Illinois 2023-2024 Regular Session

Illinois House Bill HB4081 Latest Draft

Bill / Introduced Version Filed 05/10/2023

                            103RD GENERAL ASSEMBLY State of Illinois 2023 and 2024 HB4081 Introduced , by Rep. Brad Stephens SYNOPSIS AS INTRODUCED:  New Act  Creates the Cybersecurity Compliance Act. Creates an affirmative defense for every covered entity that creates, maintains, and complies with a written cybersecurity program that contains administrative, technical, and physical safeguards for the protection of either personal information or both personal information and restricted information and that reasonably conforms to an industry-recognized cybersecurity framework. Prescribes requirements for the cybersecurity program.  LRB103 32146 BMS 61211 b   A BILL FOR 103RD GENERAL ASSEMBLY State of Illinois 2023 and 2024 HB4081 Introduced , by Rep. Brad Stephens SYNOPSIS AS INTRODUCED:  New Act New Act  Creates the Cybersecurity Compliance Act. Creates an affirmative defense for every covered entity that creates, maintains, and complies with a written cybersecurity program that contains administrative, technical, and physical safeguards for the protection of either personal information or both personal information and restricted information and that reasonably conforms to an industry-recognized cybersecurity framework. Prescribes requirements for the cybersecurity program.  LRB103 32146 BMS 61211 b     LRB103 32146 BMS 61211 b   A BILL FOR
103RD GENERAL ASSEMBLY State of Illinois 2023 and 2024 HB4081 Introduced , by Rep. Brad Stephens SYNOPSIS AS INTRODUCED:
New Act New Act
New Act
Creates the Cybersecurity Compliance Act. Creates an affirmative defense for every covered entity that creates, maintains, and complies with a written cybersecurity program that contains administrative, technical, and physical safeguards for the protection of either personal information or both personal information and restricted information and that reasonably conforms to an industry-recognized cybersecurity framework. Prescribes requirements for the cybersecurity program.
LRB103 32146 BMS 61211 b     LRB103 32146 BMS 61211 b
    LRB103 32146 BMS 61211 b
A BILL FOR
HB4081LRB103 32146 BMS 61211 b   HB4081  LRB103 32146 BMS 61211 b
  HB4081  LRB103 32146 BMS 61211 b
1  AN ACT concerning business.
2  Be it enacted by the People of the State of Illinois,
3  represented in the General Assembly:
4  Section 1. Short title. This Act may be cited as the
5  Cybersecurity Compliance Act.
6  Section 5. Definitions. As used in this Act:
7  "Business" means any limited liability company, limited
8  liability partnership, corporation, sole proprietorship,
9  association, State institution of higher education, private
10  college, or other group, however organized and whether
11  operating for profit or not for profit, or the parent or
12  subsidiary of any of the foregoing. "Business" includes a
13  financial institution organized, chartered, or holding a
14  license authorizing operation under the laws of this State,
15  any other state, the United States, or any other country.
16  "Covered entity" means a business that accesses,
17  maintains, communicates, or processes personal information or
18  restricted information in or through one or more systems,
19  networks, or services located in or outside of this State.
20  "Data breach" means unauthorized access to and acquisition
21  of computerized data that compromises the security or
22  confidentiality of personal information or restricted
23  information owned by or licensed to a covered entity and that

 

103RD GENERAL ASSEMBLY State of Illinois 2023 and 2024 HB4081 Introduced , by Rep. Brad Stephens SYNOPSIS AS INTRODUCED:
New Act New Act
New Act
Creates the Cybersecurity Compliance Act. Creates an affirmative defense for every covered entity that creates, maintains, and complies with a written cybersecurity program that contains administrative, technical, and physical safeguards for the protection of either personal information or both personal information and restricted information and that reasonably conforms to an industry-recognized cybersecurity framework. Prescribes requirements for the cybersecurity program.
LRB103 32146 BMS 61211 b     LRB103 32146 BMS 61211 b
    LRB103 32146 BMS 61211 b
A BILL FOR

 

 

New Act



    LRB103 32146 BMS 61211 b

 

 



 

  HB4081  LRB103 32146 BMS 61211 b


HB4081- 2 -LRB103 32146 BMS 61211 b   HB4081 - 2 - LRB103 32146 BMS 61211 b
  HB4081 - 2 - LRB103 32146 BMS 61211 b
1  causes, reasonably is believed to have caused, or reasonably
2  is believed will cause a material risk of identity theft or
3  other fraud to person or property. "Data breach" does not
4  include:
5  (1) the good faith acquisition of personal information
6  or restricted information by the covered entity's employee
7  or agent for the purposes of the covered entity so long as
8  the personal information or restricted information is not
9  used for an unlawful purpose or subject to further
10  unauthorized disclosure; or
11  (2) the acquisition of personal information or
12  restricted information pursuant to a search warrant,
13  subpoena, or other court order, or pursuant to a subpoena,
14  order, or duty of a regulatory State agency.
15  "Personal information" has the same meaning as provided in
16  the Personal Information Protection Act.
17  "Restricted information" means any information about an
18  individual, other than personal information, that, alone or in
19  combination with other information, including personal
20  information, can be used to distinguish or trace the
21  individual's identity or that is linked or linkable to an
22  individual, if the information is not encrypted, redacted, or
23  altered by any method or technology in such a manner that the
24  information is unreadable, and the breach of which is likely
25  to result in a material risk of identity theft or other fraud
26  to a person or property.

 

 

  HB4081 - 2 - LRB103 32146 BMS 61211 b


HB4081- 3 -LRB103 32146 BMS 61211 b   HB4081 - 3 - LRB103 32146 BMS 61211 b
  HB4081 - 3 - LRB103 32146 BMS 61211 b
1  Section 10. Safe harbor requirements.
2  (a) A covered entity seeking an affirmative defense under
3  this Act shall:
4  (1) create, maintain, and comply with a written
5  cybersecurity program that contains administrative,
6  technical, and physical safeguards for the protection of
7  personal information and that reasonably conforms to an
8  industry-recognized cybersecurity framework, as described
9  in Section 15; or
10  (2) create, maintain, and comply with a written
11  cybersecurity program that contains administrative,
12  technical, and physical safeguards for the protection of
13  both personal information and restricted information and
14  that reasonably conforms to an industry-recognized
15  cybersecurity framework, as described in Section 15.
16  (b) A covered entity's cybersecurity program shall be
17  designed to do all of the following:
18  (1) protect the security and confidentiality of
19  information;
20  (2) protect against any anticipated threats or hazards
21  to the security or integrity of information; and
22  (3) protect against unauthorized access to and
23  acquisition of the information that is likely to result in
24  a material risk of identity theft or other fraud to the
25  individual to whom the information relates.

 

 

  HB4081 - 3 - LRB103 32146 BMS 61211 b


HB4081- 4 -LRB103 32146 BMS 61211 b   HB4081 - 4 - LRB103 32146 BMS 61211 b
  HB4081 - 4 - LRB103 32146 BMS 61211 b
1  (c) The scale and scope of a covered entity's
2  cybersecurity program under subsection (a), as applicable, is
3  appropriate if it is based on all of the following factors:
4  (1) the size and complexity of the covered entity;
5  (2) the nature and scope of the activities of the
6  covered entity;
7  (3) the sensitivity of the information to be
8  protected;
9  (4) the cost and availability of tools to improve
10  information security and reduce vulnerabilities; and
11  (5) the resources available to the covered entity.
12  (d) A covered entity under this Section is entitled to an
13  affirmative defense as follows:
14  (1) A covered entity that satisfies paragraph (1) of
15  subsection (a) and also subsections (b) and (c) is
16  entitled to an affirmative defense to any cause of action
17  sounding in tort that is brought under the laws of this
18  State or in the courts of this State and that alleges that
19  the failure to implement reasonable information security
20  controls resulted in a data breach concerning personal
21  information.
22  (2) A covered entity that satisfies paragraph (2) of
23  subsection (a) and also subsections (b) and (c) is
24  entitled to an affirmative defense to any cause of action
25  sounding in tort that is brought under the laws of this
26  State or in the courts of this State and that alleges that

 

 

  HB4081 - 4 - LRB103 32146 BMS 61211 b


HB4081- 5 -LRB103 32146 BMS 61211 b   HB4081 - 5 - LRB103 32146 BMS 61211 b
  HB4081 - 5 - LRB103 32146 BMS 61211 b
1  the failure to implement reasonable information security
2  controls resulted in a data breach concerning personal
3  information or restricted information.
4  Section 15. Reasonable conformance.
5  (a) A covered entity's cybersecurity program reasonably
6  conforms to an industry-recognized cybersecurity framework for
7  purposes of this Act if the requirements of subsection (b),
8  (c), or (d) are satisfied.
9  (b)(1) The cybersecurity program reasonably conforms to an
10  industry-recognized cybersecurity framework for purposes of
11  this Act if the cybersecurity program reasonably conforms to
12  the current version of any of the following or any combination
13  of the following, subject to paragraph (2) and subsection (e):
14  (A) The "framework for improving critical
15  infrastructure cyber security" developed by the National
16  Institute of Standards and Technology (NIST);
17  (B) NIST special publication 800-171;
18  (C) NIST special publications 800-53 and 800-53a;
19  (D) The Federal Risk And Authorization Management
20  Program (FedRAMP) Security Assessment Framework;
21  (E) The Center for Internet Security Critical Security
22  Controls for Effective Cyber Defense; or
23  (F) The International Organization for
24  Standardization/International Electrotechnical Commission
25  27000 Family - Information Security Management Systems.

 

 

  HB4081 - 5 - LRB103 32146 BMS 61211 b


HB4081- 6 -LRB103 32146 BMS 61211 b   HB4081 - 6 - LRB103 32146 BMS 61211 b
  HB4081 - 6 - LRB103 32146 BMS 61211 b
1  (2) When a final revision to a framework listed in
2  paragraph (1) is published, a covered entity whose
3  cybersecurity program reasonably conforms to that framework
4  shall reasonably conform to the revised framework not later
5  than one year after the publication date stated in the
6  revision.
7  (c)(1) The covered entity's cybersecurity program
8  reasonably conforms to an industry-recognized cybersecurity
9  framework for purposes of this Act if the covered entity is
10  regulated by the State, by the federal government, or both, or
11  is otherwise subject to the requirements of any of the laws or
12  regulations listed below, and the cybersecurity program
13  reasonably conforms to the entirety of the current version of
14  any of the following, subject to paragraph (2):
15  (A) The security requirements of the Health Insurance
16  Portability and Accountability Act of 1996, as set forth
17  in 45 CFR Part 164, Subpart C;
18  (B) Title V of the Gramm-Leach-Bliley Act of 1999,
19  Public Law 106-102, as amended;
20  (C) The Federal Information Security Modernization Act
21  of 2014, Public Law 113-283;
22  (D) The Health Information Technology for Economic and
23  Clinical Health Act, as set forth in 45 CFR Part 162.
24  (2) When a framework listed in paragraph (1) is amended, a
25  covered entity whose cybersecurity program reasonably conforms
26  to that framework shall reasonably conform to the amended

 

 

  HB4081 - 6 - LRB103 32146 BMS 61211 b


HB4081- 7 -LRB103 32146 BMS 61211 b   HB4081 - 7 - LRB103 32146 BMS 61211 b
  HB4081 - 7 - LRB103 32146 BMS 61211 b
1  framework not later than one year after the effective date of
2  the amended framework.
3  (d)(1) The cybersecurity program reasonably conforms to an
4  industry-recognized cybersecurity framework for purposes of
5  this Act if the cybersecurity program reasonably complies with
6  both the current version of the payment card industry (PCI)
7  data security standard and conforms to the current version of
8  another applicable industry-recognized cybersecurity
9  framework listed in subsection (b), subject to paragraph (2)
10  of subsection (b) and subsection (e).
11  (2) When a final revision to the PCI data security
12  standard is published, a covered entity whose cybersecurity
13  program reasonably complies with that standard shall
14  reasonably comply with the revised standard not later than one
15  year after the publication date stated in the revision.
16  (e) If a covered entity's cybersecurity program reasonably
17  conforms to a combination of industry-recognized cybersecurity
18  frameworks, or complies with a standard, as in the case of the
19  PCI data security standard, as described in subsection (b) or
20  (d), and 2 or more of those frameworks are revised, the covered
21  entity whose cybersecurity program reasonably conforms to or
22  complies with, as applicable, those frameworks shall
23  reasonably conform to or comply with, as applicable, all of
24  the revised frameworks not later than one year after the
25  latest publication date stated in the revisions.

 

 

  HB4081 - 7 - LRB103 32146 BMS 61211 b


HB4081- 8 -LRB103 32146 BMS 61211 b   HB4081 - 8 - LRB103 32146 BMS 61211 b
  HB4081 - 8 - LRB103 32146 BMS 61211 b
1  Section 20. No private right of action. This Act shall not
2  be construed to provide a private right of action, including a
3  class action, with respect to any act or practice regulated
4  under it.
5  Section 97. Severability. The provisions of this Act are
6  severable under Section 1.31 of the Statute on Statutes.

 

 

  HB4081 - 8 - LRB103 32146 BMS 61211 b