Washington educational resource

Washington Data Breach Notification: An Operator's Guide

Washington's private-entity data breach notification statute, Chapter 19.255 RCW, requires any person or business that owns or licenses computerized personal information about Washington residents to disclose a breach of system security to affected residents, and in many cases to the Washington Attorney General. This guide walks through the definitions, the encryption safe harbor, the consumer and AG notice timing, the vendor and SaaS issues, and how the Washington framework compares to California's notification regime. It is an educational resource, not Washington legal advice.

Quick answer

If unencrypted personal information of Washington residents was acquired by an unauthorized person, the operator that owned or licensed the data must notify affected Washington residents and, if the breach affects more than 500 Washington residents, also notify the Washington Attorney General no more than 30 days after the breach was discovered. There is a defined encryption safe harbor and a defined process for breaches where the operator was a vendor or processor rather than the data owner.

Statutory intent

The legislature stated the policy reason for the statute plainly: the Attorney General should receive notification when breaches occur so that appropriate action can be taken to protect consumers, and consumers whose personal information has been jeopardized should be given the information they need to secure financial accounts and minimize harm from identity theft. That intent is the lens any close call should be read through.

What counts as personal information

"Personal information" under is, in essence, a Washington resident's first name or first initial and last name in combination with one or more defined data elements that are not encrypted or otherwise secured. The data-element categories include (without re-quoting the statute verbatim here, because the list has been amended over time and the current operative text controls):

Read the current statutory list at RCW 19.255.010 before deciding what is or is not personal information in a specific incident; the categories above are a working summary, not a substitute for the statute.

What counts as a breach of system security

The statute defines a "breach of the security of the system" by reference to unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information. The standard is acquisition, not mere exposure: a misconfigured database that was never accessed by an unauthorized person, and that the operator can confirm was not acquired, is not automatically a breach for notice purposes. That said, the burden of demonstrating that the data was not in fact acquired generally falls on the operator. Forensic investigation matters.

Encryption safe harbor

Notice obligations attach only when the personal information is acquired in unencrypted or otherwise unsecured form. Encrypted data acquired without the corresponding decryption key, password, or other means to render the data readable does not, by itself, trigger notice. Personal information must be disclosed if the data was not secured during the breach, or if the confidential process, encryption key, or other means to decipher the secured information was acquired by an unauthorized person at the same time.

Practical lesson: encryption is real protection, but only end-to-end. If the attacker took the database and the secrets vault, the encryption safe harbor does not apply.

Timing of notice

Consumer notice

Notice to affected Washington residents must be made in the most expedient time possible and without unreasonable delay, no more than 30 calendar days after the breach was discovered, subject to the legitimate needs of law enforcement and the time reasonably necessary to determine scope and restore reasonable system integrity.

Attorney General notice

If a single breach affects more than 500 Washington residents, the operator must also notify the Washington Attorney General. The statute makes the AG-notice timing explicit:

The AG notification has defined content requirements (number of affected Washington residents, types of personal information involved, time frame, description of the breach, steps taken to contain the breach, contact information). The AG notification must be updated if any required information is unknown at the time the notice is due.

Content of consumer notice

Statutory consumer notice content includes the toll-free numbers and addresses of the consumer reporting agencies and the Federal Trade Commission, a description of the personal information that was or was reasonably believed to have been acquired, a time frame, contact information, and recommended steps to protect against identity theft and to dispute fraudulent transactions.

Vendor and SaaS issues

This is the part of the statute most relevant to SaaS operators. If the operator licenses or processes personal information that it does not own, the operator's obligation runs to the owner or licensee of the information, not directly to affected residents. The processor must notify the owner immediately on discovery, and the owner then carries the consumer and AG notice obligations.

That allocation in the statute is not the same as the allocation in the contract. SaaS DPAs routinely allocate breach obligations between customer and vendor, including:

I will say this directly: a SaaS provider who has not negotiated breach allocation language with its enterprise customers is taking a meaningful risk. Breach response is expensive. Generic mutual indemnities almost never produce the result either side actually wants in a real incident.

Comparison to California breach notification

Contractual allocation of breach obligations

SaaS terms of service and data processing addenda routinely allocate breach obligations between operator and customer. The clauses most worth getting right:

Incident response readiness checklist

When attorney involvement matters

For a routine breach (a few dozen affected residents, encrypted backup snapshot acquired and recovered, no AG notice required), a well-prepared internal team can usually run the response with light legal review.

Attorney involvement is where I see it earn its cost on:

Service packages

Related resources

For SaaS terms drafting, see my Washington SaaS Terms Guide. For California privacy and breach analogs, see the California Privacy Hub. For more context, see the Washington Business Law hub.