. Stat. § 134.98 |
| 60 days | Connecticut (+ 24-mo credit monitoring), Delaware (+ 12-mo credit monitoring), Louisiana (+ 10-day AG), Texas | Conn. Gen. Stat. § 36a-701b; 6 Del. C. § 12B-101; La. R.S. § 51:3074; Tex. BCC § 521.053 |
| “Most expedient time” | All remaining states (outer-limit standard) | Various |
Twelve states provide a statutory private cause of action for breach, disposal, biometric, or UDAP-carryover violations. The remaining 38 states limit enforcement to the state AG or sectoral regulator.
| State | Statute | Damages |
|---|---|---|
| Illinois | BIPA 740 ILCS 14 | $1,000 negligent / $5,000 intentional per violation; class-action exposure |
| California | CCPA § 1798.150 | $100 to $750 per consumer per incident statutory damages |
| Washington | MHMDA + CPA | CPA statutory damages + actual; MHMDA private action (broadest U.S. health-data PRA) |
| Virginia | VCPA § 59.1-196 | $500 / $1,000 statutory damages plus actual |
| New Jersey | CFA N.J.S.A. § 56:8-1 | Treble damages + reasonable attorney fees |
| Nebraska | CPA § 59-1609 | Treble damages |
| North Carolina | UDTPA § 75-16 | Treble damages |
| Pennsylvania | UTPCPL § 201-9.2 | Up to $1,000 / violation; treble actual damages |
| Arkansas | DTPA § 4-88-113(f) | Actual damages and reasonable attorney fees; up to $10,000 / violation |
| West Virginia | CCPA § 46A-6-106 | Actual damages; up to $5,000 / violation |
| Wyoming | CPA § 40-12-108 | Actual damages and reasonable attorney fees; up to $5,000 / violation |
| New Hampshire | RSA 358-A | Actual damages or $1,000 / violation |
| South Carolina | § 39-1-90(I) + SCUTPA | Actual damages; SCUTPA treble damages |
| South Dakota | DTPA § 37-24 | Actual damages |
| Texas | DTPA + CAPTURE Act enforcement | DTPA private action; CAPTURE Act AG only ($25K / violation) |
| Effective Date | State / Law | Citation | Sensitive Data Notes |
|---|---|---|---|
| January 1, 2020 / 2023 | California (CCPA / CPRA) (FIRST in U.S.) | Cal. Civ. Code § 1798.100 | Biometric + genetic sensitive; § 1798.150 PRA |
| January 1, 2023 | Virginia (VCDPA) (SECOND in U.S.) | Va. Code § 59.1-575 | Biometric + genetic sensitive |
| July 1, 2023 | Colorado (CPA), Connecticut (CTDPA) | C.R.S. § 6-1-1301; Conn. Gen. Stat. § 42-515 | Biometric sensitive (both) |
| December 31, 2023 | Utah (UCPA) | Utah Code § 13-61-101 | AG sole enforcer |
| March 31, 2024 | Washington (MHMDA) | RCW § 19.373 | Consumer health data; broadest U.S. health-data PRA |
| July 1, 2024 | Florida (FDBR), Oregon (OCPA), Texas (TDPSA) | Fla. Stat. § 501.171; ORS § 646A.570; Tex. BCC Chapter 541 | Biometric + genetic sensitive |
| October 1, 2024 | Montana (MTCDPA) | Mont. Code § 30-14-2802 | Biometric + genetic sensitive |
| January 1, 2025 | Delaware (DPDPA), Iowa (Iowa CDPA), New Hampshire (NHPPDA), New Jersey (NJDPA) | 6 Del. C. § 12D; Iowa Code § 715D; RSA § 507-H; N.J.S.A. § 56:8-166 | Biometric + genetic sensitive (most) |
| July 1, 2025 | Tennessee (TIPA) | Tenn. Code § 47-18-3201 | ONLY U.S. comprehensive law with NIST Privacy Framework affirmative defense |
| July 31, 2025 | Minnesota (MCDPA) | Minn. Stat. § 325O | Biometric + genetic sensitive; phased to 2029 for small entities |
| October 1, 2025 | Maryland (MODPA) | Md. Comm. Code § 14-4601 | Biometric + genetic + NEURAL sensitive |
| January 1, 2026 | Indiana (CDPA), Rhode Island (RIDTPPA) | Ind. Code § 24-15; R.I.G.L. § 6-48.5 | Biometric + genetic sensitive (Indiana) |
30 states have adopted the NAIC Insurance Data Security Model Law imposing a written information security program with annual board certification on insurance licensees. South Carolina was the first U.S. state to adopt (effective January 1, 2019). The remaining 20 states have not adopted as of the research date.
| Adoption Year | States |
|---|---|
| 2019 | South Carolina (FIRST), Michigan, Mississippi, Ohio, Delaware, Connecticut, Alabama (partial) |
| 2020 | Iowa, Idaho, Louisiana, Montana, Virginia, New Hampshire (partial) |
| 2021 | New Hampshire, South Dakota, Missouri, West Virginia, Maine |
| 2022 | Hawaii, New Mexico, Vermont, Wisconsin, Wyoming, Tennessee, Rhode Island, Arkansas |
| 2023 | Nevada, North Dakota |
| 2025 | Alaska |
| State | Statute | Distinguishing Feature |
|---|---|---|
| Illinois | BIPA 740 ILCS 14 | $1,000 negligent / $5,000 intentional per violation; PRA; class-action exposure |
| Texas | CUBI Tex. BCC Chapter 503 | $25,000 / violation AG-only; $1.4B Meta settlement (Jul 2024) |
| Washington | RCW § 19.375 + MHMDA | Biometric Identifiers Act + My Health My Data Act |
| California | CCPA / CPRA | Biometric + genetic sensitive; § 1798.150 PRA |
| Maryland | MODPA Md. Comm. Code § 14-4601 | Biometric + genetic + NEURAL sensitive (effective Oct 1, 2025) |
| Arkansas | Ark. Code § 4-110-103 | Biometric + genetic consumer-rights provisions (2019 amendments) |
| Alaska | AS § 18.13.010 | Genetic data + criminal penalties for violations |
| Montana | MTCDPA + Genetic Information Privacy Act (GIPA) | Biometric + genetic sensitive; separate GIPA |
| Colorado | CPA + HB24-1130 | Biometric Act effective Jul 1, 2025 |
| Massachusetts | M.G.L. c. 93 (Apr 2019) | Biometric in personal-information definition |
| Nebraska | Neb. Rev. Stat. § 87-803 (2016) | Biometric added to personal-information by 2016 amendment |
| Wyoming | Wyo. Stat. § 40-12-501 (2015) | 2015 amendments significantly expanded definition (biometric, medical, health-insurance) |
| Connecticut, Delaware, Florida, Indiana, Iowa, New Jersey, Oregon, Tennessee, Virginia | Various state comprehensive privacy acts | Biometric + genetic as sensitive data under each act |
25 states have a manufacturer-funded electronics takeback program. Maine (38 M.R.S. § 1610, 2004) was the first state to enact; Hawaii HEWRRA (2008) was the earliest computer-specific EPR. Most state EPR programs cover consumer devices and small businesses; enterprise bulk disposal in EPR states usually routes through the federal RCRA hazardous-waste channel.
A regulated enterprise must satisfy the stricter of (1) the destination-resident state’s breach, disposal, comprehensive privacy, biometric, insurance-licensee, and sector-specific statutes, (2) the federal sector-rule baseline below, and (3) customer or prime-contract clauses. The federal baseline applies regardless of state alignment.
| Federal Regime | Citation | ITAD Relevance |
|---|---|---|
| HIPAA Security Rule | 45 C.F.R. § 164.310(d)(2) | Device and media disposal must implement policies for final disposition of electronic protected health information and the hardware and electronic media on which it is stored. |
| HIPAA Breach Notification Rule | 45 C.F.R. § 164.400 | Physical loss of unencrypted media triggers breach notification; NIST SP 800-88 verified sanitization is HHS safe harbor. |
| GLBA Safeguards Rule | 16 C.F.R. Part 314 | Written information security program with periodic risk assessment, encryption, access controls, secure disposal, and incident response for financial institutions. |
| FTC Disposal Rule | 16 C.F.R. § 682.3 | Reasonable measures to dispose of consumer report information; explicit reference to sanitization standards. |
| FAR 52.204-21 | Federal Acquisition Regulation | Basic safeguarding of covered contractor information systems including disposal of federal contract information. |
| DFARS 252.204-7012 | Defense FAR Supplement | NIST SP 800-171 controls for covered defense information including media sanitization per NIST SP 800-88; CMMC 2.0 transition through 2025-2026. |
| NIST SP 800-88 Revision 2 | Federal civilian baseline (Sept 26, 2025) | Clear / Purge / Destroy taxonomy and verification standard; HIPAA and HHS safe harbor; effectively the U.S. audit-defensible standard. |
| NIST SP 800-171 Revision 3 | Protecting Controlled Unclassified Information | Required for federal contractors and subcontractors handling CUI; media protection (MP) and media sanitization (MP-6) controls reference NIST SP 800-88. |
| RCRA (Resource Conservation and Recovery Act) | 42 U.S.C. § 6901; 40 C.F.R. Parts 260-279 | Cradle-to-grave hazardous-waste management; 48 states are authorized to administer their own RCRA programs. Alaska and Hawaii are direct U.S. EPA jurisdiction. CRT rules at 40 C.F.R. § 261.39 apply. |
| CMMC 2.0 | Cybersecurity Maturity Model Certification (DoD) | Three-tier certification (Level 1 / Level 2 / Level 3) for DoD contractors; Level 2 incorporates NIST SP 800-171; phased rollout through 2025-2028. |
Digital data destruction obligations and electronics recycling obligations are two regulatory regimes that intersect on the same device but operate under different statutes, different agencies, and different enforcement theories. Most enterprises handle them separately, treating data destruction as an information-security event and e-waste recycling as an environmental compliance event. That separation creates the single largest blindspot in U.S. IT asset disposition: the device that triggers a state breach-notification statute is the same device that may trigger a state e-waste landfill ban or a federal RCRA hazardous-waste rule, but the documentation, the vendor, and the audit trail are typically managed by different teams.
Twenty-five U.S. states have enacted electronics-recycling statutes. Twenty-five have not. Of the twenty-five with statutes, most operate as manufacturer-funded extended-producer-responsibility (EPR) programs designed for consumer takebacks, not enterprise bulk disposal. The practical effect: a Fortune 500 enterprise retiring 10,000 leased laptops typically falls outside its home state’s manufacturer-takeback program because the program is structured for households dropping off three devices, not enterprises decommissioning a fleet. That gap shifts the obligation back to the enterprise itself, operating through its own recycler, under its own contractual flow-downs, with its own Certificate of Recycling documentation chain.
The states with the broadest e-waste programs are California (Electronic Waste Recycling Act, 2003), Maine (38 M.R.S. § 1610, first state EPR in 2004), Washington (RCW 70A.500, 2006), Oregon (ORS 459A.305-365, 2007), Minnesota (Minn. Stat. § 115A.1310-1330, 2007), Connecticut (CGS § 22a-630, 2007), New Jersey (N.J.S.A. 13:1E-99.94, 2008), Illinois (415 ILCS 150, 2008), Michigan (MCL 324.17301, 2008), and Hawaii (Hawaii Electronic Waste Recycling and Recovery Act, 2008, the first U.S. computer-specific EPR). Each pairs with a state breach-notification statute that operates separately. A single retired laptop containing California-resident personal information is simultaneously subject to CCPA disposal duties (Cal. Civ. Code § 1798.105) AND California Electronic Waste Recycling Act (Public Resources Code § 42460-42486). One enforcement risk is the state Attorney General; the other is CalRecycle.
Federal Resource Conservation and Recovery Act (RCRA) Subtitle C governs hazardous waste, including the lead in cathode ray tube (CRT) monitors, mercury in older liquid-crystal-display backlights, certain rechargeable batteries (the Universal Waste rule at 40 C.F.R. Part 273), and circuit boards exceeding hazardous thresholds. Forty-eight U.S. states are authorized by the U.S. Environmental Protection Agency to administer their own RCRA Subtitle C programs. Alaska and Hawaii are not RCRA-authorized; federal EPA administers hazardous-waste rules directly in those two states. The practical implication: an enterprise retiring CRT monitors or older notebook batteries must comply with state-administered RCRA rules in 48 states and federal-administered RCRA rules in 2 states, in addition to any state-specific e-waste statute and in addition to data-destruction obligations.
Twenty-one U.S. states and territories have enacted landfill bans on covered electronics. The bans operate as direct enforcement risk: a haulier or generator that disposes of covered electronics in municipal solid waste landfill is subject to fines per device. California, Massachusetts, Pennsylvania, Connecticut, Minnesota, and Maine maintain the most aggressive landfill-ban enforcement. A typical fine schedule reaches $5,000 to $25,000 per violation. For an enterprise retiring 10,000 devices, a single mis-routed pallet can produce a $250,000+ landfill-ban exposure separate from any data-destruction exposure.
The most important strategic point: state electronics-recycling statutes are largely written for consumer takebacks, not enterprise bulk disposal. The covered-entity definition in most state EPR statutes targets manufacturers, retailers, and households, not commercial generators of end-of-life IT assets. The practical effect is that an enterprise must operate its own ITAD program, contract its own R2v3-certified or e-Stewards-certified recycler, retain its own Certificate of Recycling documentation, and assume its own enforcement risk under the landfill ban and RCRA rules. The state’s manufacturer-funded EPR program does not absorb commercial bulk disposal. Certified electronics recycling aligned to R2v3 framework with serialized Certificate of Recycling documentation closes that gap.
State data-destruction statutes operate on top of a federal regulatory architecture that establishes minimum substantive standards, defines covered entities by sector, and provides safe-harbor language that state laws incorporate by reference. An executive scoping enterprise IT asset disposition compliance must understand the federal regime first, then layer the state-by-state matrix on top. Federal rules establish the floor; state rules raise the ceiling.
The HIPAA Security Rule at 45 C.F.R. § 164.310(d)(2)(i)-(ii) requires covered entities and business associates to implement policies and procedures for the disposal of electronic protected health information (ePHI) and the media on which it is stored. The HIPAA Breach Notification Rule at 45 C.F.R. § 164.408 requires a 60-day notification timeline to affected individuals and to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights. The encryption safe harbor at 45 C.F.R. § 164.402 means that PHI rendered unusable, unreadable, or indecipherable to unauthorized individuals through encryption or destruction satisfying NIST guidance is presumed to remove the breach-notification duty. HHS OCR has consistently invoked NIST SP 800-88 (now Revision 2 effective September 26, 2025) as the audit-defensible media-sanitization standard.
The Gramm-Leach-Bliley Act Safeguards Rule at 16 C.F.R. Part 314 requires financial institutions to develop, implement, and maintain a comprehensive information-security program with administrative, technical, and physical safeguards. The FTC’s final rule amending the Safeguards Rule became effective June 9, 2023. The amended rule requires multifactor authentication, encryption of customer information at rest and in transit, secure disposal of customer information no later than two years after the most recent use, a written incident-response plan, annual reporting to the board of directors by a qualified individual, and continuous monitoring. The secure-disposal element extends to retired IT assets: every device that held customer information at any point in its life must be sanitized to NIST guidance before disposition.
The Fair and Accurate Credit Transactions Act (FACTA) Disposal Rule at 16 C.F.R. § 682.3 applies to any person, entity, or business that possesses or maintains consumer report information for a business purpose. The rule requires reasonable measures to protect against unauthorized access to or use of the information in connection with its disposal. Compliance methods named in the rule include burning, pulverizing, or shredding papers; destroying or erasing electronic media so the information cannot practicably be read or reconstructed; and conducting due diligence on a document-destruction contractor. The Morgan Stanley OCC enforcement action ($60 million, 2020) for unencrypted server-decommission drives is the leading FACTA-Disposal-Rule precedent on enterprise IT asset disposition.
FAR 52.204-21 (Basic Safeguarding of Covered Contractor Information Systems) imposes 15 baseline NIST security controls on every federal contractor or subcontractor that processes federal contract information. Control (b)(1)(viii) requires sanitization or destruction of information system media containing federal contract information before disposal or release for reuse. The clause flows down to every level of the federal supply chain regardless of contract size and applies to commercial subcontractors holding federal contract information.
DFARS 252.204-7012 (Safeguarding Covered Defense Information and Cyber Incident Reporting) imposes the full set of NIST SP 800-171 controls on defense contractors and subcontractors handling Controlled Unclassified Information (CUI). NIST SP 800-171 Revision 3 (published May 14, 2024) is the operative version. Control MP.L2-3.8.3 requires sanitization or destruction of system media containing CUI before disposal or release for reuse, using mechanisms with strength and integrity commensurate with the security category or classification of the information. NIST SP 800-88 Revision 2 is the implementation standard.
The Cybersecurity Maturity Model Certification (CMMC) 2.0 program is the Department of Defense’s third-party assessment mechanism for NIST SP 800-171 compliance in the defense industrial base. CMMC 2.0 final rule was published in October 2024; rolling enforcement through DFARS clause inclusion runs through 2028. Level 1 (self-attestation) applies to federal contract information; Level 2 (third-party assessment for prioritized contracts, self-assessment for others) applies to CUI; Level 3 (DCMA-led assessment) applies to the highest-priority CUI. Media sanitization (MP.L2-3.8.3) is a required practice at Level 2 and Level 3. The strategic implication for non-defense enterprises: commercial customers, federal civilian customers, and state government customers are increasingly flowing down CMMC-aligned media-sanitization requirements through their own vendor contracts.
The federal Resource Conservation and Recovery Act (RCRA) Subtitle C at 42 U.S.C. § 6921-6939g governs hazardous waste from generation through transportation, treatment, storage, and disposal. The Universal Waste Rule at 40 C.F.R. Part 273 streamlines compliance for batteries, certain pesticides, mercury-containing equipment, and lamps. For enterprise IT asset disposition, the RCRA dimension is materially significant for CRT monitors (lead glass), older notebook batteries, mercury-backlit LCDs, and circuit boards exceeding hazardous-characteristic thresholds. Enterprises operating across multiple states must understand that 48 states administer RCRA directly while Alaska and Hawaii are under direct federal EPA RCRA jurisdiction.
NIST Special Publication 800-88 Revision 2 (Guidelines for Media Sanitization), effective September 26, 2025, is the U.S. civilian audit-defensible media-sanitization standard. It defines three sanitization categories: Clear (logical techniques such as cryptographic erase or overwrite), Purge (physical or logical techniques such as degaussing or block erase that resist sophisticated laboratory-level recovery), and Destroy (physical destruction such as shredding, disintegration, pulverizing, melting, or incineration). Revision 2 was published in two phases (initial public draft January 2025, final September 26, 2025) and aligns with IEEE 2883-2022 (Standard for Sanitizing Storage). State breach-notification statutes that include an encryption-or-sanitization safe harbor incorporate NIST 800-88 by reference, explicitly or implicitly. The single most important operational decision an enterprise can make in IT asset disposition is to require NIST SP 800-88 Revision 2 verified sanitization on every retired device, regardless of the state the data resides in. Secure data destruction certified to NIST SP 800-88 Revision 2 with serialized Certificate of Destruction satisfies the substantive outcome standard of every U.S. state simultaneously.
The penalty bands listed in state statutes understate the actual enforcement risk an enterprise carries on retired IT assets. The headline numbers (per-record fines, statutory maximums, per-day caps) are the floor. The real enforcement risk operates through a stack of overlapping regulators, private rights of action, contractual flow-downs, insurance underwriting consequences, and reputational damage that compounds across the stack. Executives scoping compliance posture must understand the full enforcement picture, not just the per-statute numbers.
The Morgan Stanley OCC enforcement action ($60 million civil money penalty, October 2020) is the leading U.S. enforcement precedent on enterprise IT asset disposition failures. The Office of the Comptroller of the Currency found that Morgan Stanley failed to exercise proper oversight of the 2016 decommissioning of two wealth-management data centers; the bank engaged a vendor that resold servers without sanitizing customer data; unencrypted server drives surfaced on online auction sites. The OCC penalty operated under 12 C.F.R. § 30 Safety and Soundness Standards (which incorporate GLBA Safeguards Rule expectations) and the FACTA Disposal Rule. Morgan Stanley separately faced class-action settlements exceeding $60 million on the same incident.
The U.S. Department of Health and Human Services Office for Civil Rights (HHS OCR) has consistently enforced HIPAA disposal rules. Representative settlements include Affinity Health Plan ($1.2 million, 2013, for failing to sanitize copier hard drives before returning leased units), Cottage Health ($3 million, 2018, for breach of unsecured ePHI on test environment servers), Anthem ($16 million, 2018, for breach affecting 78.8 million individuals), and Athens Orthopedic Clinic ($1.5 million, 2020, for breach affecting 208,557 individuals).
Illinois Biometric Information Privacy Act (BIPA) class-action settlements have set the U.S. high-water mark for biometric-data exposure. Facebook settled BIPA claims for $650 million (2020). TikTok settled BIPA claims for $92 million (2021). Snapchat settled for $35 million (2022). Each of these settlements operated under BIPA’s private right of action at 740 ILCS 14/20 with $1,000 statutory damages for negligent violations and $5,000 for intentional or reckless violations, multiplied by the affected class size.
California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA) enforcement actions include the Sephora $1.2 million California Attorney General settlement (2022) for selling personal information without disclosure and DoorDash $375,000 (2024) for similar failures. The CCPA private right of action at Cal. Civ. Code § 1798.150 provides statutory damages of $100 to $750 per consumer per incident for breach of personal information resulting from a covered entity’s failure to maintain reasonable security procedures and practices.
New York Department of Financial Services (NYDFS) enforcement under 23 NYCRR 500 (Cybersecurity Requirements for Financial Services Companies) has produced consistent multi-million-dollar settlements: First American Financial ($1.5 million, 2022), Robinhood Crypto ($30 million, 2022), and EyeMed Vision Care ($4.5 million, 2022, in coordination with the New York Attorney General). NYDFS examines retired-device sanitization documentation as part of every routine cybersecurity examination of regulated entities.
A single retired-device incident affecting a multi-state customer base can trigger 30 to 50 state breach-notification obligations simultaneously. Each state operates a different timeline (24-hour public-sector Attorney General notice in Idaho; 14-business-day preliminary AG notice in Vermont; 30 days in Florida, Colorado, Maine, Washington; 45 days in Ohio, Wisconsin, Tennessee, Indiana; 60 days in Texas, Connecticut, Rhode Island; “most expedient time” elsewhere), a different content requirement for consumer notice, a different content requirement for AG notice, a different attestation requirement for free credit monitoring, a different threshold for AG-only notice, and a different mechanism for substitute notice. An enterprise that retires a single multi-state laptop fleet without verified sanitization has converted a single operational event into a 30-state regulatory-coordination event with statutory damages exposure under each state’s penalty band.
Beyond statute timing, enterprise IT asset disposition compliance carries five recurring operational challenges: vendor management (downstream recycler chain-of-custody integrity, R2v3 or e-Stewards certification verification, contractual flow-down of safeguards); work-from-home device returns (the home-to-office transit gap where personal-use data may be commingled with corporate data on devices that never touched the corporate office); lost-device scenarios (laptop misplaced at airport, courier delivery exception, theft during transit, the question whether physical loss of unencrypted media is itself a breach trigger under each state’s statute); device-lease end-of-term returns (the manufacturer-takeback program disposes of the device but provides no Certificate of Destruction to the enterprise, leaving an audit gap); and acquired-company device inventories (M&A diligence routinely surfaces target-company devices that were retired without documentation, creating successor-liability exposure).
The audit-defense burden falls on the enterprise, not the recycler. SOC 2 Type II audits, ISO 27001 certification audits, HIPAA OCR audits, NYDFS examinations, federal customer audits under FAR 52.204-21 and DFARS 252.204-7012, state customer audits under public-sector IT-disposal posture, and customer due-diligence audits under SOC 2 sub-service-organization rules all require the enterprise to produce serialized Certificates of Destruction, chain-of-custody logs, environmental disposition records, hazardous-waste manifests where applicable, and contracted-service safeguard terms. An enterprise that did not require its IT asset disposition vendor to produce this documentation at the time of disposition has no path to reconstruct it after the fact.
The state statutory minimums catalogued in the 50-state tables above are the floor of enterprise IT asset disposition compliance, not the ceiling. Sophisticated enterprises operate above the floor for seven business reasons that have nothing to do with avoiding statutory penalties. Each reason carries financial impact that, individually, exceeds the statutory penalty band of any single state.
A single dumpster-find incident, eBay-find incident, or online-auction-find incident creates national press coverage, social-media amplification, customer churn, employee-trust erosion, and brand-equity damage that materially exceeds any state statutory penalty. The Morgan Stanley OCC penalty was $60 million; the reputational and litigation cost over the next 24 months exceeded $120 million by reasonable estimate. The statutory penalty is the visible piece of the iceberg; the reputational impact is the submerged mass.
Cyber-liability and technology errors-and-omissions insurance underwriters now ask, as part of the standard application: Do you require NIST SP 800-88 sanitization on every retired device? Do you maintain serialized Certificates of Destruction? Do you maintain chain-of-custody documentation from generator to downstream recycler? Do you require R2v3 or e-Stewards certification of your IT asset disposition vendor? Negative answers trigger premium increases of 15 to 40 percent, coverage exclusions for retired-device incidents, sub-limits on disposal-related claims, and in some cases coverage decline. A single Certificate of Destruction infrastructure investment frequently pays back through reduced premiums within the first renewal cycle.
Acquirer diligence routinely includes the question: produce the Certificate of Destruction inventory for every retired device over the past three years. Gaps result in price reductions, escrow withholds, representation-and-warranty insurance carve-outs, and in extreme cases deal collapse. A target company that operationalized Certificate of Destruction documentation from the start has a defensible answer; a target that did not is exposed.
Federal customers under FAR 52.204-21 and DFARS 252.204-7012 require flow-down of media-sanitization obligations to every subcontractor at every tier. Commercial customers under SOC 2 require flow-down to service providers and sub-service organizations. ISO 27001 customers require flow-down to vendors processing in-scope information. HIPAA covered entities require Business Associate Agreements with downstream business associates. The enterprise that operationalizes NIST 800-88 Revision 2 sanitization once has a single answer that satisfies every contractual flow-down simultaneously.
Every major audit framework requires documented media-sanitization procedures and serialized destruction evidence. SOC 2 Type II Common Criteria CC6.5 (the entity discontinues use of physical devices and removable media when an authorized user leaves the entity or after the device’s authorized use period); ISO 27001 Annex A 7.10 (storage media) and A 7.14 (secure disposal or reuse of equipment); HIPAA Security Rule 45 C.F.R. § 164.310(d)(2)(i)-(ii); PCI DSS Requirement 9.4.7 (disposal of media containing cardholder data). The same NIST 800-88 Revision 2 evidence packet satisfies all of them.
Institutional investors, customers, and ratings agencies increasingly ask for e-waste recycling tonnage, R2v3 or e-Stewards certification status of downstream recyclers, reuse rate vs recycling rate vs landfill rate, embodied-carbon disclosure on retired assets, and downstream-vendor environmental compliance status. The ITAD program is increasingly a sustainability program reported in 10-K disclosures, CDP submissions, and ESG ratings. A defensible ITAD program is a defensible ESG narrative.
Cyber-insurance carriers paying ransomware claims now condition payout on the insured’s ability to demonstrate retired-device chain-of-custody and sanitization documentation. Insurers do this to confirm that the ransomware vector did not enter through an inadequately sanitized retired device that was somehow returned to the supply chain. Enterprises without serialized Certificate of Destruction documentation face delayed payouts and contested claims.
A single operating baseline satisfies every state breach-notification safe harbor, every federal regime, every major audit framework, every cyber-insurance underwriting question, every M&A diligence request, and every ESG reporting expectation: NIST SP 800-88 Revision 2 verified sanitization (Clear, Purge, or Destroy, selected per data sensitivity and media type), serialized Certificate of Destruction per device, chain-of-custody log with timestamped handoffs from generator to downstream recycler, R2v3-certified or e-Stewards-certified downstream recycler, Certificate of Recycling at the disposition end-state, and environmental disposition record reconciled against the inbound serialized asset list. The enterprise that operationalizes that baseline once is defensible everywhere at once.
The 50-state regulatory matrix documented above is the operating environment for every U.S. enterprise retiring IT assets. All Green Recycling, LLC is the IT asset disposition partner that operationalizes the defensible baseline across all 50 states from a single point of engagement, with serialized documentation that withstands regulator inquiry, audit examination, customer due diligence, M&A diligence, and insurance underwriting review.
All Green Recycling, LLC operates an integrated certification architecture covering data-security, environmental, quality, and occupational safety:
All Green Recycling, LLC delivers IT asset disposition services across all 50 U.S. states from a single point of engagement, with consistent serialized documentation, consistent chain-of-custody handling, and consistent Certificate of Destruction packaging regardless of which state the asset originated in. The multi-state operational footprint eliminates the vendor-by-state coordination overhead that fragments compliance posture and creates audit gaps.
Every IT asset disposition engagement produces a documentation packet retrievable in a single retrieval through IT asset reporting:
All Green Recycling, LLC operates the full sanitization capability stack to match every data sensitivity and media type to the appropriate NIST SP 800-88 Revision 2 outcome:
All Green Recycling, LLC operates programmatic engagement models across the regulated sectors most exposed to IT asset disposition risk:
All Green Recycling, LLC operates a programmatic engagement model for multi-state, multi-site enterprise IT asset retirements: single point of contact, integrated IT equipment packaging and transportation, consolidated reverse logistics and chain-of-custody tracking, scheduled audit-defense support for regulator inquiry, and post-engagement asset remarketing for qualifying devices with residual value recovery applied against the engagement cost.
Enterprises scoping IT asset disposition with multi-state regulatory exposure can engage All Green Recycling, LLC through any of the service entry points: IT asset disposition for end-to-end engagement management, secure data destruction for sanitization-only programs, certified electronics recycling for environmental disposition, secure equipment destruction for non-data sensitive assets, or asset remarketing for residual-value recovery engagements. Each engagement produces the full IT asset reporting documentation packet aligned to the 50-state compliance architecture documented above.
No single state has the strictest standard across all dimensions; “strictest” depends on the dimension. For breach notification timeline, Idaho (24-hour public-sector AG notice) and Vermont (14-business-day AG preliminary) are strictest. For records-disposal outcome standard, Massachusetts 201 CMR 17.00 WISP is the most prescriptive U.S. WISP. For biometric exposure, Illinois BIPA at 740 ILCS 14 is the strongest private right of action. For e-waste, Maine (38 M.R.S. § 1610, 2004) was first and California Electronic Waste Recycling Act (2003) imposes the broadest landfill ban. Enterprises operating across multiple states should design to NIST SP 800-88 Revision 2 verified sanitization, which satisfies the substantive outcome standard of every state simultaneously.
A small minority of states do not have a dedicated records-disposal statute; disposal duty in those states operates through (1) the breach-notification statute, (2) the state Consumer Protection Act or UDAP statute as a carryover claim, (3) sector-specific overlays such as healthcare or insurance data security, and (4) the federal FTC Disposal Rule at 16 C.F.R. § 682.3. The absence of a state disposal statute does not eliminate the disposal duty; it shifts the regulatory hook to consumer-protection or sector-specific authority.
Yes in most states. The vast majority of state breach-notification statutes define “personal information” to exclude data that is encrypted with a key not also compromised, or that has been rendered unreadable through verified sanitization. NIST SP 800-88 Revision 2 verified sanitization (Clear, Purge, or Destroy depending on data sensitivity and media type) is the operative U.S. civilian baseline and HHS / HIPAA safe harbor. The per-state pages document each state’s exact safe-harbor language; the federal FTC Disposal Rule and HIPAA Breach Notification Rule operate as the floor.
30 states have adopted the NAIC Insurance Data Security Model Law as of the research date. South Carolina was the first U.S. state to adopt (S.C. Code § 38-99, effective January 1, 2019). The complete adoption table is in the Quick-Filter Reference section above. The model imposes a written information security program with annual board certification on insurance licensees, including disposal-of-nonpublic-information duties that survive hardware retirement.
21 states have enacted a comprehensive consumer data privacy act as of the research date. California was first (CCPA effective January 1, 2020); Virginia was second (VCDPA effective January 1, 2023). The full list with effective dates is in the Quick-Filter Reference section above; Tennessee TIPA (effective July 1, 2025) is unique in providing a NIST Privacy Framework affirmative defense.
Approximately 12 to 15 states provide a statutory private cause of action for breach, disposal, biometric, or UDAP-carryover violations. Illinois BIPA ($1,000 negligent / $5,000 intentional per violation) and California CCPA § 1798.150 ($100 to $750 per consumer per incident) are the most exposure-heavy. New Jersey CFA, Nebraska CPA, North Carolina UDTPA, and Pennsylvania UTPCPL provide treble damages. The complete list is in the Quick-Filter Reference section above.
25 states have a manufacturer extended producer responsibility (EPR) program covering electronics. Maine (38 M.R.S. § 1610, 2004) was the first state to enact; Hawaii HEWRRA (2008) was the earliest computer-specific EPR. Most state EPR programs cover consumer devices and small businesses; enterprise bulk disposal usually routes through the federal RCRA hazardous-waste channel even in EPR states. The complete list is in the Quick-Filter Reference section above.
Alaska and Hawaii are the two U.S. states that have not received federal authorization to administer their own RCRA hazardous-waste program. In both states, RCRA enforcement is direct U.S. EPA jurisdiction (EPA Region 10 for Alaska; EPA Region 9 for Hawaii). The substantive federal hazardous-waste rules at 40 C.F.R. Parts 260-279 apply identically; the regulator and the administrative enforcement path are federal rather than state.
Document compliance to the strictest applicable state plus the federal baseline. For data on retired hardware, the documentation packet should include: (1) serialized asset list with serial numbers, media types, and data classifications, (2) chain-of-custody log with timestamped handoffs from enterprise custody through final disposition, (3) Certificate of Data Destruction per asset referencing NIST SP 800-88 Revision 2 (Clear, Purge, or Destroy), (4) Certificate of Recycling with downstream disposition, (5) environmental disposition record and hazardous-waste manifests where applicable, (6) certifications-and-frameworks alignment statement (ISO 14001, ISO 45001, R2v3, NAID AAA, e-Stewards), and (7) the contracted-service safeguard terms. This packet satisfies the documentation expectations of every state AG, every sector regulator (HHS OCR, FTC, NYDFS, OCC), and every federal prime contractor.
NIST Special Publication 800-88 Revision 2 (operative September 26, 2025) is the U.S. civilian audit-defensible standard. NIST SP 800-88 Revision 2 defines a Clear / Purge / Destroy taxonomy aligned to media type and data sensitivity, requires verification of sanitization (not just attestation), and is referenced by HIPAA, HHS, FTC, NYDFS, and DoD. NIST SP 800-88 Revision 2 supersedes Revision 1 and is the operative standard for all current ITAD engagements.
Each state name in the master comparison table above is a link to that state’s dedicated v1.3.4 compliance page. Each state page covers the breach-notification statute, records-disposal statute, comprehensive privacy law if applicable, biometric / genetic / sector-specific overlays, NAIC Insurance Data Security adoption, federal preemption matrix, public-sector IT disposal posture, ITAD-specific safe-harbor analysis, enterprise / commercial e-waste applicability, RCRA authorization status, statutory penalty schedule with private-right-of-action determinations, state sectoral regulators (banking, insurance, health, higher-education, public-utility commission), and 11 statute-anchored FAQs.
Digital data destruction compliance across 50 states is a continuous control posture, not a periodic disposal event. The state-by-state patchwork is real, but the audit-defensible documentation packet is consistent: serialized destruction records aligned to NIST SP 800-88 Revision 2, chain-of-custody continuity, environmental disposition evidence, hazardous-waste manifests where applicable, and the contracted-service safeguard terms. Enterprises that operationalize that record set carry defensible compliance posture across regulator inquiry (state AG, HHS OCR, FTC, NYDFS, state insurance department), audit cycle (SOC 2, HIPAA, GLBA, DFARS / CMMC, customer due diligence), and incident response.
All Green Recycling, LLC operationalizes that posture through IT asset disposition, secure data destruction, certified electronics recycling, secure equipment destruction, and reverse logistics and chain-of-custody tracking with serialized documentation aligned to the state-by-state architecture above.