The commissioner shall keep an accounting for each benefit year of all of the following:
Funds appropriated for reinsurance payments and administrative and operational expenses.
Requests for reinsurance payments received from eligible health carriers.
Reinsurance payments made to eligible health carriers.
Administrative and operational expenses incurred for the healthcare stability plan.
By November 1 of the calendar year following the applicable benefit year or by 60 days following the final disbursement of reinsurance payments for the applicable benefit year, whichever is later, the commissioner shall make available to the public a report summarizing the healthcare stability plan's operations for each benefit year by posting the summary on the office's Internet site.
The healthcare stability plan is subject to audit by the legislative audit bureau. The commissioner shall ensure that its contractors, subcontractors, or agents cooperate with any audit of the healthcare stability plan performed by the legislative audit bureau.
History: 2017 a. 138
FIRE DEPARTMENT DUES
Payment of dues. 601.93(1g)(1g)
In this section, “fire insurance" includes insurance against loss of or damage to:
Notes, acceptances or any other valuable papers or documents, resulting from any cause, except while in the mail or in the custody or possession of and being transported by any carrier for hire; and
Personal property of individuals when written under an all-risk type of policy commonly known as the “personal property floater", whenever these risks are written in conjunction with insurance against burglary or theft.
Any insurer doing a fire insurance business in this state shall pay fire department dues equal to 2 percent of the amount of all premiums which, during the preceding calendar year, have been received by, or have been agreed to be paid to, the company for insurance against loss by fire, including insurance on property exempt from taxation.
Every insurer doing a fire insurance business in this state shall, before March 1 in each year, file with the commissioner a statement, showing the amount of premiums upon fire insurance due for the preceding calendar year. Return premiums may be deducted in determining the premium on which the fire department dues are computed. Payments of quarterly installments of the total estimated payment for the then current calendar year under this subsection are due on or before April 15, June 15, September 15 and December 15. On March 1 the insurer shall pay any additional amounts due for the preceding calendar year. Overpayments will be credited on the amount due April 15. The commissioner shall, prior to May 1 each year, report to the department of safety and professional services the amount of dues paid under this subsection and to be paid under s. 101.573 (1)
An insurer that fails to make quarterly payments under s. 601.93 (2)
of at least 25 percent of either the total fire dues paid for the previous calendar year or 80 percent of the actual fire dues for the current calendar year is liable, in addition to the amount due, for interest of 1.5 percent of the amount due and unpaid for each month or part of a month that the amount due, together with any interest, remains unpaid.
An insurer that fails to pay an amount due, or file a statement required, under s. 601.93 (2)
, unless the insurer shows that the failure is due to reasonable cause and not due to willful neglect, is liable for the greater of the following amounts:
Five percent of the amount due for each month or fraction of a month during which the failure continues, but not more than 25 percent of the amount due.
History: 1987 a. 166
Insurance data security
In this subchapter:
“Authorized individual” means an individual who is known to and screened by a licensee and whose access to the licensee's information system or nonpublic information is determined by the licensee to be necessary and appropriate.
“Consumer” means an individual who is a resident of this state and whose nonpublic information is in the possession, custody, or control of a licensee.
“Cybersecurity event” means an event resulting in the unauthorized access to, or disruption or misuse of, an information system or the nonpublic information stored on an information system, except that a “cybersecurity event” does not include any of the following:
The unauthorized acquisition of encrypted nonpublic information if the encryption process or key is not also acquired, released, or used without authorization.
The unauthorized acquisition of nonpublic information if the licensee determines that the nonpublic information has not been used or released and has been returned to the licensee or destroyed.
“Encrypted” means the transformation of data into a form that results in a low probability of assigning meaning without the use of a protective process or key.
“Information security program” means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.
“Information system” means a discrete set of electronic information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of nonpublic information, as well as any specialized system, including an industrial or process controls system, telephone switching and private branch exchange system, and environmental control system.
“Licensee” means a person licensed, authorized, or registered, or a person required to be licensed, authorized, or registered, under chs. 600
, other than a purchasing or risk retention group that is chartered and licensed in another state or a person acting as an assuming insurer that is domiciled in another state or jurisdiction.
“Multifactor authentication” means authentication through verification of at least 2 of the following types of authentication factors:
Possession factor, including a token or text message on a mobile phone.
Inherence factor, including a biometric characteristic.
“Nonpublic information” means electronic information in the possession, custody, or control of a licensee that is not publicly available information and is any of the following:
Information concerning a consumer that can be used to identify the consumer, in combination with at least one of the following data elements:
Driver's license number or nondriver identification card number.
Financial account number or credit or debit card number.
Security code, access code, or password that permits access to a financial account.
Information or data, other than information or data regarding age or gender, in any form or medium created by or derived from a health care provider or a consumer that can be used to identify the consumer and that relates to any of the following:
The physical, mental, or behavioral health or condition of the consumer or a member of the consumer's family.
Payment for the provision of health care to the consumer.
“Publicly available information” means information that a licensee has a reasonable basis to believe is lawfully made available to the general public from federal, state, or local government records, widely distributed media, or disclosures required by federal, state, or local law.
“Third-party service provider” means a person other than a licensee who contracts with a licensee to maintain, process, or store nonpublic information or is otherwise permitted access to nonpublic information through its provision of services to the licensee.
History: 2021 a. 73
General provisions. 601.951(1)
Exclusive state standards.
This subchapter establishes the exclusive state standards applicable to licensees for data security, the investigation of a cybersecurity event, and notification of a cybersecurity event or unauthorized access to nonpublic information to the state government and consumers.
This subchapter does not apply to a person who is an employee, agent, representative, or designee of a licensee and who is also a licensee to the extent that the person is covered by the information security program of the other licensee and the other licensee has complied with this subchapter on behalf of the person.
A licensee affiliated with a depository institution that maintains an information security program in compliance with the interagency guidelines establishing information security standards as set forth pursuant to 15 USC 6801
shall be considered to meet the requirements of this subchapter, provided that the licensee produces, upon request of the commissioner, documentation satisfactory to the commissioner that independently validates the adoption by the affiliated depository institution of an information security program that satisfies the interagency guidelines.
A licensee affiliated with a broker, as defined in 15 USC 78c
(a) (4), or dealer, as defined in 15 USC 78c
(a) (5), that maintains an information security program in compliance with the requirements of the financial industry regulatory authority that address information security standards shall be considered to meet the requirements of this subchapter, provided that the licensee produces, upon request of the commissioner, documentation satisfactory to the commissioner that independently validates the adoption by the affiliated broker or dealer of an information security program that satisfies the financial industry regulatory authority's requirements.
A licensee affiliated with a legal entity established pursuant to the federal farm credit act of 1971, 12 USC 2001
, et seq., that maintains an information security program in compliance with the farm credit administration's guidance and regulations establishing policies and procedures to address data security and integrity shall be considered to meet the requirements of this subchapter, provided that the licensee produces, upon request of the commissioner, documentation satisfactory to the commissioner that independently validates the adoption by the affiliated legal entity of an information security program that satisfies the farm credit administration's guidance and regulations.
If a licensee ceases to qualify for an exception under par. (a)
, the licensee shall have 180 days to comply with this subchapter.
Agreements between parties.
Nothing in this subchapter shall prevent or abrogate an agreement between a licensee and another licensee, a 3rd-party service provider, or another party to fulfill any of the requirements under s. 601.953
Private cause of action.
This subchapter may not be construed to create or imply a private cause of action for violation of its provisions or to curtail a private cause of action that otherwise exists in the absence of this subchapter.
The commissioner may promulgate rules that are necessary to carry out the provisions of this subchapter.
History: 2021 a. 73
Information security program. 601.952(1)
Implementation of program.
No later than November 1, 2022, a licensee shall develop, implement, and maintain a comprehensive written information security program based on the licensee's risk assessment under sub. (2)
and consistent with the conditions of sub. (3) (a)
. The program shall contain administrative, technical, and physical safeguards for the protection of the licensee's information systems and nonpublic information. The licensee shall design the program to do all of the following:
Protect against threats and hazards to the security and integrity of the information systems and nonpublic information.
Protect against unauthorized access to and use of nonpublic information and minimize the likelihood of harm to a consumer from the unauthorized access or use.
Establish and periodically reevaluate a schedule for retention and disposal of nonpublic information and establish a mechanism for the destruction of nonpublic information that is no longer needed.
The licensee shall conduct a risk assessment under which the licensee shall do all of the following:
Identify reasonably foreseeable internal and external threats that could result in unauthorized access to or transmission, disclosure, misuse, alteration, or destruction of nonpublic information, including nonpublic information that is accessible to or held by 3rd-party service providers of the licensee.
Assess the likelihood and potential damage of the threats identified under par. (a)
, taking into consideration the sensitivity of the nonpublic information.
Assess the sufficiency of policies, procedures, information systems, and other safeguards to manage the threats identified under par. (a)
in each relevant area of the licensee's operations, including all of the following:
Information systems, including the classification, governance, processing, storage, transmission, and disposal of information.
Processes for detecting, preventing, and responding to attacks, intrusions, and other system failures.
Based on the risk assessment under sub. (2)
, the licensee shall do all of the following:
Design an information security program to mitigate the identified threats, commensurate with the size and complexity of the licensee, the nature and scope of the licensee's activities, including its use of 3rd-party service providers, and the sensitivity of the nonpublic information.
Implement the following security measures, as appropriate:
Identify and manage the data, personnel, devices, systems, and facilities that enable the licensee to achieve its business purposes, taking into consideration the relative importance of the data, personnel, devices, systems, and facilities to the business objectives and risk strategy of the licensee.
Restrict physical access to nonpublic information to authorized individuals only.
Protect, by encryption or other means, nonpublic information being transmitted over an external network and nonpublic information stored on a portable computer or storage device or media.
Adopt secure development practices for applications that are developed in-house and utilized by the licensee.
Modify information systems in accordance with the licensee's information security program.
Utilize effective controls, which may include multifactor authentication procedures for employees accessing nonpublic information.
Implement regular testing and monitoring of systems and procedures to detect actual and attempted attacks on, or intrusions into, an information system.