2018 -- S 2497 SUBSTITUTE A | |
======== | |
LC004930/SUB A | |
======== | |
STATE OF RHODE ISLAND | |
IN GENERAL ASSEMBLY | |
JANUARY SESSION, A.D. 2018 | |
____________ | |
A N A C T | |
RELATING TO INSURANCE - INSURANCE DATA SECURITY ACT | |
| |
Introduced By: Senator Roger Picard | |
Date Introduced: March 01, 2018 | |
Referred To: Senate Commerce | |
(Dept. of Business Regulation) | |
It is enacted by the General Assembly as follows: | |
1 | SECTION 1. Title 27 of the General Laws entitled "INSURANCE" is hereby amended |
2 | by adding thereto the following chapter: |
3 | CHAPTER 1.3 |
4 | INSURANCE DATA SECURITY |
5 | 27-1.3-1. Title. |
6 | This chapter shall be known and may be cited as the "Insurance Data Security Act." |
7 | 27-1.3-2. Purpose. |
8 | (a) The purpose and intent of this chapter is to establish standards for data security and |
9 | standards for the investigation of and notification to the commissioner of a cybersecurity event |
10 | applicable to licensees, as defined in § 27-1.3-3. Notwithstanding any other provision of law, this |
11 | chapter establishes the exclusive state standards applicable to licensees for data security, the |
12 | investigation of a cybersecurity event as defined in § 27-1.3-3, and notification to the |
13 | commissioner. This provision does not affect a licensee's responsibility to notify consumers in |
14 | accordance with § 27-1.3-6(c). |
15 | (b) This chapter may not be construed to create or imply a private cause of action for |
16 | violation of its provisions, nor may it be construed to curtail a private cause of action which |
17 | would otherwise exist in the absence of this chapter. |
18 | 27-1.3-3. Definitions. |
19 | As used in this chapter, the following terms shall have these meanings: |
| |
1 | (1) "Authorized individual" means an individual known to and screened by the licensee |
2 | and determined to be necessary and appropriate to have access to the nonpublic information held |
3 | by the licensee and its information systems. |
4 | (2) "Commissioner" means the director of the department of business regulation or the |
5 | chief insurance regulatory official of the state. |
6 | (3) "Consumer" means an individual, including, but not limited to, applicants, |
7 | policyholders, insureds, beneficiaries, claimants, and certificate holders who is a resident of this |
8 | state and whose nonpublic information is in a licensee's possession, custody or control. |
9 | (4) "Cybersecurity event" means an event resulting in unauthorized access to, disruption |
10 | or misuse of, an information system or nonpublic information stored on such information system: |
11 | (i) The term "cybersecurity event" does not include the unauthorized acquisition of |
12 | encrypted nonpublic information if the encryption, process or key is not also acquired, released or |
13 | used without authorization; and |
14 | (ii) Cybersecurity event does not include an event with regard to which the licensee has |
15 | determined that the nonpublic information accessed by an unauthorized person has not been used |
16 | or released and has been returned or destroyed. |
17 | (5) "Department" means the department of business regulation, division of insurance. |
18 | (6) "Encrypted" means the transformation of data into a form which results in a low |
19 | probability of assigning meaning without the use of a protective process or key. |
20 | (7) "Information security program" means the administrative, technical, and physical |
21 | safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, |
22 | dispose of, or otherwise handle nonpublic information. |
23 | (8) "Information system" means a discrete set of electronic information resources |
24 | organized for the collection, processing, maintenance, use, sharing, dissemination or disposition |
25 | of electronic information, as well as any specialized system such as industrial/process controls |
26 | systems, telephone switching and private branch exchange systems, and environmental control |
27 | systems. |
28 | (9) "Licensee" means any person licensed, authorized to operate, or registered, or |
29 | required to be licensed, authorized, or registered pursuant to the insurance laws of this state but |
30 | shall not include a purchasing group or a risk retention group chartered and licensed in a state |
31 | other than this state or a licensee that is acting as an assuming insurer that is domiciled in another |
32 | state or jurisdiction. |
33 | (10) "Multi-factor authentication" means authentication through verification of at least |
34 | two (2) of the following types of authentication factors: |
| LC004930/SUB A - Page 2 of 13 |
1 | (i) Knowledge factors, such as a password; or |
2 | (ii) Possession factors, such as a token or text message on a mobile phone; or |
3 | (iii) Inherence factors, such as a biometric characteristic. |
4 | (11) "Nonpublic information" means information that is not publicly available |
5 | information and is: |
6 | (i) Business related information of a licensee the tampering with which, or unauthorized |
7 | disclosure, access or use of which, would cause a material adverse impact to the business, |
8 | operations or security of the licensee; |
9 | (ii) Any information concerning a consumer which because of name, number, personal |
10 | mark, or other identifier can be used to identify such consumer, in combination with any one or |
11 | more of the following data elements: |
12 | (A) Social Security number; |
13 | (B) Driver's license number or non-driver identification card number; |
14 | (C) Account number, credit or debit card number; |
15 | (D) Any security code, access code or password that would permit access to a consumer's |
16 | financial account; or |
17 | (E) Biometric records; |
18 | (iii) Any information or data, except age or gender, in any form or medium created by or |
19 | derived from a health care provider or a consumer and that relates to: |
20 | (A) The past, present or future physical, mental or behavioral health or condition of any |
21 | consumer or a member of the consumer's family; |
22 | (B) The provision of health care to any consumer; or |
23 | (C) Payment for the provision of health care to any consumer. |
24 | (12) "Person" means any individual or any non-governmental entity, including, but not |
25 | limited to, any non-governmental partnership, corporation, branch, agency or association. |
26 | (13) "Publicly available information" means any information that a licensee has a |
27 | reasonable basis to believe is lawfully made available to the general public from: federal, state or |
28 | local government records; widely distributed media; or disclosures to the general public that are |
29 | required to be made by federal, state or local law: |
30 | (i) For the purposes of this definition, a licensee has a reasonable basis to believe that |
31 | information is lawfully made available to the general public if the licensee has taken steps to |
32 | determine: |
33 | (A) That the information is of the type that is available to the general public; and |
34 | (B) Whether a consumer can direct that the information not be made available to the |
| LC004930/SUB A - Page 3 of 13 |
1 | general public and, if so, that such consumer has not done so. |
2 | (14) "Risk assessment" means the risk assessment that each licensee is required to |
3 | conduct under § 27-1.3-4(c). |
4 | (15) "State" means the state of Rhode Island. |
5 | (16) "Third-party service provider" means a person, not otherwise defined as a licensee, |
6 | who contracts with a licensee to maintain, process, store or otherwise is permitted access to |
7 | nonpublic information through its provision of services to the licensee. |
8 | 27-1.3-4. Information security program. |
9 | (a) Implementation. Commensurate with the size and complexity of the licensee, the |
10 | nature and scope of the licensee's activities, including its use of third-party service providers, and |
11 | the sensitivity of the nonpublic information used by the licensee or in the licensee's possession, |
12 | custody or control, each licensee shall develop, implement, and maintain a comprehensive written |
13 | information security program based on the licensee's risk assessment that contains administrative, |
14 | technical, and physical safeguards for the protection of nonpublic information and the licensee's |
15 | information system. |
16 | (b) Objectives. A licensee's information security program shall be designed to: |
17 | (1) Protect the security and confidentiality of nonpublic information and the security of |
18 | the information system; |
19 | (2) Protect against any threats or hazards to the security or integrity of nonpublic |
20 | information and the information system; |
21 | (3) Protect against unauthorized access to or use of nonpublic information, and minimize |
22 | the likelihood of harm to any consumer; and |
23 | (4) Define and periodically reevaluate a schedule for retention of nonpublic information, |
24 | and a mechanism for its destruction when no longer needed. |
25 | (c) Risk assessment. The licensee shall: |
26 | (1) Designate one or more employees, an affiliate, or an outside vendor designated to act |
27 | on behalf of the licensee who is responsible for the information security program; |
28 | (2) Identify reasonably foreseeable internal or external threats that could result in |
29 | unauthorized access, transmission, disclosure, misuse, alteration or destruction of nonpublic |
30 | information, including the security of information systems, and nonpublic information that are |
31 | accessible to, or held by, third-party service providers; |
32 | (3) Assess the likelihood and potential damage of these threats, taking into consideration |
33 | the sensitivity of the nonpublic information; |
34 | (4) Assess the sufficiency of policies, procedures, information systems and other |
| LC004930/SUB A - Page 4 of 13 |
1 | safeguards in place to manage these threats, including consideration of threats in each relevant |
2 | area of the licensee's operations, including: |
3 | (i) Employee training and management; |
4 | (ii) Information systems, including network and software design, as well as information |
5 | classification, governance, processing, storage, transmission, and disposal; |
6 | (iii) Detecting, preventing, and responding to attacks, intrusions, or other systems |
7 | failures; and |
8 | (5) Implement information safeguards to manage the threats identified in its ongoing |
9 | assessment, and no less than annually, assess the effectiveness of the safeguards' key controls, |
10 | systems, and procedures. |
11 | (d) Risk management. Based on its risk assessment, the licensee shall: |
12 | (1) Design its information security program to mitigate the identified risks, |
13 | commensurate with the size and complexity of the licensee's activities, including its use of third- |
14 | party service providers, and the sensitivity of the nonpublic information used by the licensee or in |
15 | the licensee's possession, custody or control. |
16 | (2) Determine which security measures listed herein are appropriate, and implement those |
17 | security measures to: |
18 | (i) Place access controls on information systems, including controls to authenticate and |
19 | permit access only to authorized individuals to protect against the unauthorized acquisition of |
20 | nonpublic information; |
21 | (ii) Identify and manage the data, personnel, devices, systems, and facilities that enable |
22 | the organization to achieve business purposes in accordance with their relative importance to |
23 | business objectives and the organization's risk strategy; |
24 | (iii) Restrict access at physical locations containing nonpublic information, only to |
25 | authorized individuals; |
26 | (iv) Protect by encryption or other appropriate means, all nonpublic information during |
27 | its transmission over an external network, and all nonpublic information stored on a laptop |
28 | computer or other portable computing or storage device or media; |
29 | (v) Adopt secure development practices for in-house developed applications utilized by |
30 | the licensee, and procedures for evaluating, assessing or testing the security of externally- |
31 | developed applications utilized by the licensee; |
32 | (vi) Modify the information system in accordance with the licensee's information security |
33 | program; |
34 | (vii) Utilize effective controls, which may include multi-factor authentication procedures |
| LC004930/SUB A - Page 5 of 13 |
1 | for any individual accessing nonpublic information; |
2 | (viii) Regularly test and monitor systems and procedures to detect actual and attempted |
3 | attacks on, or intrusions into, information systems; |
4 | (ix) Include audit trails within the information security program designed to detect and |
5 | respond to cybersecurity events and designed to reconstruct material financial transactions |
6 | sufficient to support normal operations and obligations of the licensee; |
7 | (x) Implement measures to protect against destruction, loss, or damage of nonpublic |
8 | information due to environmental hazards, such as fire and water damage, or other catastrophes or |
9 | technological failures; |
10 | (xi) Develop, implement, and maintain procedures for the secure disposal of nonpublic |
11 | information in any format; |
12 | (xii) Include cybersecurity risks in the licensee's enterprise risk management process; |
13 | (xiii) Stay informed regarding emerging threats or vulnerabilities and utilize reasonable |
14 | security measures when sharing information relative to the character of the sharing and the type |
15 | of information shared; and |
16 | (xiv) Provide its personnel with cybersecurity awareness training that is updated as |
17 | necessary to reflect risks identified by the licensee in the risk assessment. |
18 | (e) Oversight by board of directors. If the licensee has a board of directors, the board or |
19 | an appropriate committee of the board shall, at a minimum: |
20 | (1) Require the licensee's executive management or its delegates to develop, implement, |
21 | and maintain the licensee's information security program; |
22 | (2) Require the licensee's executive management or its delegates to report in writing at |
23 | least annually, the following information: |
24 | (i) The overall status of the information security program and the licensee's compliance |
25 | with this chapter; and |
26 | (ii) Material matters related to the information security program, addressing issues such |
27 | as risk assessment, risk management and control decisions, third-party service provider |
28 | arrangements, results of testing, cybersecurity events or violations and management's responses |
29 | thereto, and recommendations for changes in the information security program. |
30 | (3) If executive management delegates any of its responsibilities under § 27-1.3-4, it shall |
31 | oversee the development, implementation and maintenance of the licensee's information security |
32 | program prepared by the delegate(s), and shall receive a report from the delegate(s) complying |
33 | with the requirements of the report to the board of directors. |
34 | (f) Oversight of third-party service provider arrangements. |
| LC004930/SUB A - Page 6 of 13 |
1 | (1) A licensee shall exercise due diligence in selecting its third-party service provider; |
2 | and |
3 | (2) A licensee shall require a third-party service provider to implement appropriate |
4 | administrative, technical, and physical measures to protect and secure the information systems |
5 | and nonpublic information that are accessible to, or held by, the third-party service provider. |
6 | (g) Program adjustments. The licensee shall monitor, evaluate and adjust, as appropriate, |
7 | the information security program consistent with any relevant changes in technology, the |
8 | sensitivity of its nonpublic information, internal or external threats to information, and the |
9 | licensee's own changing business arrangements, such as mergers and acquisitions, alliances and |
10 | joint ventures, outsourcing arrangements and changes to information systems. |
11 | (h) Incident response plan. |
12 | (1) As part of its information security program, each licensee shall establish a written |
13 | incident response plan designed to promptly respond to, and recover from, any cybersecurity |
14 | event that compromises the confidentiality, integrity or availability of nonpublic information in |
15 | its possession, the licensee's information systems, or the continuing functionality of any aspect of |
16 | the licensee's business or operations. |
17 | (2) Such incident response plan shall address the following areas: |
18 | (i) The internal process for responding to a cybersecurity event; |
19 | (ii) The goals of the incident response plan; |
20 | (iii) The definition of clear roles, responsibilities and levels of decision-making authority; |
21 | (iv) External and internal communications and information sharing; |
22 | (v) Identification of requirements for the remediation of any identified weaknesses in |
23 | information systems and associated controls; |
24 | (vi) Documentation and reporting regarding cybersecurity events and related incident |
25 | response activities; and |
26 | (vii) The evaluation and revision as necessary of the incident response plan following a |
27 | cybersecurity event. |
28 | (i) Annual certification to commissioner of domiciliary state. Annually, each insurer |
29 | domiciled in this state shall submit to the commissioner, a written statement by February 15, |
30 | certifying that the insurer is in compliance with the requirements set forth in § 27-1.3-4. Each |
31 | insurer shall maintain for examination by the department all records, schedules and data |
32 | supporting this certificate for a period of five (5) years. To the extent an insurer has identified |
33 | areas, systems or processes that require material improvement, updating or redesign, the insurer |
34 | shall document the identification and the remedial efforts planned and underway to address such |
| LC004930/SUB A - Page 7 of 13 |
1 | areas, systems or processes. Such documentation must be available for inspection by the |
2 | commissioner. |
3 | 27-1.3-5. Investigation of a cybersecurity event. |
4 | (a) If the licensee learns that a cybersecurity event has or may have occurred, the |
5 | licensee, or an outside vendor and/or service provider designated to act on behalf of the licensee, |
6 | shall conduct a prompt investigation. |
7 | (b) During the investigation, the licensee, or an outside vendor and/or service provider |
8 | designated to act on behalf of the licensee, shall, at a minimum, determine as much of the |
9 | following information as possible: |
10 | (1) Whether a cybersecurity event has occurred; |
11 | (2) Assess the nature and scope of the cybersecurity event; |
12 | (3) Identify any nonpublic information that may have been involved in the cybersecurity |
13 | event; and |
14 | (4) Perform or oversee reasonable measures to restore the security of the information |
15 | systems compromised in the cybersecurity event in order to prevent further unauthorized |
16 | acquisition, release, or use of nonpublic information in the licensee's possession, custody or |
17 | control. |
18 | (c) If the licensee learns that a cybersecurity event has or may have occurred in a system |
19 | maintained by a third-party service provider, the licensee will complete the steps listed in § 27- |
20 | 1.3-5(b), or confirm and document that the third-party service provider has completed those steps. |
21 | (d) The licensee shall maintain records concerning all cybersecurity events for a period of |
22 | at least five (5) years from the date of the cybersecurity event, and shall produce those records |
23 | upon demand of the commissioner. |
24 | 27-1.3-6. Notification of a cybersecurity event. |
25 | (a) Notification to the commissioner. Each licensee shall notify the commissioner as |
26 | promptly as possible, but in no event later than seventy-two (72) hours from a determination that |
27 | a cybersecurity event has occurred when either of the following criteria has been met: |
28 | (1) This state is the licensee's state of domicile, in the case of an insurer, or this state is |
29 | the licensee's home state, in the case of a producer, as those terms are defined in § 27-2.4-2; or |
30 | (2) The licensee reasonably believes that the nonpublic information involved relates to |
31 | two hundred fifty (250) or more consumers residing in this state, and that is either of the |
32 | following has occurred: |
33 | (i) A cybersecurity event impacting the licensee of which notice is required to be |
34 | provided to any government body, self-regulatory agency or any other supervisory body pursuant |
| LC004930/SUB A - Page 8 of 13 |
1 | to any state or federal law; or |
2 | (ii) A cybersecurity event that has a reasonable likelihood of materially harming: |
3 | (A) Any consumer residing in this state; or |
4 | (B) Any material part of the normal operation(s) of the licensee. |
5 | (b) The licensee shall provide as much of the following information as possible in |
6 | electronic form as directed by the commissioner. The licensee shall have a continuing obligation |
7 | to update and supplement initial and subsequent notifications to the commissioner concerning the |
8 | cybersecurity event, including, but not limited to: |
9 | (1) The date of the cybersecurity event; |
10 | (2) A description of how the information was exposed, lost, stolen, or breached, including |
11 | the specific roles and responsibilities of third-party service providers, if any; |
12 | (3) How the cybersecurity event was discovered; |
13 | (4) Whether any lost, stolen, or breached information has been recovered, and if so, how |
14 | achieved; |
15 | (5) The identity of the source of the cybersecurity event; |
16 | (6) Whether the licensee has filed a police report or has notified any regulatory, |
17 | government or law enforcement agencies and, if so, when the notification was provided; |
18 | (7) A description of the specific types of information acquired without authorization. |
19 | "Specific types of information" means particular data elements including, for example, types of |
20 | medical information, types of financial information, or types of information allowing |
21 | identification of the consumer; |
22 | (8) The period during which the information system was compromised by the |
23 | cybersecurity event; |
24 | (9) The number of total consumers in this state affected by the cybersecurity event. The |
25 | licensee shall provide the best estimate in the initial report to the commissioner, and update this |
26 | estimate with each subsequent report to the commissioner pursuant to this section; |
27 | (10) The results of any internal review identifying a lapse in either automated controls or |
28 | internal procedures, or confirming that all automated controls or internal procedures were |
29 | followed; |
30 | (11) A description of efforts being undertaken to remediate the situation which permitted |
31 | the cybersecurity event to occur; |
32 | (12) A copy of the licensee's privacy policy, and a statement outlining the steps the |
33 | licensee will take to investigate and notify consumers affected by the cybersecurity event; and |
34 | (13) The name of a contact person who is both familiar with the cybersecurity event and |
| LC004930/SUB A - Page 9 of 13 |
1 | authorized to act for the licensee. |
2 | (c) Notification to consumers. The licensee shall comply with the provisions of chapter |
3 | 49.3 of title 11, as applicable, and provide a copy of the notice sent to consumers under that law |
4 | to the commissioner, when a licensee is required to notify the commissioner under § 27-1.3-6(a). |
5 | (d) Notice regarding cybersecurity events of third-party service providers: |
6 | (1) In the case of a cybersecurity event in a system maintained by a third-party service |
7 | provider of which the licensee has become aware, the licensee shall treat the event as set forth in |
8 | § 27-1.3-6(a). |
9 | (2) The computation of the licensee's deadlines shall begin on the day after the third-party |
10 | service provider notifies the licensee of the cybersecurity event, or the licensee otherwise has |
11 | actual knowledge of the cybersecurity event, whichever is sooner. |
12 | (3) Nothing in this chapter shall be construed to prevent or abrogate an agreement |
13 | between a licensee and another licensee, a third-party service provider, or any other party, to |
14 | fulfill any of the investigation requirements imposed under § 27-1.3-5 or notice requirements |
15 | imposed under § 27-1.3-6. |
16 | (e) Notice regarding cybersecurity events of reinsurers to insurers: |
17 | (1)(i) In the case of a cybersecurity event involving nonpublic information that is used by |
18 | the licensee that is acting as an assuming insurer, or in the possession, custody or control of a |
19 | licensee that is acting as an assuming insurer, and that does not have a direct contractual |
20 | relationship with the affected consumers, the assuming insurer shall notify its affected ceding |
21 | insurers and the commissioner of its state of domicile, within seventy-two (72) hours of making |
22 | the determination that a cybersecurity event has occurred. |
23 | (ii) The ceding insurers that have a direct contractual relationship with affected |
24 | consumers shall fulfill the consumer notification requirements imposed under chapter 49.3 of title |
25 | 11, and any other notification requirements relating to a cybersecurity event imposed under § 27- |
26 | 1.3-6. |
27 | (2)(i) In the case of a cybersecurity event involving nonpublic information that is in the |
28 | possession, custody or control of a third-party service provider of a licensee that is an assuming |
29 | insurer, the assuming insurer shall notify its affected ceding insurers and the commissioner of its |
30 | state of domicile within seventy-two (72) hours of receiving notice from its third-party service |
31 | provider that a cybersecurity event has occurred. |
32 | (ii) The ceding insurers that have a direct contractual relationship with affected |
33 | consumers shall fulfill the consumer notification requirements imposed under chapter 49.3 of title |
34 | 11, and any other notification requirements relating to a cybersecurity event imposed under § 27- |
| LC004930/SUB A - Page 10 of 13 |
1 | 1.3-6. |
2 | (f) Notice regarding cybersecurity events of insurers to producers of record: |
3 | (1) In the case of a cybersecurity event involving nonpublic information that is in the |
4 | possession, custody or control of a licensee that is an insurer or its third-party service provider |
5 | and for which a consumer accessed the insurer's services through an independent insurance |
6 | producer, the insurer shall notify the producers of record of all affected consumers as soon as |
7 | practicable as directed by the commissioner. |
8 | (2) The insurer is excused from this obligation for those instances in which it does not |
9 | have the current producer of record information for any individual consumer. |
10 | 27-1.3-7. Power of commissioner. |
11 | (a) The commissioner shall have the power to examine and investigate the affairs of any |
12 | licensee to determine whether the licensee has been, or is engaged in, any conduct in violation of |
13 | this chapter. This power is in addition to the powers which the commissioner possesses pursuant |
14 | to chapter 13.1 of this title. Any investigation or examination by the commissioner shall be |
15 | conducted pursuant to chapter 13.1 of this title. |
16 | (b) Whenever the commissioner has reason to believe that a licensee has been, or is |
17 | engaged in conduct in this state which violates this chapter, the commissioner may take any |
18 | action that the commissioner deems necessary or appropriate to enforce the provisions of this |
19 | chapter. |
20 | 27-1.3-8. Confidentiality. |
21 | (a) Any documents, materials or other information in the control or possession of the |
22 | department that are furnished by a licensee or an employee or agent thereof acting on behalf of |
23 | licensee pursuant to §§ 27-1.3-4(i) and 27-1.3-6(b)(2), (3), (4), (5), (8), (10), and (11), or that are |
24 | obtained by the commissioner in an investigation or examination pursuant to § 27-1.3-7 shall be |
25 | confidential by law and privileged, shall not be subject to the provisions of chapter 2 of title 38, |
26 | shall not be subject to subpoena, and shall not be subject to discovery or admissible in evidence in |
27 | any private civil action; provided, however, the commissioner is authorized to use the documents, |
28 | materials or other information in the furtherance of any regulatory or legal action brought as a |
29 | part of the commissioner's duties. |
30 | (b) Neither the commissioner nor any person who received documents, materials or other |
31 | information while acting under the authority of the commissioner shall be permitted or required to |
32 | testify in any private civil action concerning any confidential documents, materials, or |
33 | information subject to § 27-1.3-8(a). |
34 | (c) In order to assist in the performance of the commissioner's duties under this chapter, |
| LC004930/SUB A - Page 11 of 13 |
1 | the commissioner: |
2 | (1) May share documents, materials or other information, including the confidential and |
3 | privileged documents, materials or information subject to § 27-1.3-8(a), with other state, federal, |
4 | and international regulatory agencies, with the National Association of Insurance Commissioners, |
5 | its affiliates or subsidiaries, and with state, federal, and international law enforcement authorities; |
6 | provided, that the recipient agrees in writing to maintain the confidentiality and privileged status |
7 | of the document, material or other information; |
8 | (2) May receive documents, materials or information, including otherwise confidential |
9 | and privileged documents, materials or information, from the National Association of Insurance |
10 | Commissioners, its affiliates or subsidiaries and from regulatory and law enforcement officials of |
11 | other foreign or domestic jurisdictions, and shall maintain as confidential or privileged any |
12 | document, material or information received with notice, or with the understanding that it is |
13 | confidential or privileged under the laws of the jurisdiction that is the source of the document, |
14 | material or information; |
15 | (3) May share documents, materials or other information subject to § 27-1.3-8(a), with a |
16 | third-party consultant or vendor; provided, that the consultant agrees in writing to maintain the |
17 | confidentiality and privileged status of the document, material or other information; and |
18 | (4) May enter into agreements governing sharing and use of information consistent with |
19 | this subsection. |
20 | (d) No waiver of any applicable privilege or claim of confidentiality in the documents, |
21 | materials, or information shall occur as a result of the disclosure to the commissioner under this |
22 | section, or as a result of sharing as authorized in § 27-1.3-8(c). |
23 | (e) Nothing in this chapter shall prohibit the commissioner from releasing final, |
24 | adjudicated actions that are open to public inspection pursuant to chapter 2 of title 38 ("access to |
25 | public records") to a database or other clearinghouse service maintained by the National |
26 | Association of Insurance Commissioners, its affiliates or subsidiaries. |
27 | 27-1.3-9. Exceptions. |
28 | (a) The following exceptions shall apply: |
29 | (1) A licensee with fewer than ten (10) employees, including any independent |
30 | contractors, is exempt from § 27-1.3-4; |
31 | (2) A licensee subject to Pub.L. 104–191, 110 Stat. 1936, enacted August 21, 1996 |
32 | ("Health Insurance Portability and Accountability Act") that has established and maintains an |
33 | information security program pursuant to such law, rules, regulations, procedures or guidelines |
34 | established thereunder, will be considered to meet the requirements of § 27-1.3-4; provided, the |
| LC004930/SUB A - Page 12 of 13 |
1 | licensee is compliant with, and submits a written statement certifying its compliance with that act; |
2 | (3) An employee, agent, representative or designee of a licensee, who is also a licensee, is |
3 | exempt from § 27-1.3-4, and need not develop its own information security program to the extent |
4 | that the employee, agent, representative or designee is covered by the information security |
5 | program of the other licensee. |
6 | (b) In the event that a licensee ceases to qualify for an exception, such licensee shall have |
7 | one hundred eighty (180) days to comply with this chapter. |
8 | 27-1.3-10. Penalties. |
9 | In the case of a violation of this chapter, a licensee may be penalized in accordance with |
10 | the administrative penalty provisions of § 42-14-16. |
11 | 27-1.3-11. Severability. |
12 | If any provisions of this chapter or the application thereof to any person or circumstance |
13 | is for any reason held to be invalid, the remainder of the chapter and the application of such |
14 | provision to other persons or circumstances shall not be affected thereby. |
15 | SECTION 2. This act shall take effect upon passage. Licensees shall have one year from |
16 | the effective date of this act to implement § 27-1.3-4, and two (2) years from the effective date of |
17 | this act to implement § 27-1.3-4(f). |
======== | |
LC004930/SUB A | |
======== | |
| LC004930/SUB A - Page 13 of 13 |
EXPLANATION | |
BY THE LEGISLATIVE COUNCIL | |
OF | |
A N A C T | |
RELATING TO INSURANCE - INSURANCE DATA SECURITY ACT | |
*** | |
1 | This act would adopt the National Association of Insurance Commissioners Model Act |
2 | regarding insurance data security and procedures relating to any cybersecurity breaches. |
3 | This act would take effect upon passage. Licensees would have one year to implement § |
4 | 27-1.3-4, and two (2) years to implement § 27-1.3-4(f). |
======== | |
LC004930/SUB A | |
======== | |
| LC004930/SUB A - Page 14 of 13 |