I work in cybersecurity incident response and want to share the practical side of breach notification since the legal obligations are only half the battle. Every state has its own breach notification statute, and they differ substantially on timing, definitions of personal information, and notification methods. As of 2026, all 50 states plus DC, Puerto Rico, and the US Virgin Islands have breach notification laws.
The most aggressive timeline is currently in Florida, where SB 7040 requires notification within 30 days of determining a breach occurred. California (Cal. Civ. Code Section 1798.82) requires notification in the most expedient time possible and without unreasonable delay. In practice, California regulators interpret that as 45-60 days maximum, though there is no hard statutory deadline. Federal regulators under HIPAA require notification within 60 days if health data is involved.
Here is what most businesses miss: if you have customers in multiple states, you must comply with the strictest applicable law. A breach affecting customers in all 50 states means you effectively need to meet the shortest deadline and the broadest definition of protected information. This is why many companies default to notifying everyone within 30 days regardless of state.
Also critical: document your investigation timeline. If regulators or plaintiffs later argue that you delayed notification, you need to show exactly when you discovered the breach, when you confirmed it, and what steps you took in between. Engaging a forensics firm and outside counsel immediately creates a paper trail that demonstrates good faith. The attorney-client privilege may also protect your forensic investigation from discovery if structured correctly under the Kovel doctrine.
One final point -- do not forget about contractual notification obligations. Many B2B contracts contain breach notification clauses with timelines as short as 24-72 hours. Check your customer agreements before focusing exclusively on statutory requirements.