A plain-language guide to ARS § 18-552 compliance for Arizona businesses

Unlock full access

Data breach

This guide is for informational purposes and does not constitute legal advice. Arizona’s data breach notification law carries civil penalties. Consult qualified legal counsel before making notification decisions. Arizona passed one of the country’s early data breach notification laws, and it has since been updated and strengthened. Yet when a security incident occurs, the majority of Arizona businesses we work with have no idea this law exists — let alone what it requires. That’s a significant problem. Arizona’s law has mandatory notification timelines, specific content requirements, and potential civil liability for non-compliance. This guide translates the statute into actionable terms.

This guide is for informational purposes and does not constitute legal advice. Arizona’s data breach notification law carries civil penalties. Consult qualified legal counsel before making notification decisions. Arizona passed one of the country’s early data breach notification laws, and it has since been updated and strengthened. Yet when a security incident occurs, the majority of Arizona businesses we work with have no idea this law exists — let alone what it requires. That’s a significant problem. Arizona’s law has mandatory notification timelines, specific content requirements, and potential civil liability for non-compliance. This guide translates the statute into actionable terms.


What the Law Covers

The Statute

Arizona Revised Statutes § 18-552 governs the notification obligations of any person who conducts business in Arizona and owns, maintains, or licenses “personal information” about Arizona residents.

This is broad. If your business operates in Arizona and holds any personal information about Arizona residents — your own employees, your clients, your patients, your customers — you are subject to this law.

What Counts as “Personal Information”

Arizona’s law defines personal information as an individual’s first name or initial and last name in combination with any one or more of the following elements, when the combination is not encrypted, redacted, or otherwise protected:

Data Element

Examples

Covered?

Social Security Number

SSN in HR or tax records

YES

Financial account number + access code

Bank account + routing number, credit card + CVV

YES

Driver’s license or state ID number

DL number in HR or intake records

YES

Electronic or digital signature

Signed PDFs, e-signature records

YES

Biometric data

Fingerprint scans, facial recognition data

YES

Medical or health insurance information

PHI, insurance ID, diagnosis codes

YES

Username or email + password

Login credentials for any account

YES

Private key for digital signature

Cryptographic keys for authentication

YES

 


If your breach involved encrypted, redacted, or otherwise protected data, notification may not be required. However, you must be able to demonstrate that the encryption was adequate. Consult counsel before concluding no notification is required.

What Triggers the Notification Obligation

The notification obligation is triggered when your business:

1.     Discovers or is notified of a “security system breach” — meaning an unauthorized acquisition of and access to unencrypted or unredacted computerized data that compromises the security or confidentiality of personal information.

2.     Has reason to believe that the personal information has been or is reasonably likely to be misused.

This second prong is important and often misunderstood. The law does not require confirmed misuse — it requires a reasonable belief that misuse is likely. In a ransomware attack where the attacker had access to systems containing personal information, the “reasonably likely” standard is almost always met.

Date of discovery is the date the obligation clock starts. The 45-day window begins at discovery, not at confirmed breach determination.


Who Must Be Notified

Affected Individuals

Any Arizona resident whose personal information was involved in the breach must be notified. This includes:

•       Employees and former employees

•       Clients and customers

•       Patients (if you’re in healthcare — note that HIPAA also applies and has its own requirements)

•       Vendors or contractors whose personal information you hold

The notification must be made in the most expedient time possible and without unreasonable delay, but not later than 45 days after discovering the breach.

The Arizona Attorney General

If the breach affects more than 500 Arizona residents, you must provide written notice to the Arizona Attorney General. The notification to the AG must include the date, estimated number of affected residents, and a description of the incident.

Consumer Reporting Agencies

If the breach affects more than 1,000 Arizona residents, you must notify the three largest consumer reporting agencies (Equifax, Experian, and TransUnion) of the timing, distribution, and approximate number of notices being sent. You do not need to send these agencies the content of the individual notifications.

Third-Party Data Holders

If you maintain personal information on behalf of another business (a service provider, cloud vendor, or contractor scenario), you have obligations to notify that business owner as well. The notification obligations then fall on the data owner, not just the service provider.


What the Notification Must Contain

Arizona law requires that notification to affected individuals include:

3.     A description of what happened (summary of the incident).

4.     The type of personal information that was or is reasonably believed to have been subject to the breach.

5.     The steps the company is taking to investigate and address the breach.

6.     The steps affected individuals can take to protect themselves.

7.     Contact information for the company, including a telephone number.


How Notification Must Be Delivered

Method

When Permitted

Conditions

Written notice (mail)

Always permitted

Sent to last known mailing address of affected individual

Electronic notice

If prior consent obtained

Consistent with E-Sign Act; must have prior agreement to electronic communications

Telephone notice

Supplemental only

Cannot be used as primary method; must follow up in writing

Substitute notice

Only if cost > $250K or 500K+ affected

Website posting + notification to major AZ media outlets AND AG

Email to affected individuals

Only with prior consent

Subject line must clearly identify the nature of the notice

 


Penalties for Non-Compliance

The Arizona Attorney General may bring civil action against a person that fails to comply with the notification requirements. Civil penalties can reach up to $10,000 per breach — but total civil penalties are capped at $500,000 for the same breach.

However, civil penalties from the AG are not the only exposure. Non-compliance can also:

•       Void or reduce cyber insurance coverage if non-compliance is material

•       Create additional liability in civil litigation by affected individuals

•       Trigger regulatory scrutiny under HIPAA (if healthcare), PCI-DSS (if payment card data), or other applicable frameworks

•       Result in reputational damage that far exceeds any statutory penalty


The Practical Preparation Checklist

  BEFORE AN INCIDENT 

□      ☐ Inventory what personal information your business holds and where it lives

□      ☐ Identify all systems containing personal information, including employee records, client files, and financial data

□      ☐ Designate a breach response lead with authority to make notification decisions

□      ☐ Identify outside breach counsel in advance (not during the incident)

□      ☐ Review cyber insurance policy for notification coverage and claim procedures

□      ☐ Create a pre-drafted notification letter template (see AEGITz Incident Response Template Pack)

□      ☐ Document your security controls so you can demonstrate protective measures were in place

 

AT DISCOVERY 

□      ☐ Record the date and time of discovery immediately — the 45-day clock starts now

□      ☐ Engage breach counsel before making notification decisions

□      ☐ Notify cyber insurance carrier within policy-specified timeframe

□      ☐ Preserve all evidence — logs, systems, communications

□      ☐ Do not make public statements before consulting counsel

  WITHIN 45 DAYS 

□      ☐ Determine what personal information was involved through forensic investigation

□      ☐ Identify all affected individuals

□      ☐ Send required notifications to individuals

□      ☐ Notify Arizona AG if 500+ residents affected

□      ☐ Notify credit bureaus if 1,000+ residents affected

□      ☐ Document all notifications with dates and methods

 


AEGITz helps Arizona businesses prepare for breach notification compliance as part of our managed services engagement — including documentation of security controls, pre-drafted notification templates, and breach counsel referrals. If you want to verify your current readiness, contact us for a compliance assessment.

Previous

Next Article

More Articles

Written by

Sawyer Mahony

Mar 12, 2026

The AI Productivity Gain Is Real. So Is the Risk. Here’s How to Get Both.

A report on the debate about AI in business, the risk vs the gain.

AEGITz Logo

Written by

Sawyer Mahony

Mar 12, 2026

The AI Productivity Gain Is Real. So Is the Risk. Here’s How to Get Both.

A report on the debate about AI in business, the risk vs the gain.

AEGITz Logo

Written by

Steve Copeland

Mar 8, 2026

Cyber Insurance Readiness Checklist for Arizona Businesses

What underwriters require — and how to document it before your next renewal

Cyber Insurance

Written by

Steve Copeland

Mar 8, 2026

Cyber Insurance Readiness Checklist for Arizona Businesses

What underwriters require — and how to document it before your next renewal

Cyber Insurance

Written by

Wyatt Mahony

Mar 8, 2026

The Arizona Law Firm Cybersecurity & Ethics Compliance Guide

ABA obligations, State Bar requirements, and the technical controls that satisfy them

 Cybersecurity & Ethics

Written by

Wyatt Mahony

Mar 8, 2026

The Arizona Law Firm Cybersecurity & Ethics Compliance Guide

ABA obligations, State Bar requirements, and the technical controls that satisfy them

 Cybersecurity & Ethics

Written by

Wyatt Mahony

Mar 8, 2026

Incident Response Template Pack

Print this. Fill it in before you need it. Keep a copy off-site.

cyber security technology network

Written by

Wyatt Mahony

Mar 8, 2026

Incident Response Template Pack

Print this. Fill it in before you need it. Keep a copy off-site.

cyber security technology network