Iowa 2023 2023-2024 Regular Session

Iowa House Bill HF553 Enrolled / Bill

Filed 04/24/2023

                    House File 553 - Enrolled   House File 553   AN ACT   RELATING TO AFFIRMATIVE DEFENSES FOR ENTITIES USING   CYBERSECURITY PROGRAMS.   BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE OF IOWA:    Section 1. NEW SECTION   . 554G.1 Definitions.    As used in this chapter:    1. Business means any limited liability company, limited    liability partnership, corporation, sole proprietorship,    association, or other group, however organized and whether    operating for profit or not for profit, including a financial    institution organized, chartered, or holding a license    authorizing operation under the laws of this state, any other    state, the United States, or any other country, or the parent    or subsidiary of any of the foregoing, including an entity    organized under chapter 28E. Business does not include a    municipality as defined in section 670.1.    2. Contract means the same as defined in section 554D.103.    3. Covered entity means a business that accesses,    receives, stores, maintains, communicates, or processes    personal information or restricted information in or through    one or more systems, networks, or services located in or    outside this state.    4. Data breach means an intentional or unintentional    action that could result in electronic records owned, licensed      

  House File 553, p. 2   to, or otherwise protected by a covered entity being viewed,    copied, modified, transmitted, or destroyed in a manner that    is reasonably believed to have or may cause material risk of    identity theft, fraud, or other injury or damage to person or    property. Data breach does not include any of the following:    a. Good-faith acquisition of personal information or    restricted information by the covered entitys employee or    agent for the purposes of the covered entity, provided that    the personal information or restricted information is not used    for an unlawful purpose or subject to further unauthorized    disclosure.    b. Acquisition or disclosure of personal information or    restricted information pursuant to a search warrant, subpoena,    or other court order, or pursuant to a subpoena, order, or duty    of a regulatory state agency.    5. Distributed ledger technology means the same as defined    in section 554E.1.    6. Electronic record means the same as defined in section    554D.103.    7. Encrypted means the use of an algorithmic process to    transform data into a form for which there is a low probability    of assigning meaning without use of a confidential process or    key.    8. Individual means a natural person.    9. Maximum probable loss means the greatest damage    expectation that could reasonably occur from a data breach.    For purposes of this subsection, damage expectation means the    total value of possible damage multiplied by the probability    that damage would occur.    10. a. Personal information means any information    relating to an individual who can be identified, directly or    indirectly, in particular by reference to an identifier such    as a name, an identification number, social security number,    drivers license number or state identification card number,    passport number, account number or credit or debit card number,    location data, biometric data, an online identifier, or to    one or more factors specific to the physical, physiological,    genetic, mental, economic, cultural, or social identity of that   

  House File 553, p. 3   individual.    b. Personal information does not include publicly    available information that is lawfully made available to the    general public from federal, state, or local government records    or any of the following media that are widely distributed:    (1) Any news, editorial, or advertising statement published    in any bona fide newspaper, journal, or magazine, or broadcast    over radio, television, or the internet.    (2) Any gathering or furnishing of information or news by    any bona fide reporter, correspondent, or news bureau to news    media identified in this paragraph.    (3) Any publication designed for and distributed to members    of any bona fide association or charitable or fraternal    nonprofit business.    (4) Any type of media similar in nature to any item, entity,    or activity identified in this paragraph.    11. Record means the same as defined in section 554D.103.    12. Redacted means altered, truncated, or anonymized so    that, when applied to personal information, the data can no    longer be attributed to a specific individual without the use    of additional information.    13. Restricted information means any information about    an individual, other than personal information, or business    that, alone or in combination with other information, including    personal information, can be used to distinguish or trace the    identity of the individual or business, or that is linked or    linkable to an individual or business, if the information is    not encrypted, redacted, tokenized, or altered by any method or    technology in such a manner that the information is anonymized,    and the breach of which is likely to result in a material risk    of identity theft or other fraud to person or property.    14. Smart contract means the same as defined in section    554E.1.      15. Transaction means a sale, trade, exchange, transfer,    payment, or conversion of virtual currency or other digital    asset or any other property or any other action or set of    actions occurring between two or more persons relating to the    conduct of business, commercial, or governmental affairs.    Sec. 2. NEW SECTION   . 554G.2 Affirmative defenses.      

  House File 553, p. 4   1. A covered entity seeking an affirmative defense under    this chapter shall create, maintain, and comply with a written    cybersecurity program that contains administrative, technical,    operational, and physical safeguards for the protection of both    personal information and restricted information.    2. A covered entitys cybersecurity program shall be    designed to do all of the following:    a. Continually evaluate and mitigate any reasonably    anticipated internal or external threats or hazards that could    lead to a data breach.    b. Periodically evaluate no less than annually the maximum    probable loss attainable from a data breach.    c. Communicate to any affected parties the extent of any    risk posed and any actions the affected parties could take to    reduce any damages if a data breach is known to have occurred.    3. The scale and scope of a covered entitys cybersecurity    program is appropriate if the cost to operate the cybersecurity    program is no less than the covered entitys most recently    calculated maximum probable loss value.    4. a. A covered entity that satisfies all requirements    of this section is entitled to an affirmative defense to any    cause of action sounding in tort that is brought under the    laws of this state or in the courts of this state and that    alleges that the failure to implement reasonable information    security controls resulted in a data breach concerning personal    information or restricted information.    b. A covered entity satisfies all requirements of this    section if its cybersecurity program reasonably conforms to an    industry-recognized cybersecurity framework, as described in    section 554G.3.    Sec. 3. NEW SECTION   . 554G.3 Cybersecurity program    framework.      1. A covered entitys cybersecurity program, as    described in section 554G.2, reasonably conforms to an    industry-recognized cybersecurity framework for purposes of    section 554G.2 if any of the following are true:    a. (1) The cybersecurity program reasonably conforms to the    current version of any of the following or any combination of    the following, subject to subparagraph (2) and subsection 2:    

  House File 553, p. 5   (a) The framework for improving critical infrastructure    cybersecurity developed by the national institute of standards    and technology.    (b) National institute of standards and technology special    publication 800-171.    (c) National institute of standards and technology special    publications 800-53 and 800-53a.    (d) The federal risk and authorization management program    security assessment framework.    (e) The center for internet security critical security    controls for effective cyber defense.    (f) The international organization for    standardization/international electrotechnical commission 27000    family  information security management systems.    (2) When a final revision to a framework listed in    subparagraph (1) is published, a covered entity whose    cybersecurity program reasonably conforms to that framework    shall reasonably conform the elements of its cybersecurity    program to the revised framework within the time frame provided    in the relevant framework upon which the covered entity intends    to rely to support its affirmative defense, but in no event    later than one year after the publication date stated in the    revision.    b. (1) The covered entity is regulated by the state, by    the federal government, or both, or is otherwise subject to    the requirements of any of the laws or regulations listed    below, and the cybersecurity program reasonably conforms to    the entirety of the current version of any of the following,    subject to subparagraph (2):    (a) The security requirements of the federal Health    Insurance Portability and Accountability Act of 1996, as set    forth in 45 C.F.R. pt. 164, subpt. C.    (b) Title V of the federal Gramm-Leach-Bliley Act of 1999,    Pub. L. No. 106-102, as amended.    (c) The federal Information Security Modernization Act of    2014, Pub. L. No. 113-283.    (d) The federal Health Information Technology for Economic    and Clinical Health Act as set forth in 45 C.F.R. pt. 162.    (e) Chapter 507F.   

  House File 553, p. 6   (f) Any applicable rules, regulations, or guidelines for    critical infrastructure protection adopted by the federal    environmental protection agency, the federal cybersecurity    and infrastructure security agency, or the north American    reliability corporation.    (2) When a framework listed in subparagraph (1) is amended,    a covered entity whose cybersecurity program reasonably    conforms to that framework shall reasonably conform the    elements of its cybersecurity program to the amended framework    within the time frame provided in the relevant framework    upon which the covered entity intends to rely to support its    affirmative defense, but in no event later than one year after    the effective date of the amended framework.    c. (1) The cybersecurity program reasonably complies    with both the current version of the payment card industry    data security standard and conforms to the current version of    another applicable industry-recognized cybersecurity framework    listed in paragraph a , subject to subparagraph (2) and    subsection 2.    (2) When a final revision to the payment card industry    data security standard is published, a covered entity whose    cybersecurity program reasonably complies with that standard    shall reasonably comply the elements of its cybersecurity    program with the revised standard within the time frame    provided in the relevant framework upon which the covered    entity intends to rely to support its affirmative defense, but    not later than the effective date for compliance.    2. If a covered entitys cybersecurity program reasonably    conforms to a combination of industry-recognized cybersecurity    frameworks, or complies with a standard, as in the case of the    payment card industry data security standard, as described in    subsection 1, paragraph a or c , and two or more of those    frameworks are revised, the covered entity whose cybersecurity    program reasonably conforms to or complies with, as applicable,    those frameworks shall reasonably conform the elements of its    cybersecurity program to or comply with, as applicable, all of    the revised frameworks within the time frames provided in the    relevant frameworks but in no event later than one year after    the latest publication date stated in the revisions.   

  House File 553, p. 7   Sec. 4. NEW SECTION   . 554G.4 Causes of action.    This chapter shall not be construed to provide a private    right of action, including a class action, with respect to any    act or practice regulated under this chapter.    ______________________________   PAT GRASSLEY   Speaker of the House   ______________________________   AMY SINCLAIR   President of the Senate   I hereby certify that this bill originated in the House and   is known as House File 553, Ninetieth General Assembly.   ______________________________   MEGHAN NELSON   Chief Clerk of the House   Approved _______________, 2023 ______________________________   KIM REYNOLDS   Governor