| Chapter 354 |
| 2024 -- H 7281 SUBSTITUTE A Enacted 06/26/2024 |
| A N A C T |
| RELATING TO INSURANCE -- EXAMINATIONS |
Introduced By: Representatives Kennedy, Azzinaro, O'Brien, Solomon, Edwards, Kazarian, and Casimiro |
| Date Introduced: January 26, 2024 |
| It is enacted by the General Assembly as follows: |
| SECTION 1. Section 27-13.1-3 of the General Laws in Chapter 27-13.1 entitled |
| "Examinations" is hereby amended to read as follows: |
| 27-13.1-3. Authority, scope, and scheduling of examinations. |
| (a) The director or any of his or her the director's examiners may conduct an examination |
| under this chapter of any company as often as the director in his or her the director's sole discretion |
| deems appropriate, but shall, at a minimum, conduct an examination of every insurer licensed in |
| this state not less frequently than once every five (5) years. In scheduling and determining the |
| nature, scope, and frequency of the examinations, the director shall consider such matters as the |
| results of financial statement analyses and ratios,; changes in management or ownership,; actuarial |
| opinions,; reports of independent certified public accountants,; and other criteria as set forth in the |
| Financial Condition Examiners’ Handbook adopted by the National Association of Insurance |
| Commissioners and in effect when the director exercises discretion under this section. |
| (b) For purposes of completing an examination of a company under this chapter, the |
| director may examine or investigate any person, or the business of any person, in so far as the |
| examination or investigation is, in the sole discretion of the director, necessary or material to the |
| examination of the company. |
| (c) In lieu of an examination under this chapter of a foreign or alien insurer licensed in this |
| state, the director may accept an examination report on the company as prepared by the insurance |
| department for the company’s state of domicile or port of entry state only if: |
| (1) The insurance department was at the time of the examination accredited under the |
| National Association of Insurance Commissioners’ financial regulation standards and accreditation |
| program; or |
| (2) The examination is performed under the supervision of an accredited insurance |
| department or with the participation of one or more examiners who are employed by an accredited |
| state insurance department and who, after a review of the examination work papers and report, state |
| under oath that the examination was performed in a manner consistent with the standards and |
| procedures required by their insurance department. |
| SECTION 2. Chapter 27-1 of the General Laws entitled "Domestic Insurance Companies" |
| is hereby amended by adding thereto the following sections: |
| 27-1-46. Information security program. |
| (a) Commensurate with the size and complexity of an insurer, the nature and scope of an |
| insurer's activities, including its use of third-party service providers, and the sensitivity of the |
| nonpublic information used by the insurer or in the insurer’s possession, custody, or control, each |
| domestic insurance company shall develop, implement, and maintain a comprehensive written |
| information security program, based on the insurer's risk assessment and that contains |
| administrative, technical, and physical safeguards for the protection of nonpublic information and |
| the insurer's information system. For purposes of this chapter, “information security program” |
| means the administrative, technical, and physical safeguards that an insurer uses to access, collect, |
| distribute, process, protect, store, use, transmit, dispose of, or otherwise handle, nonpublic |
| information. "Publicly available information" means any information that a licensee has a |
| reasonable basis to believe is lawfully made available to the general public from: federal, state, or |
| local government records; widely distributed media; or disclosures to the general public that are |
| required to be made by federal, state, or local law. “Nonpublic information” means information |
| that is not publicly available information and is: |
| (1) Business-related information of a licensee, the tampering with which, or unauthorized |
| disclosure, access, or use of which, would cause a material adverse impact to the business, |
| operations, or security of the licensee; |
| (2) Any information concerning a consumer which, because of name, number, personal |
| mark, or other identifier, can be used to identify such consumer, in combination with any one or |
| more of the following data elements: |
| (i) Social security number; |
| (ii) Driver’s license number or non-driver identification card number; |
| (iii) Account number, credit, or debit card number; |
| (iv) Any security code, access code, or password that would permit access to a consumer’s |
| financial account; or |
| (v) Biometric records.; |
| (3) Any information or data, except age or gender, in any form or medium created by or |
| derived from a health carehealthcare provider or a consumer and that relates to: |
| (i) The past, present, or future physical, mental, behavioral health, or medical condition of |
| any consumer or a member of the consumer’s family; |
| (ii) The provision of health care to any consumer; or |
| (iii) Payment for the provision of health care to any consumer. |
| (b) Objectives of information security program. An insurer's information security program |
| shall be designed to: |
| (1) Protect the security and confidentiality of nonpublic information and the security of the |
| information system; |
| (2) Protect against any threats or hazards to the security or integrity of nonpublic |
| information and the information system; |
| (3) Protect against unauthorized access to or use of nonpublic information, and minimize |
| the likelihood of harm to any consumer. For purposes of this section, “consumer” means an |
| individual, including, but not limited to, applicants, policyholders, insureds, beneficiaries, |
| claimants, and certificate holders, who is a resident of this state and whose nonpublic information |
| is in an insurer’s possession, custody, or control; and |
| (4) Define and periodically reevaluate a schedule for retention of nonpublic information |
| and a mechanism for its destruction when no longer needed. |
| (c) Risk assessment. The insurer shall: |
| (1) Designate one or more employees, an affiliate, or an outside vendor designated to act |
| on behalf of the insurer who is responsible for the information security program; |
| (2) Identify reasonably foreseeable internal or external threats that could result in |
| unauthorized access, transmission, disclosure, misuse, alteration, or destruction of nonpublic |
| information, including the security of information systems and nonpublic information that are |
| accessible to, or held by, third-party service providers. “Third-party service providers” means a |
| person, not otherwise defined as a licensee, that contracts with a licensee to maintain, process, store, |
| or otherwise is permitted access to nonpublic information through its provision of services to the |
| licensee. Third-party service providers does not include licensed insurance producers; |
| (3) Assess the likelihood and potential damage of these threats, taking into consideration |
| the sensitivity of the nonpublic information; |
| (4) Assess the sufficiency of policies, procedures, information systems, and other |
| safeguards in place to manage these threats, including consideration of threats in each relevant area |
| of the insurer's operations, including: |
| (i) Employee training and management; |
| (ii) Information systems, including network and software design, as well as information |
| classification, governance, processing, storage, transmission, and disposal; and |
| (iii) Detecting, preventing, and responding to attacks, intrusions, or other systems failures; |
| and |
| (5) Implement information safeguards to manage the threats identified in its ongoing |
| assessment, and no less than annually, assess the effectiveness of the safeguards' key controls, |
| systems, and procedures. |
| (d) Risk management. Based on its risk assessment, the insurer shall: |
| (1) Design its information security program to mitigate the identified risks, commensurate |
| with the size and complexity of the insurer's activities, including its use of third-party service |
| providers, and the sensitivity of the nonpublic information used by the insurer or in the insurer's |
| possession, custody, or control; |
| (2) Determine which security measures listed below are appropriate and implement such |
| security measures: |
| (i) Place access controls on information systems, including controls to authenticate and |
| permit access only to authorized individuals to protect against the unauthorized acquisition of |
| nonpublic information. “Authorized individual” means an individual known to and screened by the |
| insurer, and determined to be necessary and appropriate to have access to the nonpublic information |
| held by the insurer, and the insurer’s information systems; |
| (ii) Identify and manage the data, personnel, devices, systems, and facilities that enable the |
| organization to achieve business purposes in accordance with their relative importance to business |
| objectives and the organization's risk strategy; |
| (iii) Restrict access at physical locations containing nonpublic information only to |
| authorized individuals; |
| (iv) Protect, by encryption or other appropriate means, all nonpublic information while |
| being transmitted over an external network and all nonpublic information stored on a laptop |
| computer or other portable computing or storage device or media; |
| (v) Adopt secure development practices for in-house developed applications utilized by the |
| insurer and procedures for evaluating, assessing, or testing the security of externally developed |
| applications utilized by the insurer.; |
| (vi) Modify the information system in accordance with the insurer's information security |
| program; |
| (vii) Utilize effective controls, which may include multi-factor authentication procedures |
| for any individual accessing nonpublic information; |
| (viii) Regularly test and monitor systems and procedures to detect actual and attempted |
| attacks on, or intrusions into, information systems; |
| (ix) Include audit trails within the information security program designed to detect and |
| respond to cybersecurity events and designed to reconstruct material financial transactions |
| sufficient to support normal operations and obligations of the insurer; |
| (x) Implement measures to protect against destruction, loss, or damage of nonpublic |
| information due to environmental hazards, such as fire and water damage or other catastrophes or |
| technological failures; and |
| (xi) Develop, implement, and maintain procedures for the secure disposal of nonpublic |
| information in any format; |
| (3) Include cybersecurity risks in the insurer's enterprise risk management process; |
| (4) Stay informed regarding emerging threats or vulnerabilities and utilize reasonable |
| security measures when sharing information relative to the character of the sharing and the type of |
| information shared; and |
| (5) Provide its personnel with cybersecurity awareness training that is updated as necessary |
| to reflect risks identified by the insurer in the risk assessment. |
| (e) Oversight by board of directors. If the insurer has a board of directors, the board or an |
| appropriate committee of the board shall, at a minimum: |
| (1) Require the insurer's executive management or its designees to develop, implement, |
| and maintain the insurer's information security program; |
| (2) Require the insurer's executive management or its designees to report in writing at least |
| annually, the following information: |
| (i) The overall status of the information security program and the insurer's compliance with |
| this chapter; and |
| (ii) Material matters related to the information security program, addressing issues such as |
| risk assessment, risk management and control decisions, third-party service provider arrangements, |
| results of testing, cybersecurity events or violations and management's responses thereto, or |
| recommendations for changes in the information security program; and |
| (3) If executive management delegates any of its responsibilities pursuant to this section, |
| it shall oversee the development, implementation, and maintenance of the insurer's information |
| security program prepared by the designee(s) and shall receive a report from the designee(s) |
| complying with the requirements of the report to the board of directors. |
| (f) Oversight of third-party service provider arrangements. |
| (1) An insurer shall exercise due diligence in selecting its third-party service provider; and |
| (2) An insurer shall take reasonable steps to request a third-party service provider to |
| implement appropriate administrative, technical, and physical measures to protect and secure the |
| information systems and nonpublic information that are accessible to, or held by, the third-party |
| service provider. |
| (g) Program adjustments. The insurer shall monitor, evaluate, and adjust, as appropriate, |
| the information security program consistent with any relevant changes in technology, the sensitivity |
| of its nonpublic information, internal or external threats to information, and the insurer's own |
| changing business arrangements, such as mergers and acquisitions, alliances and joint ventures, |
| outsourcing arrangements, and changes to information systems. |
| (h) Incident response plan: |
| (1) As part of its information security program, each insurer shall establish a written |
| incident response plan designed to promptly respond to, and recover from, any cybersecurity event |
| that compromises the confidentiality, integrity, or availability of nonpublic information in its |
| possession, the insurer's information systems, or the continuing functionality of any aspect of the |
| insurer's business or operations;. |
| (2) Such incident response plan shall address the following areas: |
| (i) The internal process for responding to a cybersecurity event; |
| (ii) The goals of the incident response plan; |
| (iii) The definition of clear roles, responsibilities, and levels of decision-making authority; |
| (iv) External and internal communications and information sharing; |
| (v) Identification of requirements for the remediation of any identified weaknesses in |
| information systems and associated controls; |
| (vi) Documentation and reporting regarding cybersecurity events and related incident |
| response activities; and |
| (vii) The evaluation and revision as necessary of the incident response plan following a |
| cybersecurity event. |
| (3) If the insurer learns that a cybersecurity event has or may have occurred, the insurer, or |
| an outside vendor and/or service provider designated to act on behalf of the insurer, shall conduct |
| a prompt investigation. For purposes of this section, “cybersecurity event” means an event resulting |
| in unauthorized access to, disruption or misuse of, an information system or nonpublic information |
| stored on such information system. This does not include the unauthorized acquisition of encrypted |
| nonpublic information if the encryption, process, or key is not also acquired, released, or used |
| without authorization. This also does not include an event with regard to which the insurer has |
| determined that the nonpublic information accessed by an unauthorized person has not been used |
| or released and has been returned or destroyed. |
| (i) During the investigation, the insurer, or an outside vendor and/or service provider |
| designated to act on behalf of the insurer, shall, at a minimum, determine as much of the following |
| information as possible: |
| (A) Whether a cybersecurity event has occurred; |
| (B) Assess the nature and scope of the cybersecurity event; |
| (C) Identify any nonpublic information that may have been involved in the cybersecurity |
| event; and |
| (D) Perform or oversee reasonable measures to restore the security of the information |
| systems compromised in the cybersecurity event in order to prevent further unauthorized |
| acquisition, release, or use of nonpublic information in the insurer's possession, custody, or control. |
| (ii) If the insurer learns that a cybersecurity event has or may have occurred in a system |
| maintained by a third-party service provider, and it has or may have impacted the insurer's |
| nonpublic information, the insurer shall make reasonable efforts to complete the steps set forth in |
| subsection (a) of this section or make reasonable efforts to confirm and document that the third- |
| party service provider has completed those steps. |
| (iii) The insurer shall maintain records concerning all cybersecurity events for a period of |
| at least five (5) years from the date of the cybersecurity event. The insurer shall produce those |
| records upon demand of the commissioner pursuant to chapter 13.1 of this title27 or other statutory |
| authority. |
| (i) Annually, each insurer domiciled in this state shall submit to the commissioner a written |
| statement by April 15 certifying that the insurer is in compliance with the requirements set forth in |
| this section. Each insurer shall maintain for examination by the department all records, schedules, |
| and data supporting this certificate for a period of five (5) years. To the extent an insurer has |
| identified areas, systems, or processes that require material improvement, updating or redesign, the |
| insurer shall document the identification and the remedial efforts planned and underway to address |
| such areas, systems, or processes. This documentation must be available for inspection by the |
| commissioner pursuant to a request under chapter 13.1 of this title27 or other statutory authority. |
| (j) If an insurer domiciled in this state has an information security program that is prepared |
| for and in compliance with Pub. L. No. 104-191, 110 Stat. 1936, enacted August 21, 1996 (Health |
| Insurance Portability and Accountability Act) and related privacy, security, and breach notification |
| regulations pursuant to Code of Federal Regulations, Parts 160 and 164, and Pub. L. No. 111-5, |
| 123 Stat. 226, enacted February 17, 2009 (Health Information Technology), insurers can rely on |
| that plan to certify their compliance with subsection (i) of this section. |
| 27-1-47. Notification of a cybersecurity event. |
| (a) Each domestic insurer shall notify the commissioner as promptly as possible but in no |
| event later than three (3) business days from a determination that a cybersecurity event has occurred |
| when either of the following criteria has been met: |
| (1) A cybersecurity event impacting the insurer of which notice is required to be provided |
| to any government body, self-regulatory agency, or any other supervisory body pursuant to any |
| state or federal law; or |
| (2) A cybersecurity event that has a reasonable likelihood of materially harming: |
| (i) Any consumer residing in this state; or |
| (ii) Any material part of the normal operation(s) of the insurer. |
| (b) The insurer shall provide any information required by this section in electronic form as |
| directed by the commissioner. The insurer shall have a continuing obligation to update and |
| supplement initial and subsequent notifications to the commissioner concerning the cybersecurity |
| event. The insurer shall provide as much of the following information as possible. The insurer |
| should indicate whether it is making claims under chapter 2 of title 38 to any of the information |
| provided. The following information shall be provided: |
| (1) Date of the cybersecurity event; |
| (2) Description of how the information was exposed, lost, stolen, or breached, including |
| the specific roles and responsibilities of third-party service providers, if any; |
| (3) How the cybersecurity event was discovered; |
| (4) Whether any lost, stolen, or breached information has been recovered and if so, how |
| this recovery was achieved; |
| (5) The identity of the source of the cybersecurity event; |
| (6) Whether the insurer has filed a police report or has notified any regulatory, government, |
| or law enforcement agencies and, if so, when such notification was provided; |
| (7) Description of the specific types of information acquired without authorization. |
| Specific types of information consisting of particular data elements including, for example, types |
| of medical information, types of financial information, or types of information allowing |
| identification of the consumer; |
| (8) The period during which the information system was compromised by the cybersecurity |
| event; |
| (9) The number of total consumers in this state affected by the cybersecurity event. The |
| insurer shall provide the best estimate in the initial report to the commissioner and update this |
| estimate with each subsequent report to the commissioner pursuant to this section; |
| (10) The results of any internal review identifying a lapse in either automated controls or |
| internal procedures, or confirming that all automated controls or internal procedures were followed; |
| (11) Description of efforts being undertaken to remediate the situation whichthat permitted |
| the cybersecurity event to occur; |
| (12) A copy of the insurer privacy policy and a statement outlining the steps the insurer |
| will take to investigate and notify consumers affected by the cybersecurity event; and |
| (13) Name of a contact person who is both familiar with the cybersecurity event and |
| authorized to act for the insurer. |
| (c) An insurer shall comply with chapter 49.3 of title 11, as applicable, and provide a copy |
| of the notice sent to consumers under that chapter to the commissioner, when an insurer is required |
| to notify the commissioner. |
| (d) Notice regarding cybersecurity events of third-party service providers: |
| (1) In the case of a cybersecurity event involving an insurer's nonpublic information in a |
| system maintained by a third-party service provider, of which the insurer has become aware, the |
| insurer shall treat that event as it would under subsection (a) of this section; |
| (2) The computation of the insurer's deadlines shall begin on the day after the third-party |
| service provider notifies the insurer of the cybersecurity event or the insurer otherwise has actual |
| knowledge of the cybersecurity event, whichever is sooner; |
| (3) Nothing in this chapter shall prevent or abrogate an agreement between an insurer and |
| another insurer, a third-party service provider, or any other party to fulfill any of the investigation |
| requirements or notice requirements imposed under this section. |
| (e) Notice regarding cybersecurity events of reinsurers to insurers: |
| (1)(i) In the case of a cybersecurity event involving nonpublic information that is used by |
| the insurer that is acting as an assuming insurer or in the possession, custody, or control of an |
| insurer that is acting as an assuming insurer and that does not have a direct contractual relationship |
| with the affected consumers, the assuming insurer shall notify its affected ceding insurers and the |
| commissioner of its state of domicile within seventy-two (72) hours of making the determination |
| that a cybersecurity event has occurred; |
| (ii) The ceding insurers that have a direct contractual relationship with affected consumers |
| shall fulfill the consumer notification requirements imposed under chapter 49.3 of title 11, |
| ("identity theft protection act of 2015"), and any other notification requirements relating to a |
| cybersecurity event imposed under this section. |
| (2)(i) In the case of a cybersecurity event involving nonpublic information that is in the |
| possession, custody, or control of a third-party service provider of an insurer that is an assuming |
| insurer, the assuming insurer shall notify its affected ceding insurers and the commissioner of its |
| state of domicile within seventy-two (72) hours of receiving notice from its third-party service |
| provider that a cybersecurity event has occurred; |
| (ii) The ceding insurers that have a direct contractual relationship with affected consumers |
| shall fulfill the consumer notification requirements imposed under chapter 49.3 of title 11 and any |
| other notification requirements relating to a cybersecurity event imposed under this section. |
| (f) Notice regarding cybersecurity events of insurers to producers of record. |
| (1) In the case of a cybersecurity event involving nonpublic information that is in the |
| possession, custody, or control of an insurer that is an insurer or its third-party service provider and |
| for which a consumer accessed the insurer's services through an independent insurance producer, |
| the insurer shall notify the producers of record of all affected consumers as soon as practicable as |
| directed by the commissioner. |
| (2) The insurer is excused from this obligation for those instances in which it does not have |
| the current producer of record information for any individual consumer. |
| SECTION 3. Chapter 27-2 of the General Laws entitled "Foreign Insurance Companies" |
| is hereby amended by adding thereto the following sections: |
| 27-2-29. Information security program. |
| (a) Commensurate with the size and complexity of an insurer, the nature and scope of an |
| insurersinsurer’s activities, including its use of third-party service providers, and the sensitivity of |
| the nonpublic information used by the insurer or in the insurer’s possession, custody, or control, |
| each foreign insurance company shall develop, implement, and maintain a comprehensive written |
| information security program, based on the insurer's risk assessment and that contains |
| administrative, technical, and physical safeguards for the protection of nonpublic information and |
| the insurer's information system. For purposes of this section, “information security program” |
| means the administrative, technical, and physical safeguards that an insurer uses to access, collect, |
| distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic |
| information. "Publicly available information" means any information that a licensee has a |
| reasonable basis to believe is lawfully made available to the general public from: federal, state, or |
| local government records; widely distributed media; or disclosures to the general public that are |
| required to be made by federal, state, or local law. “Nonpublic information” means information |
| that is not publicly available information and is: |
| (1) Business-related information of a licensee, the tampering with which, or unauthorized |
| disclosure, access, or use of which, would cause a material adverse impact to the business, |
| operations, or security of the licensee; |
| (2) Any information concerning a consumer which, because of name, number, personal |
| mark, or other identifier can be used to identify such consumer, in combination with any one or |
| more of the following data elements: |
| (i) Social security number; |
| (ii) Driver's license number or non-driver identification card number; |
| (iii) Account number, credit or debit card number; |
| (iv) Any security code, access code, or password that would permit access to a consumer's |
| financial account; or |
| (v) Biometric records; |
| (3) Any information or data, except age or gender, in any form or medium created by or |
| derived from a health carehealthcare provider or a consumer and that relates to: |
| (i) The past, present, or future physical, mental, behavioral health, or medical condition of |
| any consumer or a member of the consumer's family; |
| (ii) The provision of health care to any consumer; or |
| (iii) Payment for the provision of health care to any consumer,. |
| (b) Objectives of information security program. An insurer's information security program |
| shall be designed to: |
| (1) Protect the security and confidentiality of nonpublic information and the security of the |
| information system.; |
| (2) Protect against any threats or hazards to the security or integrity of nonpublic |
| information and the information system; |
| (3) Protect against unauthorized access to or use of nonpublic information, and minimize |
| the likelihood of harm to any consumer. For the purposes of this section, “consumer” means an |
| individual, including, but not limited to, applicants, policyholders, insureds, beneficiaries, |
| claimants, and certificate holders, who is a resident of this state and whose nonpublic information |
| is in an insurer’s possession, custody, or control.; and |
| (4) Define and periodically reevaluate a schedule for retention of nonpublic information |
| and a mechanism for its destruction when no longer needed. |
| (c) Risk assessment. The insurer shall: |
| (1) Designate one or more employees, an affiliate, or an outside vendor designated to act |
| on behalf of the insurer who is responsible for the information security program; |
| (2) Identify reasonably foreseeable internal or external threats that could result in |
| unauthorized access, transmission, disclosure, misuse, alteration, or destruction of nonpublic |
| information, including the security of information systems and nonpublic information that are |
| accessible to, or held by, third-party service providers. For purposes of this section, “third-party |
| service providers” means a person, not otherwise defined as a licensee, that contracts with a licensee |
| to maintain, process, store or otherwise is permitted access to nonpublic information through its |
| provision of services to the licensee; |
| (3) Assess the likelihood and potential damage of these threats, taking into consideration |
| the sensitivity of the nonpublic information; |
| (4) Assess the sufficiency of policies, procedures, information systems, and other |
| safeguards in place to manage these threats, including consideration of threats in each relevant area |
| of the insurer's operations, including: |
| (i) Employee training and management; |
| (ii) Information systems, including network and software design, as well as information |
| classification, governance, processing, storage, transmission, and disposal; and |
| (iii) Detecting, preventing, and responding to attacks, intrusions, or other systems failures; |
| and |
| (5) Implement information safeguards to manage the threats identified in its ongoing |
| assessment, and no less than annually, assess the effectiveness of the safeguards' key controls, |
| systems, and procedures. |
| (d) Risk management. Based on its risk assessment, the insurer shall: |
| (1) Design its information security program to mitigate the identified risks, commensurate |
| with the size and complexity of the insurer's activities, including its use of third-party service |
| providers, and the sensitivity of the nonpublic information used by the insurer or in the insurer's |
| possession, custody, or control; |
| (2) Determine which security measures listed below are appropriate and implement such |
| security measures: |
| (i) Place access controls on information systems, including controls to authenticate and |
| permit access only to authorized individuals to protect against the unauthorized acquisition of |
| nonpublic information. “Authorized individual” means an individual known to and screened by |
| the insurer and determined to be necessary and appropriate to have access to the nonpublic |
| information held by the insurer and its information systems; |
| (ii) Identify and manage the data, personnel, devices, systems, and facilities that enable the |
| organization to achieve business purposes in accordance with their relative importance to business |
| objectives and the organization's risk strategy; |
| (iii) Restrict access at physical locations containing nonpublic information only to |
| authorized individuals; |
| (iv) Protect, by encryption or other appropriate means, all nonpublic information while |
| being transmitted over an external network and all nonpublic information stored on a laptop |
| computer or other portable computing or storage device or media; |
| (v) Adopt secure development practices for in-house developed applications utilized by the |
| insurer and procedures for evaluating, assessing, or testing the security of externally developed |
| applications utilized by the insurer; |
| (vi) Modify the information system in accordance with the insurer's information security |
| program; |
| (vii) Utilize effective controls, which may include multi-factor authentication procedures |
| for any individual accessing nonpublic information; |
| (viii) Regularly test and monitor systems and procedures to detect actual and attempted |
| attacks on, or intrusions into, information systems; |
| (ix) Include audit trails within the information security program designed to detect and |
| respond to cybersecurity events and designed to reconstruct material financial transactions |
| sufficient to support normal operations and obligations of the insurer; |
| (x) Implement measures to protect against destruction, loss, or damage of nonpublic |
| information due to environmental hazards, such as fire and water damage or other catastrophes or |
| technological failures; and |
| (xi) Develop, implement, and maintain procedures for the secure disposal of nonpublic |
| information in any format; |
| (3) Include cybersecurity risks in the insurer's enterprise risk management process; |
| (4) Stay informed regarding emerging threats or vulnerabilities and utilize reasonable |
| security measures when sharing information relative to the character of the sharing and the type of |
| information shared; and |
| (5) Provide its personnel with cybersecurity awareness training that is updated as necessary |
| to reflect risks identified by the insurer in the risk assessment. |
| (e) Oversight by board of directors. If the insurer has a board of directors, the board or an |
| appropriate committee of the board shall, at a minimum: |
| (1) Require the insurer's executive management or its designees to develop, implement, |
| and maintain the insurer's information security program; |
| (2) Require the insurer's executive management or its designees to report in writing at least |
| annually, the following information: |
| (i) The overall status of the information security program and the insurer's compliance with |
| this chapter; and |
| (ii) Material matters related to the information security program, addressing issues such as |
| risk assessment, risk management and control decisions, third-party service provider arrangements, |
| results of testing, cybersecurity events or violations and management's responses thereto, or |
| recommendations for changes in the information security program; and |
| (3) If executive management delegates any of its responsibilities pursuant to this section, |
| it shall oversee the development, implementation, and maintenance of the insurer's information |
| security program prepared by the designee(s) and shall receive a report from the designee(s) |
| complying with the requirements of the report to the board of directors. |
| (f) Oversight of third-party service provider arrangements. |
| (1) An insurer shall exercise due diligence in selecting its third-party service provider; and |
| (2) An insurer shall take reasonable steps to request a third-party service provider to |
| implement appropriate administrative, technical, and physical measures to protect and secure the |
| information systems and nonpublic information that are accessible to, or held by, the third-party |
| service provider. |
| (g) Program adjustments. The insurer shall monitor, evaluate, and adjust, as appropriate, |
| the information security program consistent with any relevant changes in technology, the sensitivity |
| of its nonpublic information, internal or external threats to information, and the insurer's own |
| changing business arrangements, such as mergers and acquisitions, alliances and joint ventures, |
| outsourcing arrangements, and changes to information systems. |
| (h) Incident response plan: |
| (1) As part of its information security program, each insurer shall establish a written |
| incident response plan designed to promptly respond to, and recover from, any cybersecurity event |
| that compromises the confidentiality, integrity, or availability of nonpublic information in its |
| possession, the insurer's information systems, or the continuing functionality of any aspect of the |
| insurer's business or operations;. |
| (2) Such incident response plan shall address the following areas: |
| (i) The internal process for responding to a cybersecurity event; |
| (ii) The goals of the incident response plan; |
| (iii) The definition of clear roles, responsibilities, and levels of decision-making authority; |
| (iv) External and internal communications and information sharing; |
| (v) Identification of requirements for the remediation of any identified weaknesses in |
| information systems and associated controls; |
| (vi) Documentation and reporting regarding cybersecurity events and related incident |
| response activities; and |
| (vii) The evaluation and revision as necessary of the incident response plan following a |
| cybersecurity event. |
| (3) If the insurer learns that a cybersecurity event has or may have occurred, the insurer, or |
| an outside vendor and/or service provider designated to act on behalf of the insurer, shall conduct |
| a prompt investigation. For the purposes of this section, “cybersecurity event” means an event |
| resulting in unauthorized access to, disruption, or misuse of, an information system or nonpublic |
| information stored on such information system. This does not include the unauthorized acquisition |
| of encrypted nonpublic information if the encryption, process, or key is not also acquired, released, |
| or used without authorization. This also does not include an event with regard to which the insurer |
| has determined that the nonpublic information accessed by an unauthorized person has not been |
| used or released and has been returned or destroyed. |
| (i) During the investigation, the insurer, or an outside vendor and/or service provider |
| designated to act on behalf of the insurer, shall, at a minimum, determine as much of the following |
| information as possible: |
| (A) Whether a cybersecurity event has occurred; |
| (B) Assess the nature and scope of the cybersecurity event; |
| (C) Identify any nonpublic information that may have been involved in the cybersecurity |
| event; and |
| (D) Perform or oversee reasonable measures to restore the security of the information |
| systems compromised in the cybersecurity event in order to prevent further unauthorized |
| acquisition, release, or use of nonpublic information in the insurer's possession, custody, or control. |
| (ii) If the insurer learns that a cybersecurity event has or may have occurred in a system |
| maintained by a third-party service provider, and it has or may have impacted the insurer's |
| nonpublic information, the insurer shall make reasonable efforts to complete the steps set forth in |
| subsection (h)(3)(i) of this section or make reasonable efforts to confirm and document that the |
| third-party service provider has completed those steps. |
| (iii) The insurer shall maintain records concerning all cybersecurity events for a period of |
| at least five (5) years from the date of the cybersecurity event. The insurer andshall produce those |
| records upon demand of the commissioner pursuant to chapter 13.1 of this title27 or other statutory |
| authority. |
| 27-2-30. Notification of a cybersecurity event. |
| (a) Each insurer shall notify the commissioner as promptly as possible but in no event later |
| than three (3) business days from a determination that a cybersecurity event has occurred when the |
| insurer reasonably believes that the nonpublic information involved affects two hundred fifty (250) |
| or more consumers residing in this state and that either of the following apply: |
| (1) A cybersecurity event impacting the insurer of which notice is required to be provided |
| to any government body, self-regulatory agency, or any other supervisory body pursuant to any |
| state or federal law; or |
| (2) A cybersecurity event that has a reasonable likelihood of materially harming: |
| (i) Any consumer residing in this state; or |
| (ii) Any material part of the normal operation(s) of the insurer. |
| (b) The insurer shall provide any information required by this section in electronic form as |
| directed by the commissioner. The insurer shall have a continuing obligation to update and |
| supplement initial and subsequent notifications to the commissioner concerning the cybersecurity |
| event. The insurer should indicate whether it is making claims under chapter 2 of title 38 to any of |
| the information provided. The following information shall be provided: |
| (1) Date of the cybersecurity event; |
| (2) Description of how the information was exposed, lost, stolen, or breached, including |
| the specific roles and responsibilities of third-party service providers, if any; |
| (3) How the cybersecurity event was discovered; |
| (4) Whether any lost, stolen, or breached information has been recovered and if so, how |
| this recovery was achieved; |
| (5) The identity of the source of the cybersecurity event; |
| (6) Whether the insurer has filed a police report or has notified any regulatory, government, |
| or law enforcement agencies and, if so, when such notification was provided; |
| (7) Description of the specific types of information acquired without authorization. |
| Specific types of information consisting of particular data elements including, for example, types |
| of medical information, types of financial information, or types of information allowing |
| identification of the consumer; |
| (8) The period during which the information system was compromised by the cybersecurity |
| event; |
| (9) The number of total consumers in this state affected by the cybersecurity event. The |
| insurer shall provide the best estimate in the initial report to the commissioner and update this |
| estimate with each subsequent report to the commissioner pursuant to this section; |
| (10) The results of any internal review identifying a lapse in either automated controls or |
| internal procedures, or confirming that all automated controls or internal procedures were followed; |
| (11) Description of efforts being undertaken to remediate the situation whichthat permitted |
| the cybersecurity event to occur; |
| (12) A copy of the insurer privacy policy and a statement outlining the steps the insurer |
| will take to investigate and notify consumers affected by the cybersecurity event; and |
| (13) Name of a contact person who is both familiar with the cybersecurity event and |
| authorized to act for the insurer. |
| (c) An insurer shall comply with chapter 49.3 of title 11, as applicable, and provide a copy |
| of the notice sent to consumers under that chapter to the commissioner, when an insurer is required |
| to notify the commissioner. |
| (d) Notice regarding cybersecurity events of third-party service providers: |
| (1) In the case of a cybersecurity event involving an insurer's nonpublic information in a |
| system maintained by a third-party service provider, of which the insurer has become aware, the |
| insurer shall treat that event as it would under subsection (a) of this section; |
| (2) The computation of the insurer's deadlines shall begin on the day after the third-party |
| service provider notifies the insurer of the cybersecurity event or the insurer otherwise has actual |
| knowledge of the cybersecurity event, whichever is sooner; |
| (3) Nothing in this chapter shall prevent or abrogate an agreement between an insurer and |
| another insurer, a third-party service provider, or any other party to fulfill any of the investigation |
| requirements imposed under § 27-1.3-5 or notice requirements imposed under this section. |
| (e) Notice regarding cybersecurity events of reinsurers to insurers: |
| (1)(i) In the case of a cybersecurity event involving nonpublic information that is used by |
| the insurer that is acting as an assuming insurer or in the possession, custody, or control of an |
| insurer that is acting as an assuming insurer and that does not have a direct contractual relationship |
| with the affected consumers, the assuming insurer shall notify its affected ceding insurers and the |
| commissioner of its state of domicile within seventy-two (72) hours of making the determination |
| that a cybersecurity event has occurred; |
| (ii) The ceding insurers that have a direct contractual relationship with affected consumers |
| shall fulfill the consumer notification requirements imposed under chapter 49.3 of title 11, |
| ("identity theft protection act of 2015"), and any other notification requirements relating to a |
| cybersecurity event imposed under this section;. |
| (2)(i) In the case of a cybersecurity event involving nonpublic information that is in the |
| possession, custody, or control of a third-party service provider of an insurer that is an assuming |
| insurer, the assuming insurer shall notify its affected ceding insurers and the commissioner of its |
| state of domicile within seventy-two (72) hours of receiving notice from its third-party service |
| provider that a cybersecurity event has occurred; |
| (ii) The ceding insurers that have a direct contractual relationship with affected consumers |
| shall fulfill the consumer notification requirements imposed under chapter 49.3 of title 11 and any |
| other notification requirements relating to a cybersecurity event imposed under this section. |
| (f) Notice regarding cybersecurity events of insurers to producers of record. |
| (1) In the case of a cybersecurity event involving nonpublic information that is in the |
| possession, custody, or control of an insurer or its third-party service provider and for which a |
| consumer accessed the insurer's services through an independent insurance producer, the insurer |
| shall notify the producers of record of all affected consumers as soon as practicable as directed by |
| the commissioner. |
| (2) The insurer is excused from this obligation for those instances in which it does not have |
| the current producer of record information for any individual consumer. |
| SECTION 4. This act shall take effect on January 1, 2025. |
| ======== |
| LC004385/SUB A |
| ======== |