All 50 US states + DC and 120+ countries have data breach notification laws. This is the complete reference for deadlines, penalties, and what triggers notification.
Fastest Deadline
72 hours
GDPR / UK GDPR
US States
50 + DC
All have notification laws
Max GDPR Fine
4% revenue
Or 20M EUR
Notification Cost
6% of total
IBM breakdown category
Data breach notification laws exist in over 120 countries, but timelines, penalties, and triggers vary dramatically. The European Union's GDPR set the global standard with its 72-hour notification requirement, which has been adopted by the UK, South Korea, and Singapore. Other jurisdictions use vaguer language like "as soon as feasible" or "reasonable time," creating interpretation challenges for multinational organizations. Understanding these requirements is essential for incident response planning — you cannot determine your notification obligations during a crisis if you have not mapped them in advance.
| Jurisdiction | Deadline | Authority | Max Fine | Trigger |
|---|---|---|---|---|
| European Union (GDPR) | 72 hours | Lead supervisory authority | 4% global revenue or 20M EUR | Risk to rights and freedoms |
| United Kingdom (UK GDPR) | 72 hours | ICO | 17.5M GBP or 4% revenue | Risk to rights and freedoms |
| United States (Federal) | No federal law | State-by-state | Varies by state | Varies by state |
| Canada (PIPEDA) | As soon as feasible | Privacy Commissioner | $100K CAD per violation | Real risk of significant harm |
| Australia (NDB Scheme) | 30 days | OAIC | $50M AUD | Likely to result in serious harm |
| Brazil (LGPD) | Reasonable time | ANPD | 2% revenue or $50M BRL | Risk or damage to data subjects |
| Japan (APPI) | Promptly (3-5 days guidance) | PPC | $1M JPY per violation | Leakage of personal data |
| South Korea (PIPA) | 72 hours | PIPC | 3% related revenue | Leakage of personal data |
| India (DPDP Act 2023) | Without unreasonable delay | Data Protection Board | 250 Crore INR (~$30M) | Personal data breach |
| Singapore (PDPA) | 3 days | PDPC | $1M SGD or 10% revenue | Significant harm or scale |
Source: National legislation, regulatory guidance. Last verified: April 2026.
The United States has no federal data breach notification law. Instead, all 50 states plus the District of Columbia maintain separate breach notification statutes, each with different definitions of personal information, notification deadlines, AG reporting requirements, and penalties. This fragmentation means that a breach affecting customers in multiple states requires simultaneous compliance with potentially dozens of different legal frameworks — a primary driver of the US's $10.22M average breach cost. Below are 15 key states that represent the range of requirements; the remaining 35+ states follow similar patterns.
| State | Deadline | AG Notification | Penalty | Notes |
|---|---|---|---|---|
| California | 30 days (SB 446, Jan 2026) | Yes (500+ records) | $2,500-$7,500/violation (CCPA) | Most comprehensive. CCPA/CPRA rights. |
| New York | Without unreasonable delay | Yes | $5,000/violation (SHIELD Act) | SHIELD Act expanded in 2019. |
| Texas | 60 days | Yes (250+ residents) | $100-$250K/breach | Expanded notification requirements 2025. |
| Florida | 30 days | Yes (500+ individuals) | $1K/day ($500K max) | One of the shortest deadlines. |
| Illinois | Without unreasonable delay | Yes | AG enforcement | BIPA biometric data law is separate. |
| Virginia | 60 days | Yes | $150K/violation (VCDPA) | Consumer Data Protection Act 2023. |
| Colorado | 30 days | Yes | $20K/violation | Colorado Privacy Act 2023. |
| Connecticut | 60 days | Yes | $5K/violation | Connecticut Data Privacy Act 2023. |
| Massachusetts | As soon as practicable | Yes | $5K/violation | 201 CMR 17.00 data security regs. |
| Washington | 30 days | Yes (500+ residents) | $25K/violation | My Health My Data Act 2024. |
| Pennsylvania | Without unreasonable delay | Yes | $1K-$5K/day | Breach of Personally Identifiable Info Act. |
| Ohio | 45 days | Yes | AG enforcement | Data Protection Act safe harbor. |
| Georgia | Without unreasonable delay | No specific requirement | $AG enforcement | Relatively limited scope. |
| New Jersey | Without unreasonable delay | Yes | $10K/violation | Expanded PI definition 2024. |
| Oregon | 45 days | Yes (250+ residents) | $25K/violation | Consumer Privacy Act 2024. |
Source: State legislation, National Conference of State Legislatures (NCSL)
Notification triggers vary significantly across jurisdictions, and understanding these differences is critical for determining your obligations. The definition of "personal information" that triggers notification ranges from narrow (name + SSN or financial account number) to broad (any data that could identify an individual). GDPR uses the broadest definition: any data relating to an identified or identifiable natural person.
Encryption safe harbour: Most US state laws and GDPR include an encryption exemption — if the breached data was encrypted and the encryption key was not compromised, notification is not required. This creates a powerful incentive for encryption at rest and in transit, as it effectively eliminates the notification cost category (6% of total breach cost according to IBM) for encrypted data. However, the exemption typically requires demonstrating that the encryption met industry standards (AES-256 or equivalent) and that the key management was adequate.
Risk-of-harm thresholds: Some jurisdictions require notification only when the breach poses a "real risk of significant harm" (Canada) or creates a "risk to rights and freedoms" (GDPR). This risk-based approach allows organizations to avoid notification for low-risk incidents (e.g., encrypted laptop lost but not accessed). However, risk assessment during an active incident is challenging, and regulators have penalized organizations that used risk assessments to avoid notification when the risk was later deemed significant. The safe approach is to err on the side of notification.
Discovery vs awareness triggers: A critical distinction is when the notification clock starts. Most laws start the countdown from "discovery" or "awareness" of the breach, not from when the breach occurred. This means the clock starts when your organization becomes aware of the breach, regardless of how long the breach has been active. Marriott's breach was active for four years before discovery — the notification obligations were triggered by discovery in 2018, not by the initial compromise in 2014. Organizations must have monitoring and detection capabilities to trigger the discovery clock as early as possible.
IBM's cost breakdown attributes 6% of total breach cost to notification — approximately $267,000 for a breach at the $4.44M global average. However, this percentage can be much higher for breaches affecting large numbers of individuals, where per-person costs multiply across millions of records. The major notification cost components include:
For a breach affecting 1 million individuals, notification and credit monitoring alone can cost $10-$33 million — far exceeding the 6% IBM average because mega-breaches drive the per-person cost multiplier. This is why large-scale breaches like Change Healthcare (190M records) and National Public Data (2.9B records) generate such extreme costs: the per-person notification obligation scales linearly regardless of organizational size.
Source: IBM Cost of a Data Breach Report 2025, industry pricing benchmarks
Failing to comply with notification requirements — either by not notifying at all or by notifying late — carries severe penalties that compound already-substantial breach costs. Regulators have become increasingly aggressive in penalizing delayed or inadequate notification, viewing it as a separate violation from the breach itself.
Up to 4% global revenue or 20M EUR. The 72-hour clock is strictly enforced. British Airways was fined 20M GBP (reduced from 183M GBP) partly for delayed notification.
$137-$68,928 per violation, maximum $2M/year per violation category. OCR has settled for $4.75M+ for failure to notify within the 60-day requirement.
$2,500-$7,500 per violation. With thousands or millions of affected individuals, penalties compound rapidly. Also grants consumers private right of action for breaches.
Multi-state AG coalitions have secured settlements of $18.5M+ (Target), $39.5M (T-Mobile) for breach notification failures. AG offices are increasingly resourced for these actions.
The lesson is clear: timely and complete notification is not optional. Organizations that attempt to minimize or delay notification consistently face more severe regulatory action, larger class action settlements, and greater reputational damage than those that notify promptly and transparently. Uber's $148M settlement for concealing its 2016 breach (paying the attacker $100K to delete data rather than notifying) demonstrates the extreme cost of attempted cover-ups versus transparent disclosure.