Connecticut 2021 2021 Regular Session

Connecticut House Bill HB06607 Comm Sub / Analysis

Filed 04/26/2021

                     
Researcher: SM 	Page 1 	4/26/21 
 
 
 
OLR Bill Analysis 
sHB 6607  
 
AN ACT INCENTIVIZING THE ADOPTION OF CYBERSECURITY 
STANDARDS FOR BUSINESSES.  
 
SUMMARY 
This bill establishes an affirmative defense for civil action brought 
against a covered entity (see below) for a data breach of personal or 
restricted information. If the action alleges the breach resulted from a 
covered entity's failure to implement reasonable cybersecurity 
controls, the entity has an affirmative defense if it created, maintained, 
and complied with a written cybersecurity program containing 
administrative, technical, and physical safeguards for the protection of 
personal or restricted information. To qualify as an affirmative 
defense, these cybersecurity programs must (1) meet specified design 
requirements and (2) conform to an industry-recognized cybersecurity 
framework.  
Under the bill, "covered entities" are businesses accessing, 
maintaining, communicating, or processing personal or restricted 
information in or through systems, networks, or services located inside 
or outside the state. 
EFFECTIVE DATE:  October 1, 2021  
CYBERSECURITY PROGRA M DESIGN REQUIREMENT S 
To qualify as an affirmative defense, the bill requires that a covered 
entity's cybersecurity program be designed to protect the security and 
confidentiality of personal and restricted information. The program 
must specifically protect this information against (1) anticipated 
threats or hazards to its security or integrity and (2) unauthorized 
access and acquisition likely to cause material risk of identity theft or 
other fraud.  
The bill requires the scale and scope of a covered entity's  2021HB-06607-R000598-BA.DOCX 
 
Researcher: SM 	Page 2 	4/26/21 
 
cybersecurity program to be based on the:  
1. entity's size and complexity, available resources, and nature and 
scope of its activities;  
2. sensitivity of the information to be protected; and  
3. cost and availability of tools to improve information security 
and reduce vulnerabilities.  
INDUSTRY-RECOGNIZED CYBERSECURITY FRAMEWOR KS 
Under the bill, an industry-recognized cybersecurity framework 
includes the most current version of: 
1. one or any combination of six specifically recognized 
frameworks (see Table 1),  
2.  one of four specified federal laws and regulations (for entities 
regulated by any of these laws or the state or federal 
government; see Table 2), or  
3. the "Payment Card Industry Data Security Standard" in 
combination with one of the acceptable frameworks mentioned 
in Table 1 below.  
Table 1: Industry-Recognized Cybersecurity Frameworks  
Publisher  	Framework 
National Institute of Standards and 
Technology 
1. "Framework for Improving Critical 
Infrastructure Cybersecurity"  
2. Special Publication (SP) 800-171 
3. SP 800-53 and 800-53a  
Federal Risk and Management Program  4. "FedRAMP Security Assessment 
Framework" 
Center for Internet Security 5. "Center for Internet Security Critical 
Security Controls for Effective Cyber 
Defense" 
International Organization for 
Standardization and the International 
6. "ISO/IEC 27000-series"   2021HB-06607-R000598-BA.DOCX 
 
Researcher: SM 	Page 3 	4/26/21 
 
Electrotechnical Commission 
 
Table 2: Federal Cybersecurity Laws and Regulations 
Citation  	Law or Regulation 
P.L. 104-191; 45 C.F.R. 
164 (Subpart C) 
Security requirements of the Health Insurance Portability 
and Accountability Act of 1996 
 
P.L. 106-102  Title V of the Gramm-Leach-Bliley Act of 1999 
P.L. 113-283  Federal Information Security Modernization Act of 2014  
45 C.F.R. 162  Security requirements of the Health Information 
Technology for Economic and Clinical Health Act  
 
The bill requires a covered entity whose cybersecurity program 
conforms with any of the acceptable cybersecurity frameworks to 
conform with revisions to these frameworks within 60 days after the 
revised document is published. Similarly, a covered entity whose 
cybersecurity program conforms with any of the specified federal 
cybersecurity laws or regulations must conform to any amendments 
within the same time period. For a covered entity that conforms to the 
Payment Card Industry Data Security Standard, the allowable time 
period to conform with a published revision is one year after the 
revision's publication date.  
DEFINITIONS  
Businesses  
Under the bill, a covered entity’s business type may include an 
individual or a sole proprietorship, partnership, firm, corporation, 
trust, limited liability company or partnership, joint stock company, 
joint ventures, associations, or other legal entities through which for-
profit or non-profit business is conducted.  
Data Breach  
The bill defines a "data breach" as unauthorized access to and  2021HB-06607-R000598-BA.DOCX 
 
Researcher: SM 	Page 4 	4/26/21 
 
acquisition of computerized data that (1) compromises the security or 
confidentiality of personal or restricted information owned by or 
licensed to a covered entity and (2) causes a material risk of identity 
theft or other fraud to a person or property (or reasonably is believed 
to have caused or will cause such risk). The definition specifically 
excludes: 
1. employees or agents of a covered entity acquiring personal or 
restricted information in good faith for the purposes of the 
entity, so long as the entity does not unlawfully use this 
information or subject it to further unauthorized disclosure, or  
2. the acquisition of this information pursuant to a (a) search 
warrant, (b) subpoena or other court order, or (c) regulatory 
state agency's order or duty.  
Personal and Restricted Information  
Under the bill, "personal information" means an individual's name 
(i.e., first name or initial and last name) in combination with or linked 
to one or more specified unencrypted, unredacted, or unaltered data 
elements. These data elements are social security numbers; driver's 
license or state identification numbers; and account or credit or debit 
card numbers in combination with and linked to a required security 
code, access code, or password permitting access to an individual's 
financial account.  
"Restricted information" means any unencrypted, unredacted, or 
unaltered information about an individual that, alone or in 
combination with other information (including personal information 
as described above), (1) can be used to distinguish or trace the 
individual's identity or is linked or linkable to an individual and (2) is 
likely to result in a material risk of identity theft or other fraud to a 
person or property if breached. The definition excludes personal 
information.  
COMMITTEE ACTION 
Commerce Committee  2021HB-06607-R000598-BA.DOCX 
 
Researcher: SM 	Page 5 	4/26/21 
 
Joint Favorable Change of Reference - JUD 
Yea 22 Nay 1 (03/22/2021) 
 
Judiciary Committee 
Joint Favorable Substitute 
Yea 32 Nay 3 (04/09/2021)