Skip to content Skip to navigation Skip to subnav
Searching 2025-2026 Session
State House Dome Vermont General Assembly
Home
  • Bills & Resolutions

    Search

    • Bill, Act & Resolution Search

    Bills

    • Released for Introduction
    • House Bills
    • Senate Bills
    • All Bills – Both Chambers
    • Bills Passed
    • Vetoed by the Governor
    • Enacted Without Signature
    • Bills In/Out of Committee

    Resolutions

    • House Resolutions
    • Senate Resolutions
    • All Resolutions – Both Chambers
    • Resolutions Adopted

    Acts

    • Acts & Resolves
    • Acts Affecting VSA Sections

    Research

    • Legislative Reports & Research
  • Committees

    House Committees

    • Agriculture, Food Resiliency, & Forestry
    • Appropriations
    • Commerce & Economic Development
    • Corrections & Institutions
    • Education
    • Energy & Digital Infrastructure
    • Environment
    • General & Housing
    • Government Operations & Military Affairs
    • Health Care
    • House Discrimination Prevention Panel
    • House Ethics Panel
    • House Sexual Harassment Prevention Panel
    • Human Services
    • Judiciary
    • Rules
    • Transportation
    • Ways & Means

    Senate Committees

    • Agriculture
    • Appropriations
    • Economic Development, Housing & General Affairs
    • Education
    • Ethics
    • Finance
    • Government Operations
    • Health & Welfare
    • Institutions
    • Judiciary
    • Natural Resources & Energy
    • Rules
    • Sexual Harassment Prevention Panel
    • Transportation

    Committee Types

    • All Committees
    • House Committees
    • Senate Committees
    • Joint Committees
    • Other Committees
    • Committees of Conference

    All Committee Meetings

    • All Scheduled Committee Meetings
    • Complete Weekly Schedule
    • Streaming Links
    • Accessibility

    Research

    • Legislative Reports & Research
  • Vermont Laws

    Statutes

    • Vermont Statutes Online
    • Statutes Search
    • Vermont Statutes at Lexis/Nexis

    Constitution

    • Constitution of the State of Vermont

    Acts

    • Acts & Resolves
    • Acts Affecting VSA Sections

    Search

    • Bill, Act & Resolution Search

    Rules

    • State Agency Rules at Lexis/Nexis
    • Court Rules at Lexis/Nexis
    • Legislative Committee on Administrative Rules (LCAR)
  • House

    The House of Representatives

    • House Overview
    • Find Representatives
    • All Representatives
    • House Committees

    Officers

    • Speaker of the House
    • Clerk of the House

    Calendars & Journals

    • Current House Calendar
    • All House Calendars
    • Current House Journal
    • All House Journals
    • House Bills for Introduction
    • Journals of the Joint Assembly

    Rules

    • House Rules
    • Joint Rules

    Search

    • Search House Calendars & Journals

    Related Information

    • Streaming Links
  • Senate

    The Senate

    • Senate Overview
    • Find Senators
    • All Senators
    • Senate Committees

    Officers

    • President of the Senate (Lt. Governor)
    • President Pro Tempore
    • Secretary of the Senate

    Calendars & Journals

    • Current Senate Calendar
    • All Senate Calendars
    • Current Senate Journal
    • All Senate Journals
    • Senate Bills for Introduction
    • Journals of the Joint Assembly

    Rules

    • Senate Rules
    • Joint Rules

    Search

    • Search Senate Calendars & Journals

    Related Information

    • Streaming Links
  • Joint Fiscal Office
  • Reports & Research

    Reports

    • Reports & Research Overview
    • Find Legislative Reports

    Research

    • Bills, Resolutions, Acts & Constitutional Proposals
    • Witness History
    • Subject History
    • Committees
    • Senate
    • House
    • Reapportionment

    PRA Exemptions

    • PRA Exemptions in Order
    • PRA Exemptions by Subject
    • PRA Exemptions Subject to 1 VSA 317(d)(2)

    History

    • History of the General Assembly
  • The State House

    The State House

    • Visiting the State House
    • About the State House
    • Hours & Directions
    • Accessibility

    History

    • History of the General Assembly

    Civic Education

    • Flowchart: How a Bill Becomes Law
    • Video: The Bill Process From Draft To Act
    • Become a Legislative Page!
    • School Field Trips
    • About Legislative Committees

    Galleries

    • Images of the State House

    Events

    • Farmers Night Concert Series
  • Staff & Offices

    House

    • Speaker of the House
    • Clerk of the House

    Senate

    • President of the Senate (Lt. Governor)
    • President Pro Tempore
    • Secretary of the Senate

    Staff Offices

    • Legislative Counsel
    • Legislative Operations
    • Legislative Information Technology
    • Joint Fiscal Office
    • Sergeant at Arms
    • Capitol Police Department
    • Office of Human Resources

    Contact

    • Questions & Comments

    Career Opportunities

    • Career Opportunities
Search for: How to use this search

Searching 2025-2026 Session

Print

The Vermont Statutes Online

The Statutes below include the actions of the 2025 session of the General Assembly.

NOTE
: The Vermont Statutes Online is an unofficial copy of the Vermont Statutes Annotated that is provided as a convenience.

Title 9 : Commerce and Trade

Chapter 062 : Protection of Personal Information

Subchapter 005 : DATA BROKERS

(Cite as: 9 V.S.A. § 2447)
  • § 2447. Data broker duty to protect information; standards; technical requirements

    (a) Duty to protect personally identifiable information.

    (1) A data broker shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate to:

    (A) the size, scope, and type of business of the data broker obligated to safeguard the personally identifiable information under such comprehensive information security program;

    (B) the amount of resources available to the data broker;

    (C) the amount of stored data; and

    (D) the need for security and confidentiality of personally identifiable information.

    (2) A data broker subject to this subsection shall adopt safeguards in the comprehensive security program that are consistent with the safeguards for protection of personally identifiable information and information of a similar character set forth in other State rules or federal regulations applicable to the data broker.

    (b) Information security program; minimum features. A comprehensive information security program shall at minimum have the following features:

    (1) designation of one or more employees to maintain the program;

    (2) identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of any electronic, paper, or other records containing personally identifiable information, and a process for evaluating and improving, where necessary, the effectiveness of the current safeguards for limiting such risks, including:

    (A) ongoing employee training, including training for temporary and contract employees;

    (B) employee compliance with policies and procedures; and

    (C) means for detecting and preventing security system failures;

    (3) security policies for employees relating to the storage, access, and transportation of records containing personally identifiable information outside business premises;

    (4) disciplinary measures for violations of the comprehensive information security program rules;

    (5) measures that prevent terminated employees from accessing records containing personally identifiable information;

    (6) supervision of service providers, by:

    (A) taking reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect personally identifiable information consistent with applicable law; and

    (B) requiring third-party service providers by contract to implement and maintain appropriate security measures for personally identifiable information;

    (7) reasonable restrictions upon physical access to records containing personally identifiable information and storage of the records and data in locked facilities, storage areas, or containers;

    (8)(A) regular monitoring to ensure that the comprehensive information security program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personally identifiable information; and

    (B) upgrading information safeguards as necessary to limit risks;

    (9) regular review of the scope of the security measures:

    (A) at least annually; or

    (B) whenever there is a material change in business practices that may reasonably implicate the security or integrity of records containing personally identifiable information; and

    (10)(A) documentation of responsive actions taken in connection with any incident involving a breach of security; and

    (B) mandatory post-incident review of events and actions taken, if any, to make changes in business practices relating to protection of personally identifiable information.

    (c) Information security program; computer system security requirements. A comprehensive information security program required by this section shall at minimum, and to the extent technically feasible, have the following elements:

    (1) secure user authentication protocols, as follows:

    (A) an authentication protocol that has the following features:

    (i) control of user IDs and other identifiers;

    (ii) a reasonably secure method of assigning and selecting passwords or use of unique identifier technologies, such as biometrics or token devices;

    (iii) control of data security passwords to ensure that such passwords are kept in a location and format that do not compromise the security of the data they protect;

    (iv) restricting access to only active users and active user accounts; and

    (v) blocking access to user identification after multiple unsuccessful attempts to gain access; or

    (B) an authentication protocol that provides a higher level of security than the features specified in subdivision (A) of this subdivision (c)(1);

    (2) secure access control measures that:

    (A) restrict access to records and files containing personally identifiable information to those who need such information to perform their job duties; and

    (B) assign to each person with computer access unique identifications plus passwords, which are not vendor-supplied default passwords, that are reasonably designed to maintain the integrity of the security of the access controls or a protocol that provides a higher degree of security;

    (3) encryption of all transmitted records and files containing personally identifiable information that will travel across public networks and encryption of all data containing personally identifiable information to be transmitted wirelessly or a protocol that provides a higher degree of security;

    (4) reasonable monitoring of systems for unauthorized use of or access to personally identifiable information;

    (5) encryption of all personally identifiable information stored on laptops or other portable devices or a protocol that provides a higher degree of security;

    (6) for files containing personally identifiable information on a system that is connected to the Internet, reasonably up-to-date firewall protection and operating system security patches that are reasonably designed to maintain the integrity of the personally identifiable information or a protocol that provides a higher degree of security;

    (7) reasonably up-to-date versions of system security agent software that must include malware protection and reasonably up-to-date patches and virus definitions, or a version of such software that can still be supported with up-to-date patches and virus definitions and is set to receive the most current security updates on a regular basis or a protocol that provides a higher degree of security; and

    (8) education and training of employees on the proper use of the computer security system and the importance of personally identifiable information security.

    (d) Enforcement.

    (1) A person who violates a provision of this section commits an unfair and deceptive act in commerce in violation of section 2453 of this title.

    (2) The Attorney General has the same authority to adopt rules to implement the provisions of this chapter and to conduct civil investigations, enter into assurances of discontinuance, and bring civil actions as provided under chapter 63, subchapter 1 of this title. (Added 2017, No. 171 (Adj. Sess.), § 2, eff. Jan. 1, 2019.)

Statutes
  • Vermont Statutes Online
  • Statutes Search
  • Vermont Statutes at Lexis/Nexis
Constitution
  • Constitution of the State of Vermont
Acts
  • Acts & Resolves
  • Acts Affecting VSA Sections
Rules
  • State Agency Rules at Lexis/Nexis
  • Court Rules at Lexis/Nexis
  • Legislative Committee on Administrative Rules (LCAR)

Contact

Vermont State House
115 State Street
Montpelier, VT 05633-5301
(802) 828-2228
sgtatarms@leg.state.vt.us


Capitol Police Department
802-828-2273

Member & Staff Links

Legislative Email Sign-on
Legislative Human Resources
Legislative Time Reporting
Legislative Expense Reporting
Test My MFA
How to Use This Website

Disclaimer

State Government

State of Vermont
Governor
Lieutenant Governor
Attorney General
Auditor
Secretary of State
Treasurer
Judiciary
State Agencies A-Z
State Telephone Directory

Noteworthy

Announcements
Scheduled Committee Meetings
Legislative Schedule


Site Resources

Sitemap | Disclaimers
Questions & Comments | Career Opportunities
Requests for Proposals | Accessibility


Comments or questions about the website? Fill out our feedback form and let us know.

Developers

Copyright 2026 State of Vermont. All rights reserved.

Website Design & Development by Bluehouse Group

Seal of Vermont