Backup Documents 05/22/2012 Item #16D 8ORIGINAL DOCUMENTS CHECKLIST & ROUTING SLIP 1608
TO ACCOMPANY ALL ORIGINAL DOCUMENTS SENT TO
THE BOARD OF COUNTY COMMISSIONERS OFFICE FOR SIGNATURE
ROUTING SLIP
Complete routing lines #I through #4 as appropriate for additional signatures, dates, and/or information needed. If the document is already complete with the
exception of the Chairman's signature, draw a line throng routing lines # 1 through #4, complete the checklist, and forward to Ian Mitchell (line #5).
Route to Addressee(s)
(List in routing order)
Office
Initials
Date
1. Ashlee Franco
HHVS
(Initial)
5/29/12
2. Ian Mitchell, Executive Manager
Board of County Commissioners
AF
for pick u p
3. Clerk of Courts
Minutes and Records Dept., 4th Fl.
Agenda Item Number
16 D 8
4. Kim Grant
HHVS, Bldg H, 2 nd F1, Suite 211
Type of Document
MOU attached and original signature
Number of
Icopy
Attached
from the Chairman needed
Documents Attached
PRIMARY CONTACT INFORMATION
(The primary contact is the holder of the original document pending BCC approval. Normally the primary contact is the person who created/prepared the executive
summary. Primary contact information is needed in the event one of the addressees above, including Ian Mitchell needs to contact staff for additional or missing
information. All original documents needing the BCC Chairman's signature are to be delivered to the BCC office only after the BCC has acted to approve the
item.)
Name of Primary Staff
Louise Pelletier / Housing, Human and
Phone Number
252 -2696
Contact
Veteran Services
(Initial)
Please call or e-mail
1.
Original document has been signed/ initialed for legal sufficiency. (All documents to be
AF
for pick u p
Agenda Date Item was
May 22, 2012
Agenda Item Number
16 D 8
Approved by the BCC
by the Office of the County Attorney. This includes signature pages from ordinances,
Type of Document
MOU attached and original signature
Number of
Icopy
Attached
from the Chairman needed
Documents Attached
INSTRUCTIONS & CHECKLIST
1: Forms/ County Forms/ BCC Forms/ Original Documents Routing Slip W WS Original 9.03.04, Revised 1.26.05, Revised 2.24.05
Initial the Yes column or mark "N /A" in the Not Applicable column, whichever is
Yes
. N/A (Not
a ropriate.
(Initial)
Applicable)
1.
Original document has been signed/ initialed for legal sufficiency. (All documents to be
AF
signed by the Chairman, with the exception of most letters, must be reviewed and signed
by the Office of the County Attorney. This includes signature pages from ordinances,
resolutions, etc. signed by the County Attorney's Office and signature pages from
contracts, agreements, etc. that have been fully executed by all parties except the BCC
Chairman and Clerk to the Board and possibly State Officials.)
2.
All handwritten strike - through and revisions have been initialed by the County Attorney's
AF
Office and all other parties except the BCC Chairman and the Clerk to the Board
3.
The Chairman's signature line date has been entered as the date of BCC approval of the
AF
document or the final negotiated contract date whichever is applicable.
4.
"Sign here" tabs are placed on the appropriate pages indicating where the Chairman's
AF
si nature and initials are required.
5.
In most cases (some contracts are an exception), the original document and this routing slip
AF
should be provided to Ian Mitchell in the BCC office within 24 hours of BCC approval.
Some documents are time sensitive and require forwarding to Tallahassee within a certain
time frame or the BCC's actions are nullified. Be aware of your deadlines!
6.
The document was approved by the BCC on 5/22/2011 (enter date) and all changes
N/A
made during the meeting have been incorporated in the attached document. The
County Attorney's Office has reviewed the changes, if applicable.
1: Forms/ County Forms/ BCC Forms/ Original Documents Routing Slip W WS Original 9.03.04, Revised 1.26.05, Revised 2.24.05
MEMORANDUM
Date: June 12, 2012
To: Louise Pelletier, Case Management
Housing, Human &Veteran Services
From: Teresa Cannon, Deputy Clerk
Minutes & Records Department
Re: MOU for Limited County Access To Florida System Data
Attached are one (1) original referenced above, (Item #16D8) approved by Board
of County Commissioners on May 22, 2012.
After forwarding for signature and subsequent return, please send an executed
original to the Minutes and Records Department for the Board's Official Record.
If you have any questions, please contact me at 252 -8411.
Thank you.
Attachment
C hJdren & famd�ez
5
State of Florida Rick Scott
Department of Children and Families Governor
David E. Wilkins
Secretary
STANDARD MEMORANDUM OF AGREEMENT FOR
LIMITED COUNTY ACCESS TO FLORIDA SYSTEM DATA
This Memorandum of Agreement for Limited County Access to FLORIDA System data (MOU) is
entered into between the Florida Department of Children and Families (the Department) and
Collier County, a political subdivision of the State of Florida (the County).
WHEREAS, the Department maintains certain information in its Florida Online Recipient
Integrated Data Access system (FLORIDA) System regarding applicants seeking to qualify for
Medicaid Services;
WHEREAS, the County needs to access limited data on the FLORIDA System to confirm limited
information regarding recipients of Medicaid Services within the County for payment purposes;
and
WHEREAS, the Department is willing to provide the County with limited access to the data in
the FLORIDA System for such purposes, provided that the County complies with certain
security requirements.
NOW THEREFORE, IT IS AGREED AS FOLLOWS:
1. The foregoing recitations are true and incorporated into the terms of this MOU by reference
2. Conditioned on the County's compliance with the terms of "Exhibit A" to this MOU and the
terms below, the Department will grant authorized County personnel limited access to the
FLORIDA System to verify Medicaid recipient addresses. Authorized County personnel will
be provided "view only" access to the screens shown in "Exhibit B" to this MOU (the limited
FLORIDA data). The Department will have sole discretion to determine the means of
access and the manner of display of the limited FLORIDA data.
3. The County hereby agrees to comply with the terms of "Exhibit A" and will access the limited
FLORIDA data exclusively for purposes of verifying Medicaid recipient addresses and will
not utilize nor permit any person to utilize the limited FLORIDA data for any other purpose.
Any County record of the limited FLORIDA data shall be maintained and used only in
accordance with the terms of this MOU.
4. The Department will provide appropriate and timely training and support to the county with
regard to FLORIDA system access.
1317 Winewood Boulevard, Tallahassee, Florida 32399 -0700
Mission: Protect the Vulnerable, Promote Strong and Economically Self- Sufficient Families, and
Advance Personal and Family Recovery and Resiliency
W1:
5. Prior to granting access to the FLORIDA System to individual users at the County level, the
following must be accomplished:
a. The Department must be in receipt of a signed MOU with the appropriate County
entity(ies).
b. The Department must be in receipt of a FLORIDA Individual Security Information Form
( "Exhibit C ") for each user requesting access to the FLORIDA System.
c. The Department must be in receipt of a signed DCF CF 114 form "Security Agreement
Form" (Exhibit D). This form should accompany Exhibit C.
d. Individual users must have received confirmation from the FLORIDA Application Data
Security Administrator that access has been granted and received a user ID and an
initial password.
e. Individual users have completed FLORIDA access training.
f. Individuals have completed the required initial Department online security training, and
have printed out their completion certificate for their local personnel file. A copy of the
security- training certificate should accompany Exhibit C. This training is required
annually after completion of the initial training.
6. Term and termination. This MOU shall commence the last day executed by all parties and
shall continue for a period of five years, provided, however, that the confidentiality
requirements regarding the limited FLORIDA data shall survive the expiration or termination
of this MOU. This MOU may be terminated by either party without cause upon 30 days
written notice. This MOU may be terminated by either party for cause upon no less than 24
hours written notice. The Department may administratively suspend access to the FLORIDA
System at any time the Department has reason to believe that the County is not in full
compliance with the provisions of this MOU.
7. To the extent permitted by law, including Section 768.28, Florida Statutes, and without
waiving the limits of sovereign immunity, the County shall indemnify the Department, its
officers, employees and agents from any suits, actions, damages, claims and costs of every
name and description, including attorneys' fees, relating to access to or use of the limited
FLORIDA data by the County, its officers, employees or agents.
8. This MOU executed and entered into in the State of Florida, shall be construed, performed
and enforced in all respects in accordance with Florida law and venue shall be in Leon
County, Florida.
9. There are no provisions, terms, conditions, or obligations other than those contained herein,
and this MOU shall supersede all previous communications, representations, or
agreements, either verbal or written between the parties.
10. If any term or provision of this MOU is legally determined unlawful or unenforceable, the
remainder of the MOU shall remain in full force and effect and such term or provision shall
be stricken.
11. Modifications of provisions of this MOU shall be valid only when they have been reduced to
writing and duly executed by the duly authorized officials of both parties.
• l:
12. The parties contact coordinators for the administration of this MOU are:
County contact/coordinator:
Ashlee Franco
Accounting Supervisor
Collier County
3339 East Tamiami Trail, Suite 211
Naples, FL 34112
239 - 252 -2689
ashleefrancoCa)-colliergov. net
Department contact/coordinator:
Bruce R. Belrose
Chief. Operations and Research
Florida Department of Children and Families
Economic Self - Sufficiency Program Office
1317 Winewood Boulevard, 3-426
Tallahassee, FL 32399 -0700
850 - 717 -4083
Bruce belrose(cD-dcf. state. fl. us
IN WITNESS THEREOF, the parties hereto have caused this Memorandum of Agreement to be
executed by their undersigned officials as duly authorized.
COLLIER COUNTY BOARD OF COUNTY
COMMISSIONERS
.5-J
Signature ate
Fred W. Coyle
Chairman
ATTEST :^ ' % --r
DVWGHT -E. BRO) K, CLERK
=- Atte�L�:Rs� E6.OIes�ir�rl�rk
0pro1440NO ►�ir�
and legal sufficiency:
J nifer B. White
Assistant County Attorney
FLORIDA DEPARTMENT OF CHILDREN
AND FAMILIES
Signature
Date
Ann M. Berner
Director, Economic Self- Sufficiency
Program
Attachments:
Exhibit A — Use and Security Requirements
Exhibit B — FLORIDA system screen shots
Exhibit C — FLORIDA Individual Security Information form
Exhibit D — DCF CF114 Security Agreement Form
EXHIBIT A - USE AND SECURITY REQUIREMENTS 1608
The County agrees to comply with the following use and security requirements:
1. That the information obtained from the Department's system pursuant to the MOU (hereinafter "the
limited FLORIDA data ") is confidential in nature and protected from disclosure by State and Federal
Law.
2. To restrict the transmission of the limited FLORIDA data using secure file transfer protocols to County
personnel who have a verifiable need to know in the performance of their official duties for the
stated in Section 3 of the MOU. purposes
3. To maintain a listing of County personnel granted on -line access privileges to the Department's system
pursuant to this MOU and, upon request, make such information available to the Department. At a
minimum, the list will include the user's first and last name, User Identification (USERID), date access
was granted /changed /deleted, dates of initial security training and annual awareness training. This
information will be maintained for a period of 5 years after access has been terminated or until
administrative purposes have been served, whichever is longer.
4. To abide ' by IT Security Awareness training provided by the Department at
hfti)://Www.dcf.state.fl.us/admin/training.shtml or an equivalent security training provided to court
security officers. Initial and annual refresher IT Security Awareness training shall be documented. IT
5. To comply with State of Florida network security requirements specified in Florida Administrative Code
60DD- 2.006, Network Security.
6. That the limited FLORIDA data may not be re- disclosed by the County or its personnel verbally,
electronically or in any other forms except as specifically authorized by law or regulation and in
compliance with 42 C.F.R., Subpart F.
7. That any the limited FLORIDA data will be used only for the purposes stated in Section 3 of the MOU
and may be disclosed only for such purposes.
8. That the limited FLORIDA data shall be stored in a place physically secure from access by
unauthorized persons.
9. To safeguard access to the limited FLORIDA data in such a way that unauthorized persons cannot
view, print, copy or retrieve the information by any means.
10. To instruct all personnel granted on -line access privileges to the Department's system or granted
access to the limited FLORIDA data in the County's possession regarding the confidential nature of the
information, the safeguards and requirements of this MOU and the provisions of Chapters 71A -1 and
71A -2, Florida Administrative Code as well as Chapters 119, 812, 815, 817, 839 or 877, Florida
Statutes, or similar state and federal requirements.
11. To adhere to the confidentiality requirements stated herein, and to fully and promptly report any
infraction of these requirements to the respective contacts specified in Section 10 of the MI
12. To promptly notify the Department of any breach of security related to the limited FLORIDA data in its
possession and to be responsible for full compliance with section 817.5681, F.S., if applicable, in the
event of a breach of security concerning confidential personal information in its possession received
from one another, including but not limited to, providing notification to affected persons.
13. To provide any such breach notification, if applicable, to the Department for prior review and approval
of the contents of the notice.
3
"EXHIBIT B" 1608
Limited FLORIDA Data
m
0
W
O
H
W
1�
UA
W
5A
F�1
z
F�1
A
W
a
.�0
to
0
W
++
�q
V
(n
u
�O
U
N •�
�U
qt
I
ri �
In
O
zI
z �
I qc
q�
u O
fs�
y
U
Q
o .wa
O
a
O
XI
0
zz
�I
b �
a
Oi
v
a
O
z �
w
a
a°
E
z
a+ A
CO
rn
a
00
Q
a�
U
cd
0
LZ
a
a
w
A
M
A
z
a
u
U
A
a
b
a
O
b
d
m
b
M
Fa
a
wA
W
l_
rl
A 44
u �
N
lu
� u
U
o
3 a
C
..
9
ci u
M GO
U
0
a� o�
Qa 9A
O�q
8
H
Y
M
8
r.
n
s
a
n
.a
H
M
r
H
A
z
0
m
H
A
A
0
FGo
O'
0
W Ww
A 6 A
A
a
0
u
V
0
U
0
a
V'
A
ca
•+ ch �
CO) M lq
s
b
f/1
IV
s
a
0
A
b
E
z
Y
u
y
9
0
E
O
`o
U
e
8
N
0
U
0
A
3
9
• 1:
EXHIBIT
G 'Loft
SECURITY AGREEMENT FORM
The Department of Children 08
en and Famines has authorized you:
Employee's or Contractor's Name/Organization
to have access to sensitive data using computer- related media (e.g., printed reports, microfiche, system
inquiry, on -line update, or any magnetic media).
Computer crimes are a violation of the department's Standards of Conduct. In addition to departmental
discipline, committing computer crimes may result in Federal or State felony criminal charges.
I understand that a security violation may result in criminal prosecution according to the provisions of
department's Standards of Conduct in the Employee Handbook. Federal and State statutes and may also result in disciplinary action against me according to the
By my signature below, I acknowledge that I have received, read, understand and agree to be bound by
the following:
• The Computer Related Crimes Act, Chapter 815, F.S.
• Sections 7213, 7213A, and 7431 of the Internal Revenue Code; which provide civil and criminal
penalties for unauthorized inspection or disclosure of Federal tax data.
• 6103(1)(7) of the Internal Revenue Code, which provides confidentiality and disclosure of returns
and return information.
• CFOP 50-2.
• It is the policy of the Department of Children and Families that no contract employee shall have
access to IRS tax information or FDLE information, unless approved in writing, by name and
position to access specked information, as authorized by regulation and /or statute.
• It is the policy of the Department of Children and Families that I do not disclose personal passwords.
• It is the policy of the Department of Children and Families that t do not obtain information for my own
or another person's personal use.
• 1 will only access or view information or data for which I am authorized and have a legitimate
business reason to see when performing my duties. I shall maintain the integrity of all confidential
and sensitive information accessed.
• "Casual viewing" of employee or client data, even data that is not confidential or otherwise exempt
from disclosure as a public record, constitutes misuse of access and is not acceptable.
• The Department of Children and Families will perform regular database queries to identify misuse of
access.
• Chapter 119.0712, Florida Statutes, and the Driver Privacy Protection Act (DPPA).
PRIVACY ACT STATEMENT: Disclosure of your social security number is voluntary, but must be provided
in order to gain access to department systems. it is requested, however, pursuant to Section 282.318,
Florida Statutes, the Security of Data and Information Technology
requests social security numbers to ensure secure access to data systems, prevent unauthorized apcce s to
confidential and sensitive information collected and stored by the Department, and provide a unique
identifier in our systems.
Print Employee /Contractor Name Signature of Employee /Contractor
Da�,
Print Supervisor Name
CF 114, PDF 06/2010
Signature of Supervisor
Date
Distribution of Copies: Original — .Personnel File /Contract File; Copy — Employee /Contractor
CHAPTER 815: COMPUTER - RELATED CRIMES 1608
815.01 Short title. The provisions of this act shall be known and may be cited as the "Florida Computer Crimes Act."
(History: s. 1, ch. 78 -92.)
815.02 Legislative Intent. The Legislature finds and declares that:
(1) Computer - related crime is a growing problem in government as well as in the private sector.
(2) Computer - related crime occurs at great cost to the public since losses for each incident of computer crime tend to be far greater than the
losses associated with each incident of other white collar crime.
(3) The opportunities for computer - related crimes In financial institutions, government programs, government records, and other business
enterprises through the introduction of fraudulent records into a computer system, the unauthorized use of computer facilities, the alteration or
destruction of computerized information or files, and the stealing of financial instruments, data, and other assets are great.
(4) While various forms of computer crime might possibly be the subject of criminal charges based on other provisions of law, it is
appropriate and desirable that a supplemental and additional statute be provided which proscribes various forms of computer abuse.
(History: s. 1, ch. 78 -92.)
815.03 Definitions. As used in this chapter, unless the context clearly indicates otherwise:
(1) "Access" means to approach, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a
computer, computer system, or computer network.
(2) "Computer" means an internally programmed, automatic device that performs data processing.
(3) "Computer contaminant" means any set of computer instructions designed to modify, damage, destroy, record, or transmit information
within a computer, computer system, or computer network without the intent or permission of the owner of the information. The term includes,
but is not limited to, a group of computer instructions commonly called viruses or worms which are self - replicating or self- propagating and which
are designed to contaminant other computer programs or computer data; consume computer resources; modify, destroy, record, or transmit
data; or in some other fashion usurp the normal operation of the computer, computer system, or computer network.
(4) "Computer network" means any system that provides communications between one or more computer systems and its input or output
devices, including, but not limited to, display terminals and printers that are connected by telecommunication facilities.
(5) "Computer program or computer software" means a set of instructions or statements and related data which, when executed in actual or
modified form, cause a computer, computer system, or computer network to perform specked functions.
(6) "Computer services" include, but are not limited to, computer time; data processing or storage functions; or other uses of a computer,
computer system, or computer network.
(7) "Computer system" means a device or collection of devices, including support devices, one or more of which contain computer programs,
electronic instructions, or input data and output data, and which perform functions, including, but not limited to, logic, arithmetic, data storage,
retrieval, communication, or control. The term does not include calculators that are not programmable and that are not capable of being used in
conjunction with external files.
(8) "Data" means a representation of information, knowledge, facts, concepts, computer software, computer programs, or instructions. Data
may be in any form, in storage media or stored in the memory of the computer, or in transit or presented on a display device.
(9) "Financial Instrument" means any check, draft, money order, certificate of deposit, letter of credit, bill of exchange, credit card, or
marketable security.
(10) "intellectual property" means data, including programs.
(11) "Property" means anything of value as defined in [Footnote 11 s. 812.011 and includes, but is not limited to, financial instruments,
information, Including electronically produced data and computer software and programs In either machine - readable or human - readable form,
and any other tangible or intangible item of value.
(History: s. 1, ch. 78 -92; s. 9, ch. 2001 -54.) ([Footnote 11 Note: Repealed by s. 16, ch. 77.342 )
815.04 Offenses against intellectual property; public records exemption.
(1) Whoever willfully, knowingly, and without authorization modifies data, programs, or supporting documentation residing or existing internal
or external to a computer, computer system, or computer network commits an offense against intellectual property.
(2) Whoever willfully, knowingly, and without authorization destroys data, programs, or supporting documentation residing or existing Internal
or external to a computer, computer system, or computer network commits an offense against intellectual property.
(3) (a) Data, programs, or supporting documentation which Is a trade secret as defined in s. 812.081 which resides or exists internal or
external to a computer, computer system, or computer network which is held by an agency as defined in chapter 119 is confidential and exempt
from the provisions of s. 119.07(1) and s. 24(a), Art. I of the State Constitution. (b) Whoever willfully, knowingly, and without authorization
discloses or takes data, programs, or supporting documentation which is a trade secret as defined in s. 812.081 or is confidential as provided by
law residing or existing internal or external to a computer, computer system, or computer network commits an offense against intellectual
property.
(4) (a) Except as otherwise provided in this subsection, a
a property n offense against intellectual ro e rty is a felony of the third degree punishable s
,
provided in s. 775.082, s. 775.083, or s. 775.084. (b) If the offense is committed for the purpose of devising or executing any scheme or artifice
to defraud or to obtain any property, then the offender is guilty of a felony of the second degree, punishable as provided in s. 775.082, s.
775.083, or s. 775.084.
(History: s. 1, ch. 78 -92; s. 1, ch. 94 -100; s. 431, ch. 96 -406.)
815.045 Trade secret information. The Legislature finds that it is a public necessity that trade secret information as defined in s. 812.081, and
as provided for in s. 815.04(3), be expressly made confidential and exempt from the public records law because it is a felony to disclose such
records. Due to the legal uncertainty as to whether a public employee would be protected from a felony conviction if otherwise complying with
chapter 119, and with S. 24(a), Art. I of the State Constitution, it is imperative that a public records exemption be created. The Legislature in
making disclosure of trade secrets a crime has clearly established the importance attached to trade secret protection. Disclosing trade secrets in
an agency's possession would negatively impact the business interests of those providing an agency such trade secrets by damaging them In
the marketplace, and those entities and individuals disclosing such trade secrets would hesitate to cooperate with that agency, which would
Impair the effective and efficient administration of governmental functions. Thus, the public and private harm in disclosing trade secrets
significantly outweighs any public benefit derived from disclosure, and the public's ability to scrutinize and monitor agency action is not
diminished by nondisclosure of trade secrets. (History: s. 2, ch. 94 -100.) (Note. Former s. 119.165)
815.06 Offenses against computer users.
(1) Whoever willfully , knowingly, and without authorization: (a) Accesses or causes to be accessed any computer, computer system, or
computer network; (b) Disrupts or denies or causes the denial of computer system services to an authorized user of such computer system
1 or 5
1608 services, which, in whole or part, is owned
takes, injures, or damages equipment orsupplies used orrIn ended or to be used in a computer, omputer -system, ir computer network;
(c) Destroys,
(d) Destroys, injures, or damages any computer, computer system, or computer network; or (e) Introduces any computer contaminant into any
computer, computer system, or computer network, commits an offense against computer users.
(2) (a) Except as provided in paragraphs (b) and (c), whoever violates subsection (1) ommits a felony of the third degree, punishable as
provided in s. 775.082, s. 775.083, or s. 775.084. (b) Whoever violates subsection (1) and: 1. Damages a computer, computer equipment,
computer supplies, a computer system, or a computer network, and the monetary damage or loss incurred as a result of the violation is $5,000
or greater; 2. Commits the offense for the purpose of devising or executing any scheme or artifice to defraud or obtain property; or 3.
Interrupts or impairs a governmental operation or public Communication, transportation, or supply of water, gas, or other public service,
commits a felony of the second degree, punishable as provided in s. 775.082, S. 775.083, or s. 775.084. (c) Whoever violates subsection (1)
and the violation endangers human life commits a felony of the first degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.
(3) Whoever willingly, knowingly, and without authorization modifies equipment or supplies used or intended to be used in a computer,
Computer system, or computer network commits a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083.
(4) (a) In addition to any other civil remedy available, the owner or lessee of the computer, computer system, Computer network, computer
program, computer equipment, computer supplies, or computer data may bring a civil action against any person convicted under this section for
compensatory damages. (b) In any action brought under this subsection, the court may award reasonable attorney fees to the prevailing party.
(5) Any computer, computer system, computer network, computer software, or computer data owned by a defendant which is used during the
commission of any violation of this section or any computer owned by the defendant which is used as a repository for the storage of software or
data obtained in violation of this section is subject to forfeiture as provided under ss. 932.701 — 932.704.
(6) This section does not apply to any person who accesses his or her employer's computer system, computer network, computer program,
or computer data when acting within the scope of his or her lawful employment.
(7) For purposes of bringing a civil or criminal action under this section, a person who causes, by any means, the access to a computer,
computer system, or computer network in one jurisdiction from another jurisdiction is deemed to have personally accessed the computer,
computer system, or computer network in both jurisdictions.
(History: s. 1, ch. 78 -92; s. 11, ch. 2001 -54.)
815.07 This chapter not exclusive. The provisions of this chapter shall not be construed to preclude the applicability of any other provision of
the criminal law of this state which presently applies or may in the future apply to any transaction which violates this chapter, unless su
provision is inconsistent with the terms of this chapter. (History: s. 1, ch. 78 -92.) ch
SECTION 7213 — UNAUTHORIZED DISCLOSURE OF INFORMATION
(a) RETURNS AND RETURN INFORMATION -
(1) FEDERAL EMPLOYEES AND OTHER PERSONS — it shall be unlawful for any officer or employee of the United States or any person
described in section 6103(n)(or an officer or employee of any such person),or any former officer or employee, willfully to disclose to any person,
except as authorized in this title, any return or return information [as defined in section 6103(b)). Any violation of this paragraph shall be a
felony punishable upon conviction by a fine in any amount not exceeding $5,000, or imprisonment of not more than 5 years, or both, together
with the Costs of prosecution, and if such offense is committed by any officer or employee of the United States, he shall, in addition to any other
punishment, be dismissed from office or discharged from employment upon conviction for such offense.
(2) STATE AND OTHER EMPLOYEES — It shall be unlawful for any person [not described in paragraph 0)] willfully to disclose to any
person, except as authorized in this title, any return or return information [as defined in section 6103(b)] acquired by him or another person
under subsection (d),(i)(3)(B)(i),(1 )(6),(7),(8),(9),(10),(12),(15) or (16) or (m)(2),(4),(5),(6), or (7) of section 6103. Any violation of this paragraph
shall be a felony punishable by a fine in any amount not exceeding $5,000, or imprisonment of not more than 5 years, or both, together with the
cost of prosecution.
(3) OTHER PERSONS — It shall be unlawful for any person to whom any return or return information [as defined in section 6103(b)] is
disclosed in an manner unauthorized by this title thereafter willfully to print or publish in any manner not provided by law any such return or
return information. Any violation of this paragraph shall be a felony punishable by a fine In any amount not exceeding $5,000, or imprisonment
of not more than 5 years, or both, together with the cost of prosecution.
(4) SOLICITATION — It shall be unlawful for any person willfully to offer any item of material value in exchange for any return or return
information [as defined in 6103(b)] and to receive as a result of such solicitation any such return or return Information. Any violation of this
paragraph shall be a felony punishable by a fine In any amount not exceeding $5,000, or imprisonment of not more than 5 years, or both,
together with the cost of prosecution.
(5) SHAREHOLDERS — It shall be unlawful for any person to whom return or return information [as defined in 6103(b)) is disclosed pursuant
to the provisions of 6103((e)(1)(D)(iii) willfully to disclose such return or return information in any manner not provided by law. Any violation of
this paragraph shall be a felony punishable by a fine in any amount not exceeding $5,000, or imprisonment of not more than 5 years, or both,
together with the cost of prosecution.
SECTION 7213A — UNAUTHORIZED INSPECTION OF RETURNS OR RETURN INFORMATION
(a) PROHIBITIONS —
(1) FEDERAL EMPLOYEES AND OTHER PERSONS — It shall be unlawful for -
(A) any officer or employee of the United States, or
(B) any person described in section 6103(n) or an officer willfully to inspect, except as authorized in this title, any return or return
information.
(2) STATE AND OTHER EMPLOYEES — It shall be unlawful for any person [not described in paragraph(l)) willfully to inspect, except as
authorized by this title, any return information acquired by such person or another person under a provision of section 6103 referred to in section
7213(a)(2).
(b) PENALTY —
(1) IN GENERAL —Any violation of subsection (a) shall be punishable upon conviction by a fine in any amount not exceeding $1000, or
imprisonment of not more than 1 year, or both, together with the costs of prosecution.
(2) FEDERAL OFFICERS OR EMPLOYEES — An officer or employee of the United States who is convicted of any violation of subsection (a)
shall, in addition to any other punishment, be dismissed from office or discharged from employment.
(c) DEFINITIONS — For purposes of this section, the terms "inspect", "return", and "return information" have respective meanings given such
terms by section 6103(b).
2of5
SECTION 7431 — CIVIL DAMAGES FOR UNAUTHORIZED DISCLOSURE OF RETURNS AND RETURN INFORMATION 1608
(a) IN GENERAL —
(1) INSPECTION OR DISCLOSURE BY EMPLOYEE OF UNITED STATES — If any officer or employee of the United States knowingly, or by
reason of negligence, inspects or discloses any return or return information with respect to a taxpayer in violation of any provision of section
6103, such taxpayer may bring a civil action for damages against the United States in a district court of the United States.
(2) INSPECTION OR DISCLOSURE BY A PERSON WHO IS NOT AN EMPLOYEE OF THE UNITED STATES — If any person who is not an
officer or employee of the United States knowingly, or by reason of negligence, inspects or discloses any return or return information with
respect to a taxpayer in violation of any provision of section 6103, such taxpayer may bring a civil action for damages against such person in a
district court of the United States.
(b) EXCEPTIONS — No liability shall arise under this section with respect to any inspection or disclosure -
(1) which results from good faith, but erroneous, interpretation of section 6103, or
(2) which Is requested by the taxpayer.
(c) DAMAGES — In any action brought under subsection (a), upon a finding of liability on the part of the defendant, the defendant shall be liable
to the plaintiff in an amount equal to the sum of-
(1) the greater of—
(A) $1,000 for each act of unauthorized inspection or disclosure of a return or return information with respect to which such defendant is
found liable, or
(B) the sum of:
(i) the actual damages sustained by the plaintiff as a result of such unauthorized inspection or disclosure, plus
(ii) in the case of a willful inspection or disclosure or an inspection or disclosure which is the result of gross negligence, punitive
damages, plus
(2) the cost of the action.
(d) PERIOD FOR BRINGING ACTION — Notwithstanding any other provision of law, an action to enforce any liability created under this section
may be brought, without regard to the amount in controversy, at any time within 2 years after the date of discovery by the plaintiff of the
unauthorized Inspection or disclosure.
SECTION 6103 — CONFIDENTIALITY AND DISCLOSURE OF RETURNS AND RETURN INFORMATION
(1) DISCLOSURE OF RETURNS AND RETURN INFORMATION FOR PURPOSES OTHER THAN TAX ADMINISTRATION
(7) Disclosure of return Information to Federal, State, and local agencies administering certain programs under the Social Security Act, the
Food Stamp Act of 1977, or title 38, United States Code, or certain housing assistance programs
(A) Return information from Social Security Administration — The Commissioner of Social Security shall, upon written request, disclose
return information from returns with respect to net earnings from self- employment (as defined in section 1402), wages (as defined in section
3121 (a) or 3401 (a)), and payments of retirement income, which have been disclosed to the Social Security Administration as provided by
paragraph (1) or (5) of this subsection, to any Federal, State, or local agency administering a program listed in subparagraph (D).
from returns with respect to unearned nea nedt Internal
a from the Internal Secretary shall,
Service files upon
o written request,
al, State, or local gency administering information a
program listed in subparagraph (D).
(C) Restriction on disclosure — The Commissioner of Social Security and the Secretary shall disclose return information under
subparagraphs (A) and (B) only for purposes of, and to the extent necessary in, determining eligibility for, or the correct amount of, benefits
under a program listed In subparagraph (D).
(D) Programs to which rule applies — The programs to which this paragraph applies are:
(i) a State program funded under part A of title IV of the Social Security Act;
(ii) medical assistance provided under a State plan approved under title XIX of the Social Security Act or subsidies provided under
section 186OD -14 of such Act;
(iii) supplemental security income benefits provided under title XVI of the Social Security Act, and federally administered
supplementary payments of the type described in section 1616(x) of such Act (including payments pursuant to an agreement entered into under
section 212(a) of Public Law 93 -66);
(iv) any benefits provided under a State plan approved under title 1, X, XIV, or XVI of the Social Security Act (as those titles apply to
Puerto Rico, Guam, and the Virgin islands);
(v) unemployment compensation provided under a State law described in section 3304 of this title;
(vi) assistance provided under the Food Stamp Act of 1977;
(vii) State- administered supplementary payments of the type described in section 1616(a) of the Social Security Act (including
payments pursuant to an agreement entered into under section 212(a) of Public Law 93 -66);
(viii)
(1) any needs -based pension provided under chapter 15 of title 38, United States Code, or under any other law administered by
the Secretary of Veterans Affairs;
(II) parents' dependency and indemnity compensation provided under section 1315 of title 38, United States Code;
(111) health -care services furnished under section 117110(a)(1)(1), 1710(a)(2), 1710(b), and 1712(a)(2)(B) of such title; and
(IV) compensation paid under chapter 11 of title 38, United States Code, at the 100 percent rate based solely on unemployability
and without regard to the fact that the disability or disabilities are not rated as 100 percent disabling under the rating schedule; and
(ix) any housing assistance program administered by the Department of Housing and Urban Development that involves initial and
periodic review of an applicant's or participant's income, except that return information may be disclosed under this clause only on written
request by the Secretary of Housing and Urban Development and only for use by officers and employees of the Department of Housing and
Urban Development with respect to applicants for and participants in such programs.
Only return information from returns with respect to net earnings from self- employment and wages may be disclosed under this paragraph for
use with respect to any program described in clause (viii)(IV). Clause (viii) shall not apply after September 30, 2008.
3 of 5
DRIVER PRIVACY PROTECTION ACT (DPPA)
Under state law, motor vehicle, driver license, and vehicular crash records are subject to public disclosure. The Driver Privacy Protection Act
(DPPA) keeps your personal information private by limiting who has access to the information. ( http:// www .flhsmv.gov /ddl/DPPAInfo.htmi)
119.0712 Executive branch agency - specific exemptions from inspection or copying of public records.
(2) DEPARTMENT OF HIGHWAY SAFETY AND MOTOR VEHICLES.
(a) Personal information contained in a motor vehicle record that identifies an individual is confidential and exempt from s. 119.07(1) and
s. 24(a), Art. I of the State Constitution except as provided in this subsection. Personal information includes, but is not limited to, an individual's
social security number, driver identification number or identification card number, name, address, telephone number, medical or disability
information, and emergency contact information. For purposes of this subsection, personal information does not Include information relating to
vehicular crashes, driving violations, and driver's status. For purposes of this subsection, the term "motor vehicle record" means any record that
pertains to a motor vehicle operator's permit, motor vehicle title, motor vehicle registration, or identification card Issued by the Department of
Highway Safety and Motor Vehicles.
(b) Personal Information contained in motor vehicle records made confidential and exempt by this subsection may be released by the
department for any of the following uses:
1. For use in connection with matters of motor vehicle or driver safety and theft; motor vehicle emissions; motor vehicle product
alterations, recalls, or advisories; performance monitoring of motor vehicles and dealers by motor vehicle manufacturers; and removal of
nonowner records from the original owner records of motor vehicle manufacturers, to carry out the purposes of Titles I and IV of the Anti Car
Theft Act of 1992, the Automobile Information Disclosure Act (15 U.S.C. ss. 1231 et seq.), the Clean Air Act (42 U.S.C. ss. 7401 et seq.), and
chapters 301, 305, and 321 -331 of Title 49, United States Code.
2. For use by any government agency, including any court or law enforcement agency, In carrying out its functions, or any private person
or entity acting on behalf of a federal, state, or local agency in carrying out its functions.
3. For use in connection with matters of motor vehicle or driver safety and theft; motor vehicle emissions; motor vehicle product
alterations, recalls, or advisories; performance monitoring of motor vehicles, motor vehicle parts, and dealers; motor vehicle market research
activities, including survey research; and removal of nonowner records from the original owner records of motor vehicle manufacturers.
4. For use in the normal course of business by a legitimate business or its agents, employees, or contractors, but only:
and a. To verify the accuracy of personal information submitted by the individual to the business or its agents, employees, or contractors;
b. If such information as so submitted is not correct or is no longer correct, to obtain the correct information, but only for the
purposes of preventing fraud by, pursuing legal remedies against, or recovering on a debt or security interest against, the individual.
5. For use in connection with any civil, criminal, administrative, or arbitral proceeding in any court or agency or before any self- regulatory
body for:
state. a. Service of process by any certified process server, special process server, or other person authorized to serve process in this
I Mel •
b. Investigation in anticipation of litigation by an attorney licensed to practice law In this state or the agent of the attorney; however,
the information may not be used for mass commercial solicitation of clients for litigation against motor vehicle dealers.
c. Investigation by any person in connection with any filed proceeding; however, the information may not be used for mass
commercial solicitation of clients for litigation against motor vehicle dealers.
d. Execution or enforcement of judgments and orders.
e. Compliance with an order of any court.
6. For use in research activities and for use in producing statistical reports, so long as the personal Information is not published,
redisclosed, or used to contact individuals.
7. For use by any insurer or insurance support organization, or by a self - insured entity, or its agents, employees, or contractors, in
connection with claims investigation activities, anti -fraud activities, rating, or underwriting.
8. For use in providing notice to the owners of towed or impounded vehicles.
9. For use by any licensed private investigative agency or licensed security service for any purpose permitted under this subsection.
Personal information obtained based on an exempt driver's record may not be provided to a client who cannot demonstrate a need based on a
police report, court order, or business or personal relationship with the subject of the investigation.
10. For use by an employer or its agent or insurer to obtain or verify information relating to a holder of a commercial driver's license that
is required under 49 U.S.C. ss. 31301 et seq.
11. For use in connection with the operation of private toll transportation facilities.
12. For bulk distribution for surveys, marketing, or solicitations when the department has obtained the express consent of the person to
whom such personal information pertains.
13. For any use if the requesting person demonstrates that he or she has obtained the written consent of the person who is the subject
of the motor vehicle record.
14. For any other use specifically authorized by state law, if such use Is related to the operation of a motor vehicle or public safety.
15. For any other use if the person to whom the information pertains has given express consent in a format prescribed by the
department. Such consent shall remain in effect until it is revoked by the person on a form prescribed by the department.
(c) Notwithstanding paragraph (b), without the express consent of the person to whom such information applies, the following information
contained in motor vehicle records may only be released as specified in this paragraph:
1. Social security numbers may be released only as provided in subparagraphs (b)2., 5., 7., and 10.
2. An individual's photograph or image may be released only as provided in s. 322.142.
3. Medical disability information may be released only as provided in ss. 322.125 and 322.126.
4. Emergency contact information may be released only to law enforcement agencies for purposes of contacting those listed in the event
of an emergency.
(d) The restrictions on disclosure of personal information provided by this subsection shall not in any way affect the use of organ donation
information on individual driver licenses or affect the administration of organ donation initiatives in this state.
(e)1. Personal information made confidential and exempt may be disclosed by the Department of Highway Safety and Motor Vehicles to an
individual, firm, corporation, or similar business entity whose primary business interest is to resell or redisclose the personal information to
persons who are authorized to receive such information. Prior to the department's disclosure of personal information, such individual, firm,
corporation, or similar business entity must first enter into a contract with the department regarding the care, custody, and control of the
personal information to ensure compliance with the federal Driver's Privacy Protection Act of 1994 and applicable state laws.
4of5
• 1:
2. An authorized recipient of personal information contained in a motor vehicle record, except a recipient under subparagraph (b)12.,
may contract with the Department of Highway Safety and Motor Vehicles to resell or redisclose the information for any use permitted under this
section. However, only authorized recipients of personal information under subparagraph (b)12. may resell or redisclose personal information
pursuant to subparagraph (b)12.
3. Any authorized recipient who resells or rediscloses personal information shall maintain, for a period of 5 years, records Identifying
each person or entity that receives the personal Information and the permitted purpose for which it will be used. Such records shall be made
available for inspection upon request by the department.
(t) The department may adopt rules to carry out the purposes of this subsection and the federal Driver's Privacy Protection Act of 1994,
18 U.S.C. as. 2721 at seq. Rules adopted by the department may provide for the payment of applicable fees and, prior to the disclosure of
personal information pursuant to this subsection, may require the meeting of conditions by the requesting person for the purposes of obtaining
reasonable assurance concerning the identity of such requesting person, and, to the extent required, assurance that the use will be only as
authorized or that the consent of the person who is the subject of the personal information has been obtained. Such conditions may Include, but
need not be limited to, the making and filing of a written application in such form and containing such information and certification requirements
as the department requires.
(g) This subsection is subject to the Open Government Sunset Review Act in accordance with s. 119.15 and shall stand repealed
October 2, 2012, unless reviewed and saved from repeal through reenactment by the Legislature
5of5