INTRODUCTION

The New York Department of Financial Services (“DFS”) recently issued a revised version of the cybersecurity rules1 that it first announced in the fall of last year. The rules apply to a wide range of insurance, banking, and financial services companies under the DFS’s supervision and require them to adopt robust cybersecurity programs to protect sensitive and confidential data from theft by cybercriminals. Although the revised rules appear to incorporate some of the comments made by the public and industry groups during a notice and comment period in the fall, they still impose a number of rigorous new cybersecurity requirements that will affect not just companies regulated by the DFS but many of the third party service providers who have access to confidential corporate data or systems. The new rules also leave open the question as to whether the DFS will bring enforcement actions against covered entities – and potentially their employees – for non-compliance.

BACKGROUND

On September 13, 2016, the DFS first announced and published its proposed cybersecurity rules (the “Original Rules”), which were subject to a notice and comment period.2 On December 28, 2016, the DFS issued a revised version of the rules (the “Revised Rules”), which are subject to a new 30-day notice and comment period.3 The Revised Rules are scheduled to become effective on March 1, 2017 and require “Covered Entities”4 to comply with most of their provisions within six months of their effective date.5

When Governor Andrew Cuomo first announced the Original Rules in the fall, he stated that New York was “leading the nation in taking decisive action” to address potentially costly cybersecurity threats.6 The significant concentration of insurance, banking, and financial services entities in New York ensure that the Revised Rules will play an important role in shaping cybersecurity programs across the nation.

I. THE REGULATIONS REQUIRE COVERED ENTITIES TO DEVELOP ROBUST CYBERSECURITY PROGRAMS AND POLICIES

The DFS views it as “critical” that Covered Entities develop and maintain robust cybersecurity programs designed to protect the integrity, confidentiality, and availability of their electronic information resources or “Information Systems”.7 Accordingly, the Revised Rules provide for the following:

  • Cybersecurity Programs. Under the Revised Rules, Covered Entities must develop cybersecurity programs that perform the following functions, among others: (i) identify and assess internal and external cybersecurity risks; (ii) protect Information Systems and Nonpublic Information8 from unauthorized access; (iii) detect, respond to, and recover from cybersecurity incidents; and (iv) fulfill applicable regulatory reporting requirements.9
  • Cybersecurity Policies. The Revised Rules provide that each Covered Entity implement and maintain a written cybersecurity policy that is approved by a senior officer or the board of directors and that addresses (to the extent applicable), among other things: (i) information security; (ii) data governance and classification; and (iii) customer data privacy.10
  • Cybersecurity Risk Assessments. Covered Entities are required by the Revised Rules to periodically undertake a comprehensive assessment of the cybersecurity risks affecting their business operations, Information Systems, and Nonpublic Information.11 These risk assessments are to be carried out according to developed written policies and procedures, which must include criteria for (i) evaluating and categorizing cybersecurity risks facing the company; (ii) assessing the security of the company’s Information Systems and Nonpublic Information; (iii) evaluating the adequacy of existing controls in the context of the identified risks; and (iv) determining how risks identified by the risk assessment will be mitigated (or accepted) by the company.12
  • Appointment of a Chief Information Security Officer. The Revised Rules also require the designation of a qualified individual, referred to as the Chief Information Security Officer (“CISO”), to be responsible for the oversight, implementation, and enforcement of the cybersecurity program and policies.13 Unlike the original version of the rules, the Revised Rules do not require that the CISO serve exclusively in that function or that Covered Entities create a new CISO position.14 Instead, companies can designate someone already employed by the company, one of its affiliates, or a third party service provider to take on the additional responsibilities of the CISO.15 Under the rules, the CISO must provide a written report to the board of directors regarding the company’s cybersecurity program at least once a year.16
  • Technical Security Requirements. The Revised Rules further impose certain technical requirements on Covered Entities, including requiring that companies: (i) use Multi‑Factor Authentication in certain circumstances17; (ii) encrypt Nonpublic Information where feasible18; and (iii) periodically engage in penetration and vulnerability testing to ensure the security and integrity of the company’s Information Systems.19 Multi-Factor Authentication must be used for access to the company’s internal network from an external network (such as when employees access their employer’s network from home or while traveling), unless the CISO has approved the use of a reasonable equivalent (or more secure) access control.20 The Revised Rules also require encryption, if feasible, of Nonpublic Information held in the company’s Information Systems or in transit over external networks.21 If encryption is not feasible, then the company can secure Nonpublic Information using effective alternatives approved by the CISO.22

II. THE REGULATIONS CREATE STANDARDS FOR RECORDS MAINTENANCE AND REGULATORY REPORTING

The Revised Rules also impose standards for recordkeeping and regulatory reporting, including the reporting of cybersecurity incidents and data breaches to the DFS.

  • Recordkeeping. The Revised Rules require companies to design and maintain effective record-keeping systems. These systems must be tailored to the risks facing the company and must include (i) audit trails that are designed to detect and respond to cybersecurity events and (ii) systems that can reconstruct material financial transactions sufficient to support the company’s normal operations.23 Such records must be retained for at least five years.24
  • Annual Compliance Certification and DFS Oversight. Boards of directors or senior officers of Covered Entities must provide DFS with an annual written certification of compliance with respect to the Revised Rules.25 This requirement begins on February 15, 2018 and requires new compliance certifications on February 15 of every year thereafter. In addition, the Revised Rules require that a company must produce “[a]ll documentation and information relevant” to its cybersecurity program upon request by the DFS.26
  • Cybersecurity Incident Reporting. The Revised Rules require that Covered Entities must report to the DFS within 72 hours of determining that a “cybersecurity event”27 has occurred that either (i) has a reasonable likelihood of materially harming its normal operations or (ii) must otherwise be reported to a governmental authority.28 This 72-hour reporting requirement was the subject of many comments, particularly complaining that the time allowed for making a disclosure was too short; however, DFS believed that this time frame was “essential” to protecting financial markets.29

III. THE RULES REQUIRE OVERSIGHT OF THIRD PARTY SERVICE PROVIDERS

The Revised Rules also focus on the cybersecurity of third party service providers that have access to the sensitive information or computer networks of Covered Entities. Although the Revised Rules do not directly impose cybersecurity obligations on third parties that are not otherwise under the DFS’s supervision, the rules do require that the Covered Entities themselves impose cybersecurity requirements on any third party service provider that has access to the Information Systems or Nonpublic Information of a Covered Entity.30 Among other things, the rules require Covered Entities to (i) understand the cybersecurity risks posed by a third party service provider; (ii) assess the continued adequacy of any third party service provider’s cybersecurity practices; (iii) identify the minimum cybersecurity practices that a third party service provider must meet; and (iv) create guidelines for due diligence and contractual protections with respect to third party service providers used by a Covered Entity, including contractual representations and warranties addressing the adequacy of a third party service provider’s cybersecurity program.31

CONCLUSION

The Revised Rules reflect New York’s strong belief that “time is of the essence regarding cybersecurity protections.”32 Although New York State is taking the lead in establishing these minimum standards for cybersecurity programs, it is the Covered Entities that bear the responsibility – and possibly liability – for failing to meet these new standards imposed by the proposed regulations.

Indeed, failure to comply with the Revised Rules could result in DFS enforcement actions. The DFS is empowered to take any action that it “deems necessary to … protect users of financial products and services.”33 While it is not clear, at this point, how aggressively the DFS will seek to penalize Covered Entities that fail to comply with the Revised Rules, it is the Superintendent’s view that cybersecurity is one issue where New York should lead.34 In the past, the DFS has imposed steep fines on Covered Entities (and/or demanded the termination of compliance officers) that allegedly failed to implement and maintain appropriate policies and procedures in other contexts – such as with anti-money laundering compliance programs.

Accordingly, the Revised Rules create new areas of uncertainty, and potential liability, for Covered Entities, their boards, their senior officers, and CISOs. Moreover, third party service providers, including professional services firms, may find themselves facing new demands from their clients to adopt appropriate cybersecurity compliance programs.