Bill Text: IA SSB1095 | 2023-2024 | 90th General Assembly | Introduced
Bill Title: A bill for an act relating to affirmative defenses for entities using cybersecurity programs and electronic transactions recorded by blockchain technology.(See SF 495.)
Spectrum: Committee Bill
Status: (Introduced - Dead) 2023-03-02 - Committee report approving bill, renumbered as SF 495. [SSB1095 Detail]
Download: Iowa-2023-SSB1095-Introduced.html
Senate
Study
Bill
1095
-
Introduced
SENATE
FILE
_____
BY
(PROPOSED
COMMITTEE
ON
TECHNOLOGY
BILL
BY
CHAIRPERSON
COURNOYER)
A
BILL
FOR
An
Act
relating
to
affirmative
defenses
for
entities
using
1
cybersecurity
programs
and
electronic
transactions
recorded
2
by
blockchain
technology.
3
BE
IT
ENACTED
BY
THE
GENERAL
ASSEMBLY
OF
THE
STATE
OF
IOWA:
4
TLSB
1826XC
(2)
90
cm/ns
S.F.
_____
Section
1.
Section
554D.103,
subsections
7,
8,
and
15,
Code
1
2023,
are
amended
to
read
as
follows:
2
7.
“Electronic
record”
means
a
record
created,
generated,
3
sent,
communicated,
received,
or
stored
by
electronic
means.
4
“Electronic
record”
includes
any
record
or
contract
secured
5
through
distributed
ledger
technology
or
blockchain
technology.
6
8.
“Electronic
signature”
means
an
electronic
sound,
symbol,
7
or
process
attached
to
or
logically
associated
with
a
record
8
and
executed
or
adopted
by
a
person
with
the
intent
to
sign
9
the
record.
“Electronic
signature”
includes
a
signature
that
10
is
secured
through
distributed
ledger
technology
or
blockchain
11
technology.
12
15.
“State”
means
a
state
of
the
United
States,
the
District
13
of
Columbia,
Puerto
Rico,
the
United
States
Virgin
Islands,
or
14
any
territory
or
insular
possession
subject
to
the
jurisdiction
15
of
the
United
States.
“State”
includes
an
Indian
tribe
or
16
band,
or
Alaskan
native
Native
village,
which
is
recognized
by
17
federal
law
or
formally
acknowledged
by
a
state.
18
Sec.
2.
NEW
SECTION
.
554G.1
Definitions.
19
As
used
in
this
chapter:
20
1.
“Business”
means
any
limited
liability
company,
limited
21
liability
partnership,
corporation,
sole
proprietorship,
22
association,
or
other
group,
however
organized
and
whether
23
operating
for
profit
or
not
for
profit,
including
a
financial
24
institution
organized,
chartered,
or
holding
a
license
25
authorizing
operation
under
the
laws
of
this
state,
any
other
26
state,
the
United
States,
or
any
other
country,
or
the
parent
27
or
subsidiary
of
any
of
the
foregoing.
28
2.
“Covered
entity”
means
a
business
that
accesses,
29
maintains,
communicates,
or
processes
personal
information
30
or
restricted
information
in
or
through
one
or
more
systems,
31
networks,
or
services
located
in
or
outside
this
state.
32
3.
“Data
breach”
means
unauthorized
access
to
and
33
acquisition
of
computerized
data
that
compromises
the
security
34
or
confidentiality
of
personal
information
or
restricted
35
-1-
LSB
1826XC
(2)
90
cm/ns
1/
8
S.F.
_____
information
owned
by
or
licensed
to
a
covered
entity
and
that
1
causes,
reasonably
is
believed
to
have
caused,
or
reasonably
is
2
believed
will
cause
a
material
risk
of
identity
theft
or
other
3
fraud
to
person
or
property.
“Data
breach”
does
not
include
any
4
of
the
following:
5
a.
Good-faith
acquisition
of
personal
information
or
6
restricted
information
by
the
covered
entity’s
employee
or
7
agent
for
the
purposes
of
the
covered
entity,
provided
that
8
the
personal
information
or
restricted
information
is
not
used
9
for
an
unlawful
purpose
or
subject
to
further
unauthorized
10
disclosure.
11
b.
Acquisition
of
personal
information
or
restricted
12
information
pursuant
to
a
search
warrant,
subpoena,
or
other
13
court
order,
or
pursuant
to
a
subpoena,
order,
or
duty
of
a
14
regulatory
state
agency.
15
4.
“Encrypted”
means
the
use
of
an
algorithmic
process
to
16
transform
data
into
a
form
in
which
there
is
a
low
probability
17
of
assigning
meaning
without
use
of
a
confidential
process
or
18
key.
19
5.
“Individual”
means
a
natural
person.
20
6.
a.
“Personal
information”
means
an
individual’s
name,
21
consisting
of
the
individual’s
first
name
or
first
initial
and
22
last
name,
in
combination
with
and
linked
to
any
one
or
more
23
of
the
following
data
elements,
when
the
data
elements
are
not
24
encrypted,
redacted,
or
altered
by
any
method
or
technology
in
25
such
a
manner
that
the
data
elements
are
unreadable:
26
(1)
Social
security
number.
27
(2)
Driver’s
license
number
or
state
identification
card
28
number.
29
(3)
Account
number
or
credit
or
debit
card
number,
in
30
combination
with
and
linked
to
any
required
security
code,
31
access
code,
or
password
that
would
permit
access
to
an
32
individual’s
financial
account.
33
b.
“Personal
information”
does
not
include
publicly
34
available
information
that
is
lawfully
made
available
to
the
35
-2-
LSB
1826XC
(2)
90
cm/ns
2/
8
S.F.
_____
general
public
from
federal,
state,
or
local
government
records
1
or
any
of
the
following
media
that
are
widely
distributed:
2
(1)
Any
news,
editorial,
or
advertising
statement
published
3
in
any
bona
fide
newspaper,
journal,
or
magazine,
or
broadcast
4
over
radio
or
television.
5
(2)
Any
gathering
or
furnishing
of
information
or
news
by
6
any
bona
fide
reporter,
correspondent,
or
news
bureau
to
news
7
media
identified
in
this
paragraph.
8
(3)
Any
publication
designed
for
and
distributed
to
members
9
of
any
bona
fide
association
or
charitable
or
fraternal
10
nonprofit
corporation.
11
(4)
Any
type
of
media
similar
in
nature
to
any
item,
entity,
12
or
activity
identified
in
this
paragraph.
13
7.
“Redacted”
means
altered
or
truncated
so
that
no
more
14
than
the
last
four
digits
of
a
social
security
number,
driver’s
15
license
number,
state
identification
card
number,
account
16
number,
or
credit
or
debit
card
number
is
accessible
as
part
17
of
the
data.
18
8.
“Restricted
information”
means
any
information
about
19
an
individual,
other
than
personal
information,
that,
20
alone
or
in
combination
with
other
information,
including
21
personal
information,
can
be
used
to
distinguish
or
trace
the
22
individual’s
identity
or
that
is
linked
or
linkable
to
an
23
individual,
if
the
information
is
not
encrypted,
redacted,
or
24
altered
by
any
method
or
technology
in
such
a
manner
that
the
25
information
is
unreadable,
and
the
breach
of
which
is
likely
26
to
result
in
a
material
risk
of
identity
theft
or
other
fraud
27
to
person
or
property.
28
Sec.
3.
NEW
SECTION
.
554G.2
Affirmative
defenses.
29
1.
A
covered
entity
seeking
an
affirmative
defense
under
30
this
chapter
shall
do
one
of
the
following:
31
a.
Create,
maintain,
and
comply
with
a
written
cybersecurity
32
program
that
contains
administrative,
technical,
and
physical
33
safeguards
for
the
protection
of
personal
information
and
that
34
reasonably
conforms
to
an
industry-recognized
cybersecurity
35
-3-
LSB
1826XC
(2)
90
cm/ns
3/
8
S.F.
_____
framework,
as
described
in
section
554G.3.
1
b.
Create,
maintain,
and
comply
with
a
written
cybersecurity
2
program
that
contains
administrative,
technical,
and
physical
3
safeguards
for
the
protection
of
both
personal
information
4
and
restricted
information
and
that
reasonably
conforms
to
an
5
industry-recognized
cybersecurity
framework,
as
described
in
6
section
554G.3.
7
2.
A
covered
entity’s
cybersecurity
program
shall
be
8
designed
to
do
all
of
the
following
with
respect
to
the
9
information
described
in
subsection
1,
paragraph
“a”
or
“b”
,
as
10
applicable:
11
a.
Protect
the
security
and
confidentiality
of
the
12
information.
13
b.
Protect
against
any
anticipated
threats
or
hazards
to
the
14
security
or
integrity
of
the
information.
15
c.
Protect
against
unauthorized
access
to
and
acquisition
16
of
the
information
that
is
likely
to
result
in
a
material
risk
17
of
identity
theft
or
other
fraud
to
the
individual
to
whom
the
18
information
relates.
19
3.
The
scale
and
scope
of
a
covered
entity’s
cybersecurity
20
program
under
subsection
1,
paragraph
“a”
or
“b”
,
as
applicable,
21
is
appropriate
if
the
cybersecurity
program
is
based
on
all
of
22
the
following
factors:
23
a.
The
size
and
complexity
of
the
covered
entity.
24
b.
The
nature
and
scope
of
the
activities
of
the
covered
25
entity.
26
c.
The
sensitivity
of
the
information
to
be
protected.
27
d.
The
cost
and
availability
of
tools
to
improve
information
28
security
and
reduce
vulnerabilities.
29
e.
The
resources
available
to
the
covered
entity.
30
4.
a.
A
covered
entity
that
satisfies
subsection
1,
31
paragraph
“a”
,
and
subsections
2
and
3,
is
entitled
to
an
32
affirmative
defense
to
any
cause
of
action
sounding
in
tort
33
that
is
brought
under
the
laws
of
this
state
or
in
the
courts
34
of
this
state
and
that
alleges
that
the
failure
to
implement
35
-4-
LSB
1826XC
(2)
90
cm/ns
4/
8
S.F.
_____
reasonable
information
security
controls
resulted
in
a
data
1
breach
concerning
personal
information.
2
b.
A
covered
entity
that
satisfies
subsection
1,
paragraph
3
“b”
,
and
subsections
2
and
3,
is
entitled
to
an
affirmative
4
defense
to
any
cause
of
action
sounding
in
tort
that
is
brought
5
under
the
laws
of
this
state
or
in
the
courts
of
this
state
6
and
that
alleges
that
the
failure
to
implement
reasonable
7
information
security
controls
resulted
in
a
data
breach
8
concerning
personal
information
or
restricted
information.
9
Sec.
4.
NEW
SECTION
.
554G.3
Cybersecurity
program
10
framework.
11
1.
A
covered
entity’s
cybersecurity
program,
as
12
described
in
section
554G.2,
reasonably
conforms
to
an
13
industry-recognized
cybersecurity
framework
for
purposes
of
14
section
554G.2
if
any
of
the
following
are
true:
15
a.
(1)
The
cybersecurity
program
reasonably
conforms
to
the
16
current
version
of
any
of
the
following
or
any
combination
of
17
the
following,
subject
to
subparagraph
(2)
and
subsection
2:
18
(a)
The
framework
for
improving
critical
infrastructure
19
cybersecurity
developed
by
the
national
institute
of
standards
20
and
technology.
21
(b)
National
institute
of
standards
and
technology
special
22
publication
800-171.
23
(c)
National
institute
of
standards
and
technology
special
24
publications
800-53
and
800-53a.
25
(d)
The
federal
risk
and
authorization
management
program
26
security
assessment
framework.
27
(e)
The
center
for
internet
security
critical
security
28
controls
for
effective
cyber
defense.
29
(f)
The
international
organization
for
30
standardization/international
electrotechnical
commission
27000
31
family
——
information
security
management
systems.
32
(2)
When
a
final
revision
to
a
framework
listed
in
33
subparagraph
(1)
is
published,
a
covered
entity
whose
34
cybersecurity
program
reasonably
conforms
to
that
framework
35
-5-
LSB
1826XC
(2)
90
cm/ns
5/
8
S.F.
_____
shall
reasonably
conform
to
the
revised
framework
not
later
1
than
one
year
after
the
publication
date
stated
in
the
2
revision.
3
b.
(1)
The
covered
entity
is
regulated
by
the
state,
by
4
the
federal
government,
or
both,
or
is
otherwise
subject
to
5
the
requirements
of
any
of
the
laws
or
regulations
listed
6
below,
and
the
cybersecurity
program
reasonably
conforms
to
7
the
entirety
of
the
current
version
of
any
of
the
following,
8
subject
to
subparagraph
(2):
9
(a)
The
security
requirements
of
the
federal
Health
10
Insurance
Portability
and
Accountability
Act
of
1996,
as
set
11
forth
in
45
C.F.R.
pt.
164,
subpt.
C.
12
(b)
Title
V
of
the
federal
Gramm-Leach-Bliley
Act
of
1999,
13
Pub.
L.
No.
106-102,
as
amended.
14
(c)
The
federal
Information
Security
Modernization
Act
of
15
2014,
Pub.
L.
No.
113-283.
16
(d)
The
federal
Health
Information
Technology
for
Economic
17
and
Clinical
Health
Act
as
set
forth
in
45
C.F.R.
pt.
162.
18
(2)
When
a
framework
listed
in
subparagraph
(1)
is
amended,
19
a
covered
entity
whose
cybersecurity
program
reasonably
20
conforms
to
that
framework
shall
reasonably
conform
to
the
21
amended
framework
not
later
than
one
year
after
the
effective
22
date
of
the
amended
framework.
23
c.
(1)
The
cybersecurity
program
reasonably
complies
24
with
both
the
current
version
of
the
payment
card
industry
25
data
security
standard
and
conforms
to
the
current
version
of
26
another
applicable
industry-recognized
cybersecurity
framework
27
listed
in
paragraph
“a”
,
subject
to
subparagraph
(2)
and
28
subsection
2.
29
(2)
When
a
final
revision
to
the
payment
card
industry
30
data
security
standard
is
published,
a
covered
entity
whose
31
cybersecurity
program
reasonably
complies
with
that
standard
32
shall
reasonably
comply
with
the
revised
standard
not
later
33
than
one
year
after
the
publication
date
stated
in
the
34
revision.
35
-6-
LSB
1826XC
(2)
90
cm/ns
6/
8
S.F.
_____
2.
If
a
covered
entity’s
cybersecurity
program
reasonably
1
conforms
to
a
combination
of
industry-recognized
cybersecurity
2
frameworks,
or
complies
with
a
standard,
as
in
the
case
of
the
3
payment
card
industry
data
security
standard,
as
described
in
4
subsection
1,
paragraph
“a”
or
“c”
,
and
two
or
more
of
those
5
frameworks
are
revised,
the
covered
entity
whose
cybersecurity
6
program
reasonably
conforms
to
or
complies
with,
as
applicable,
7
those
frameworks
shall
reasonably
conform
to
or
comply
with,
as
8
applicable,
all
of
the
revised
frameworks
not
later
than
one
9
year
after
the
latest
publication
date
stated
in
the
revisions.
10
Sec.
5.
NEW
SECTION
.
554G.4
Causes
of
actions.
11
This
chapter
shall
not
be
construed
to
provide
a
private
12
right
of
action,
including
a
class
action,
with
respect
to
any
13
act
or
practice
regulated
under
those
sections.
14
EXPLANATION
15
The
inclusion
of
this
explanation
does
not
constitute
agreement
with
16
the
explanation’s
substance
by
the
members
of
the
general
assembly.
17
This
bill
relates
to
cybersecurity
programs
and
blockchain
18
technology.
The
bill
changes
the
definitions
of
“electronic
19
record”
and
“electronic
signature”
in
the
uniform
electronic
20
transactions
Act
to
include
blockchain
technology.
21
The
bill
creates
affirmative
defenses
for
entities
using
22
cybersecurity
programs
and
provides
definitions.
The
23
bill
provides
that
a
covered
entity
seeking
an
affirmative
24
defense
must
use
a
cybersecurity
program
for
the
protection
25
of
personal
information
or
both
personal
information
and
26
restricted
information
and
the
cybersecurity
program
must
27
reasonably
conform
to
an
industry-recognized
cybersecurity
28
framework.
A
cybersecurity
program
must
protect
the
security
29
and
confidentiality
of
the
information,
protect
against
any
30
anticipated
threats
to
the
information,
and
protect
against
31
unauthorized
access
to
and
acquisition
of
the
information
that
32
is
likely
to
result
in
a
material
risk
of
identity
theft.
A
33
cybersecurity
program
scale
and
scope
should
be
based
upon
34
the
size
and
complexity
of
the
covered
entity,
the
nature
35
-7-
LSB
1826XC
(2)
90
cm/ns
7/
8
S.F.
_____
and
scope
of
the
covered
entity’s
activities,
sensitivity
1
of
the
information,
and
the
cost
and
availability
of
tools
2
and
resources
to
improve
information
security.
A
covered
3
entity
that
satisfies
the
above
requirements
is
entitled
to
4
an
affirmative
defense
to
a
tort
claim
that
alleges
that
the
5
failure
to
implement
reasonable
information
security
controls
6
resulted
in
a
data
breach
concerning
personal
information
or
7
restricted
information.
8
The
bill
provides
industry-recognized
cybersecurity
9
frameworks
that
the
covered
entity
should
follow
and
reasonably
10
comply
to
in
order
to
qualify
for
the
affirmative
defense.
11
The
bill
does
not
provide
a
private
right
to
action,
12
including
a
class
action.
13
-8-
LSB
1826XC
(2)
90
cm/ns
8/
8