The notification must provide specified information about the cybersecurity
event, including details about the event and its discovery, a description of the
accessed nonpublic information, the number of affected Wisconsin residents, and the
licensee's efforts to address the circumstances that allowed the event to occur. The
licensee is required to update the commissioner on material changes to the
information and as additional information becomes available. If the cybersecurity
event involves a third-party service provider, the licensee must notify the
commissioner of the event unless the service provider does so.

Under the bill, the commissioner has the power to examine and investigate the
affairs of a licensee to determine whether a violation of any of the above requirements
has occurred. A licensee must generally keep records relating to the requirements
for at least five years and produce them upon demand of the commissioner. Any
documents, materials, and other information from a licensee that are in the
possession or control of the commissioner are confidential and privileged.
For further information see the state fiscal estimate, which will be printed as
an appendix to this bill.
The people of the state of Wisconsin, represented in senate and assembly, do
enact as follows:
SB784,1 1Section 1. 601.465 (3) (f) of the statutes is created to read:
SB784,3,32 601.465 (3) (f) All information protected under s. 601.955, which is subject only
3to the confidentiality provisions in s. 601.955.
SB784,2 4Section 2 . Subchapter IX (title) of chapter 601 [precedes 601.95] of the
5statutes is created to read:
SB784,3,66 Chapter 601
SB784,3,77 Subchapter IX
SB784,3,88 Insurance data security
SB784,3 9Section 3. 601.95 of the statutes is created to read:
SB784,3,10 10601.95 Definitions. In this subchapter:
SB784,3,13 11(1) “Authorized individual” means an individual who is known to and screened
12by a licensee and whose access to the licensee's information system or nonpublic
13information is determined by the licensee to be necessary and appropriate.
SB784,3,15 14(2) “Consumer” means an individual who is a resident of this state and whose
15nonpublic information is in the possession, custody, or control of a licensee.
SB784,4,2 16(3) “Cybersecurity event” means an event resulting in the unauthorized access
17to, or disruption or misuse of, an information system or the nonpublic information

1stored on an information system, except that a “cybersecurity event” does not include
2any of the following:
SB784,4,53 (a) The unauthorized acquisition of encrypted nonpublic information if the
4encryption process or key is not also acquired, released, or used without
5authorization.
SB784,4,86 (b) The unauthorized acquisition of nonpublic information if the licensee
7determines that the nonpublic information has not been used or released and has
8been returned to the licensee or destroyed.
SB784,4,10 9(4) “Encrypted” means the transformation of data into a form that results in
10a low probability of assigning meaning without the use of a protective process or key.
SB784,4,13 11(5) “Information security program” means the administrative, technical, and
12physical safeguards that a licensee uses to access, collect, distribute, process, protect,
13store, use, transmit, dispose of, or otherwise handle nonpublic information.
SB784,4,18 14(6) “Information system” means a discrete set of electronic information
15resources organized for the collection, processing, maintenance, use, sharing,
16dissemination, or disposition of nonpublic information, as well as any specialized
17system, including an industrial or process controls system, telephone switching and
18private branch exchange system, and environmental control system.
SB784,4,23 19(7) “Licensee” means a person licensed, authorized, or registered, or a person
20required to be licensed, authorized, or registered, under chs. 600 to 655, other than
21a purchasing or risk retention group that is chartered and licensed in another state
22or a person acting as an assuming insurer that is domiciled in another state or
23jurisdiction.
SB784,4,25 24(8) “Multifactor authentication” means authentication through verification of
25at least 2 of the following types of authentication factors:
SB784,5,1
1(a) Knowledge factor, including a password.
SB784,5,22 (b) Possession factor, including a token or text message on a mobile phone.
SB784,5,33 (c) Inherence factor, including a biometric characteristic.
SB784,5,6 4(9) “Nonpublic information” means electronic information in the possession,
5custody, or control of a licensee that is not publicly available information and is any
6of the following:
SB784,5,87 (a) Information concerning a consumer that can be used to identify the
8consumer, in combination with at least one of the following data elements:
SB784,5,99 1. Social security number.