This is the preview version of the Wisconsin State Legislature site.
Please see http://docs.legis.wisconsin.gov for the production version.
SB784,7,5 3(4) Private cause of action. This subchapter may not be construed to create
4or imply a private cause of action for violation of its provisions or to curtail a private
5cause of action that otherwise exists in the absence of this subchapter.
SB784,7,7 6(5) Rules. The commissioner may promulgate rules that are necessary to carry
7out the provisions of this subchapter.
SB784,5 8Section 5. 601.952 of the statutes is created to read:
SB784,7,16 9601.952 Information security program. (1) Implementation of program.
10No later than one year after the effective date of this subsection .... [LRB inserts
11date], a licensee shall develop, implement, and maintain a comprehensive written
12information security program based on the licensee's risk assessment under sub. (2)
13and consistent with the conditions of sub. (3) (a). The program shall contain
14administrative, technical, and physical safeguards for the protection of the licensee's
15information systems and nonpublic information. The licensee shall design the
16program to do all of the following:
SB784,7,1817 (a) Protect against threats and hazards to the security and integrity of the
18information systems and nonpublic information.
SB784,7,2119 (b) Protect against unauthorized access to and use of nonpublic information
20and minimize the likelihood of harm to a consumer from the unauthorized access or
21use.
SB784,7,2422 (c) Establish and periodically reevaluate a schedule for retention and disposal
23of nonpublic information and establish a mechanism for the destruction of nonpublic
24information that is no longer needed.
SB784,8,2
1(2) Risk assessment. The licensee shall conduct a risk assessment under which
2the licensee shall do all of the following:
SB784,8,63 (a) Identify reasonably foreseeable internal and external threats that could
4result in unauthorized access to or transmission, disclosure, misuse, alteration, or
5destruction of nonpublic information, including nonpublic information that is
6accessible to or held by 3rd-party service providers of the licensee.
SB784,8,87 (b) Assess the likelihood and potential damage of the threats identified under
8par. (a), taking into consideration the sensitivity of the nonpublic information.
SB784,8,119 (c) Assess the sufficiency of policies, procedures, information systems, and
10other safeguards to manage the threats identified under par. (a) in each relevant
11area of the licensee's operations, including all of the following:
SB784,8,1212 1. Employee training and management.
SB784,8,1413 2. Information systems, including the classification, governance, processing,
14storage, transmission, and disposal of information.
SB784,8,1615 3. Processes for detecting, preventing, and responding to attacks, intrusions,
16and other system failures.
SB784,8,18 17(3) Risk management. Based on the risk assessment under sub. (2), the licensee
18shall do all of the following:
SB784,8,2219 (a) Design an information security program to mitigate the identified threats,
20commensurate with the size and complexity of the licensee, the nature and scope of
21the licensee's activities, including its use of 3rd-party service providers, and the
22sensitivity of the nonpublic information.
SB784,8,2323 (b) Implement the following security measures, as appropriate:
SB784,8,2424 1. Place access controls on information systems.
SB784,9,4
12. Identify and manage the data, personnel, devices, systems, and facilities
2that enable the licensee to achieve its business purposes, taking into consideration
3the relative importance of the data, personnel, devices, systems, and facilities to the
4business objectives and risk strategy of the licensee.
SB784,9,65 3. Restrict physical access to nonpublic information to authorized individuals
6only.
SB784,9,97 4. Protect, by encryption or other means, nonpublic information being
8transmitted over an external network and nonpublic information stored on a
9portable computer or storage device or media.
SB784,9,1110 5. Adopt secure development practices for applications that are developed
11in-house and utilized by the licensee.
SB784,9,1312 6. Modify information systems in accordance with the licensee's information
13security program.
SB784,9,1514 7. Utilize effective controls, which may include multifactor authentication
15procedures for employees accessing nonpublic information.
SB784,9,1716 8. Implement regular testing and monitoring of systems and procedures to
17detect actual and attempted attacks on, or intrusions into, an information system.
SB784,9,2118 9. Include audit trails within the information security program that are
19designed to detect and respond to cybersecurity events and to reconstruct material
20financial transactions sufficient to support the normal operations and obligations of
21the licensee.
SB784,9,2422 10. Implement measures to protect against the destruction, loss, or damage of
23nonpublic information due to environmental hazards, natural and other disasters,
24and technological failures.
SB784,10,2
111. Develop, implement, and maintain practices for the secure disposal of
2nonpublic information in all formats.
SB784,10,43 (c) Designate at least one employee, affiliate, or outside vendor as responsible
4for the information security program.
SB784,10,65 (d) Stay informed regarding emerging threats and vulnerabilities and
6implement safeguards to manage the threats and vulnerabilities.
SB784,10,87 (e) No less than annually, assess the effectiveness of security safeguards,
8including key controls, systems, and procedures.
SB784,10,109 (f) Include cybersecurity risks in the licensee's enterprise risk management
10process.
SB784,10,1211 (g) Utilize reasonable security measures when sharing information, taking
12into consideration the character of the sharing and the type of information shared.
SB784,10,1413 (h) Provide personnel with cybersecurity awareness training that is updated
14as necessary.
SB784,10,24 15(4) Program adjustments. The licensee shall monitor, evaluate, and adjust the
16information security program under sub. (1) consistent with changes in technology,
17the sensitivity of the nonpublic information, internal and external threats to
18nonpublic information, and changes to the licensee's business operations,
19outsourcing arrangements, and information systems. If a licensee identifies areas,
20systems, or processes that require material improvement, updating, or redesign, the
21insurer shall document the identification and remedial efforts to address the areas,
22systems, or processes. The licensee shall maintain the documentation for a period
23of at least 5 years starting from the date the documentation was created and shall
24produce the documentation upon demand of the commissioner.
SB784,11,6
1(5) Incident response plan. As part of its information security program, a
2licensee shall develop an incident response plan to promptly respond to, and recover
3from, a cybersecurity event that compromises the confidentiality, integrity, or
4availability of nonpublic information, the licensee's information systems, or the
5continuing functionality of any aspect of the licensee's business or operations. The
6incident response plan shall be in writing and address all of the following:
SB784,11,77 (a) The goals of the incident response plan.
SB784,11,88 (b) The internal process for responding to a cybersecurity event.
SB784,11,109 (c) The identification of clear roles, responsibilities, and levels of
10decision-making authority during and immediately following a cybersecurity event.
SB784,11,1211 (d) The external and internal communications and information sharing during
12and immediately following a cybersecurity event.
SB784,11,1413 (e) Requirements for the remediation of identified weaknesses in the
14information systems and associated controls.
SB784,11,1615 (f) The reporting and documentation of a cybersecurity event and related
16incident response activities.
SB784,11,1817 (g) The evaluation and revision of the incident response plan following a
18cybersecurity event.
SB784,11,23 19(6) Oversight of 3rd-party service provider arrangements. No later than 2
20years after the effective date of this subsection .... [LRB inserts date], a licensee shall
21exercise due diligence in selecting a 3rd-party service provider. The licensee shall
22make reasonable efforts to require a 3rd-party service provider to do all of the
23following:
SB784,12,3
1(a) Implement appropriate administrative, technical, and physical measures
2to protect and secure the information systems and nonpublic information that are
3accessible to or held by the 3rd-party service provider.
SB784,12,44 (b) Report a cybersecurity event under s. 601.954.
SB784,12,7 5(7) Oversight by board of directors. If a licensee has a board of directors, the
6board or an appropriate committee of the board shall, at a minimum, do all of the
7following:
SB784,12,98 (a) Require the licensee's executive management to develop, implement, and
9maintain the information security program under sub. (1).
SB784,12,1110 (b) Oversee the development, implementation, and maintenance of the
11information security program.
SB784,12,1312 (c) Require the licensee's executive management to report, at least annually,
13all of the following information to the board:
SB784,12,1514 1. The overall status of the information security program and the licensee's
15compliance with this subchapter.
SB784,12,1816 2. Material matters relating to the information security program, including
17issues relating to risk assessment, risk management and control decisions,
183rd-party service provider arrangements, and security testing.
SB784,12,1919 3. Recommendations for modifications to the information security program.
SB784,13,2 20(8) Annual certification to commissioner. Beginning in the year that is 2
21years after the effective date of this subsection .... [LRB inserts date], a licensee who
22is domiciled in this state shall annually submit, no later than March 1, to the
23commissioner a written certification that the licensee is in compliance with the
24requirements of this section. The licensee shall maintain all records, schedules, and

1data supporting the certification for a period of at least 5 years and shall produce the
2records, schedules, and data upon demand of the commissioner.
SB784,13,4 3(9) Exemptions. (a) This section does not apply to a licensee who meets any
4of the following criteria:
SB784,13,55 1. Has less than $10,000,000 in year-end total assets.
SB784,13,66 2. Has less than $5,000,000 in gross annual revenue.
SB784,13,87 3. Has fewer than 25 employees, including independent contractors, who work
8at least 30 hours a week for the licensee.
SB784,13,119 (b) The commissioner may issue an order to a licensee who is otherwise exempt
10under par. (a) to comply with this section if the commissioner determines that the
11order is warranted by the licensee's unique circumstances.
SB784,13,1412 (c) A licensee who ceases to qualify for the exemption under par. (a) or who
13receives an order under par. (b) shall comply with this section no later than 180 days
14after the date the licensee ceases to qualify or receives the order.
SB784,6 15Section 6. 601.953 of the statutes is created to read:
SB784,13,20 16601.953 Investigation of cybersecurity event. (1) If a licensee learns that
17a cybersecurity event involving the licensee's information systems or nonpublic
18information has or may have occurred, the licensee, or an outside vendor or service
19provider designated to act on behalf of the licensee, shall conduct a prompt
20investigation that, at a minimum, includes all of the following:
SB784,13,2121 (a) An assessment of the nature and scope of the cybersecurity event.
SB784,13,2322 (b) The identification of any nonpublic information that was or may have been
23involved in the cybersecurity event.
SB784,14,3
1(c) The performance of reasonable measures to restore the security of the
2licensee's information systems compromised in the cybersecurity event and prevent
3additional unauthorized acquisition, release, or use of nonpublic information.
SB784,14,8 4(2) If a licensee knows that a cybersecurity event has or may have occurred in
5an information system maintained by a 3rd-party service provider, the licensee shall
6comply with sub. (1) or make reasonable efforts to confirm and document that the
73rd-party service provider has either complied with sub. (1) or failed to cooperate
8with the investigation under sub. (1).
SB784,14,11 9(3) The licensee shall maintain records concerning a cybersecurity event for a
10period of at least 5 years starting from the date of the cybersecurity event and shall
11produce the records upon demand of the commissioner.
SB784,7 12Section 7. 601.954 of the statutes is created to read:
SB784,14,16 13601.954 Notification of a cybersecurity event. (1) Notification to the
14commissioner.
(a) A licensee shall notify the commissioner that a cybersecurity
15event involving nonpublic information has occurred if any of the following conditions
16is met:
SB784,14,1917 1. The licensee is domiciled in this state and the cybersecurity event has a
18reasonable likelihood of materially harming a consumer or a material part of the
19normal operations of the licensee.
SB784,14,2220 2. The cybersecurity event is any of the following and the licensee reasonably
21believes that the cybersecurity event involves the nonpublic information of at least
22250 consumers:
SB784,14,2523 a. A cybersecurity event for which notice is required to be provided to a
24government body, self-regulatory agency, or other supervisory entity under state or
25federal law.
SB784,15,2
1b. A cybersecurity event that has a reasonable likelihood of materially harming
2a consumer or a material part of the normal operations of the licensee.
SB784,15,63 (b) A licensee shall provide the notification under par. (a) in electronic form and
4as promptly as possible, but no later than 3 business days from the determination
5that the cybersecurity event occurred. In the notification, the licensee shall provide
6as much of the following information as possible:
SB784,15,87 1. The date and source of the cybersecurity event and the time period during
8which information systems were compromised by the cybersecurity event.
SB784,15,99 2. A description of how the cybersecurity event was discovered.
SB784,15,1210 3. A description of how the nonpublic information was exposed, lost, stolen, or
11breached and an explanation of how the information has been, or is in the process
12of being, recovered.
SB784,15,1513 4. A description of the specific data elements, including types of medical,
14financial, and personally identifiable information, that were acquired without
15authorization.
SB784,15,1616 5. The number of consumers affected by the cybersecurity event.
SB784,15,1817 6. A description of efforts to address the circumstances that allowed the
18cybersecurity event to occur.
SB784,15,2019 7. The results of any internal review related to the cybersecurity event,
20including the identification of a lapse in automated controls or internal procedures.
SB784,15,2321 8. Whether the licensee notified a government body, self-regulatory agency, or
22other supervisory entity of the cybersecurity event and, if applicable, the date the
23notification was provided.
SB784,16,3
19. A copy of the licensee's privacy policy and a statement outlining the steps the
2licensee will take, or has taken, to investigate and notify consumers affected by the
3cybersecurity event.
SB784,16,54 10. The name of a contact person who is familiar with the cybersecurity event
5and authorized to act for the licensee.
SB784,16,86 (c) The licensee shall update and supplement the information provided under
7par. (b) to address material changes to the information as additional information
8becomes available to the licensee.
SB784,16,18 9(2) Notice to consumers and producers of record. A licensee required to
10notify the commissioner under sub. (1) shall comply with s. 134.98, if applicable, and
11provide to the commissioner a copy of any notice sent under s. 134.98 (2). If the
12licensee is an insurer whose services are accessed by consumers through an
13independent insurance producer, the licensee shall notify the producer of record of
14any consumers affected by the cybersecurity event no later than the date at which
15notice is provided under s. 134.98, except that notice is not required to a producer of
16record who is not authorized by law or contract to sell, solicit, or negotiate on behalf
17of the licensee or if the licensee does not have the current producer of record
18information for a consumer.
SB784,16,25 19(3) Third-party service providers. If the licensee has knowledge of a
20cybersecurity event involving an information system maintained by a 3rd-party
21service provider, the licensee shall provide notice to the commissioner no later than
223 days after the earlier of the date the 3rd-party service provider notifies the licensee
23of the cybersecurity event or the licensee has actual knowledge of the cybersecurity
24event. The licensee is not required to comply with this subsection if the 3rd-party
25service provider provides notice under sub. (1).
SB784,17,11
1(4) Reinsurers. In the event of a cybersecurity event involving nonpublic
2information, or involving an information system maintained by a 3rd-party service
3provider, a licensee who is acting as an assuming insurer and who does not have a
4direct contractual relationship with consumers affected by the cybersecurity event
5shall notify the ceding insurer and the commissioner of the licensee's state of domicile
6of the cybersecurity event no later than 3 business days after learning of the
7cybersecurity event. The licensee shall have no other notice obligations relating to
8a cybersecurity event or other data breach under this section or any other law of this
9state. A ceding insurer who has a direct contractual relationship with the affected
10consumers shall comply with the notification requirements under this section and,
11if applicable, the requirements under s. 134.98.
SB784,8 12Section 8. 601.955 of the statutes is created to read:
Loading...
Loading...