Oklahoma 2023 2023 Regular Session

Oklahoma House Bill HB2790 Introduced / Bill

Filed 02/03/2023

                     
 
Req. No. 5928 	Page 1  1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
  
STATE OF OKLAHOMA 
 
1st Session of the 59th Legislature (2023) 
 
HOUSE BILL 2790 	By: Stinson 
 
 
 
 
 
AS INTRODUCED 
 
An Act relating to cybersecurity; creating The 
Oklahoma Hospital Cybersecurity Protection Act of 
2023; providing definitions; creating requirements 
for affirmative defense; recognizi ng industry 
framework; clarifying no private right of action; 
providing for severability; provi ding for 
codification; and pro viding an effective date . 
 
 
 
 
 
BE IT ENACTED BY THE PEOPLE OF THE STATE OF OKL AHOMA: 
SECTION 1.     NEW LAW     A new section of law to be codified 
in the Oklahoma Statutes as Section 2068 of Title 18, unless there 
is created a duplication in numbering, reads a s follows: 
This act shall be known and may be cited as "The Oklahoma 
Hospital Cybersecurity Protection Act of 2023". 
SECTION 2.     NEW LAW     A new section of law to be codified 
in the Oklahoma Statutes as Section 2069 of Title 18, unless there 
is created a duplication in numbering, reads as fo llows: 
As used in this act: 
A.  "Covered entity" means any hospital, as defined in Section 
1-701 of Title 63 of the Oklahoma Statutes, whether for profit or   
 
Req. No. 5928 	Page 2  1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
  
not-for-profit, which is owned, either in wh ole in or part, or is 
managed in whole or in part, by hospitals whose business is subject 
to the Health Insurance Portability and Accountability Act of 1996 , 
Public Law 104-191. 
B.  "Data breach" means the unauthorized access and acquisition 
of unencrypted and unredacted computerized data that compromises the 
security or confidentiality of personal information or restricted 
information maintained by a covered entity as part of a database of 
personal information or restricted information regarding multiple 
individuals and that causes, or the covered entity reasonably 
believes has caused or will cause, identity theft or other fraud to 
any resident of this state.  Good -faith acquisition of personal 
information or restricted information by an employee or agent o f a 
covered entity for the purposes of the covered entity is not a 
breach of the security system ; provided, that the personal 
information or restricted information, as the case may be, is not 
used for a purpose other than a lawful purpose of the covered entity 
or subject to further unauthorized disclosure. 
C.  "Personal information " means the first name or first initial 
and last name in combination with and linked to any one or more of 
the following data elements that relate to a resident of this state, 
when the data elements are neither encryp ted nor redacted: 
1.  Social Security number;   
 
Req. No. 5928 	Page 3  1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
  
2.  Driver license number or state identification number issued 
in lieu of a driver license, or 
3.  Financial account number, or credit or debit card number, in 
combination with any required security code, ac cess code, or 
password that would permit access to the financial accounts of a n 
individual. 
The term does not include information that is lawfully obtained 
from publicly available information, or from federal, state , or 
local government records lawfully made available to the public. 
D.  "Restricted information " means any information about an 
individual, other than personal informati on, that, alone or in 
combination with other information, including personal inform ation, 
can be used to distinguish or tr ace the individual's identity or 
that is linked or linkable to an individual, if the information is 
not encrypted, redacted, or altere d by any method or technology in 
such a manner that the information is unreadable, and the breach of 
which is likely to re sult in a material risk of identity theft or 
other fraud to person or property. 
E.  As used in this act, the terms "encrypted" and "redacted" 
have the same meanings as in Section 162 of Title 24 of Oklahoma 
law. 
SECTION 3.     NEW LAW     A new section of law to b e codified 
in the Oklahoma Statutes as Section 2070 of Title 18, unless there 
is created a duplication in numbering, reads as follows:   
 
Req. No. 5928 	Page 4  1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
  
A.  The requirements of this section are voluntary ; provided, a 
covered entity may only seek an affirmative defense under this act 
if the following conditions are met: 
1.  A covered entity seeking an affirmati ve defense under this 
act shall create, maintain, and comply, including documentation of 
such compliance, with a written cybersecurity program that contains 
administrative, technical, and physical safeguards for the 
protection of both personal information and restricted information 
and that reasonably conform s to an industry reco gnized cybersecurity 
framework, as described in this section. 
2.  A covered entity's cybersecurity program shall be designed 
to do all of the following with respect to the information describe d 
in paragraph 1 of subsection A of this section, as applicable: 
a. protect the security and confidentiality of the 
information, 
b. protect against any anticipated threats or hazards to 
the security or integrity of the information , 
c. protect against unauthorized access to and acquisition 
of the information that is likely to result in a 
material risk of identity theft or other fraud to the 
individual to whom the information relates. 
3.  The scale and scope of a cove red entity's cybersecurity 
program under subsecti on A of this section is appropriate if it is 
based on all of the following factors:   
 
Req. No. 5928 	Page 5  1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
  
a. the size and complexity of the covered entity, 
b. the nature and scope of the activities of the covered 
entity, 
c. the sensitivity of the information to be protected, 
d. the cost and availability of tools to improve 
information security and reduce vulnera bilities, and 
e. the resources available to the covered entity. 
4.  The cybersecurity program shall contain requirements that it 
be reviewed, evaluated, and updated on at least an annual basis and 
shall require documentation of the same. 
B.  A covered entity that satisfies paragraphs 1 through 4 of 
subsection A of this section is entitled to an affirmative defense 
to any cause of action sounding in tort that is brough t alleging 
that the failure to implement reasonable information security 
controls resulted in a data breach concerning personal information 
or restricted information. 
SECTION 4.     NEW LAW     A new section of law to be codified 
in the Oklahoma Statutes as Section 2071 of Title 18, unless there 
is created a duplication in numbering, reads as follows: 
A covered entity's cybersecurity program, as described in 
Section 2 of this act, reasonably conforms to an industry-recognized 
cybersecurity framework for purposes of that section if subsection A 
of this section is satisfied :   
 
Req. No. 5928 	Page 6  1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
  
A. 1.  The covered entity is subject to the requirements of the 
laws or regulations listed below, and the cybersecurity program 
reasonably conforms to the entirety of the current version of both 
of the following, subject to paragraph 2 of subsection A of this 
section: 
a. the security requirements of the "Health Insurance 
Portability and Accountability Act of 1996 ", as set 
forth in 45 CFR Part 164 Subpart C; and 
b. the "Health Information Technology for Economic and 
Clinical Health Act", as set forth in 45 CFR Part 162. 
2.  When a framework listed in paragraph 1 of subsection A of 
this section is amended, a covered entity whose cybersecurity 
program reasonably conform s to that framework shall reasonably 
conform to the amended framework not later than one (1) year after 
the effective date of the ame nded framework. 
SECTION 5.     NEW LAW     A new section of law to be codified 
in the Oklahoma Statutes as Section 2072 of Title 18, unless there 
is created a duplication in numbering, reads as follows: 
Nothing in this act shall be construed as to provide a private 
right of action, including a class action, with respect to any act 
or practice regulated under this act. 
SECTION 6.     NEW LAW     A new section of law to be codified 
in the Oklahoma Statutes as Section 2073 of Title 18, unless there 
is created a duplication in numbering, reads as follows:   
 
Req. No. 5928 	Page 7  1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
  
If any provision off this act or the application thereof to a 
covered entity is for any reason held to be invalid, the remainder 
of the provisions under those sections and the application of such 
provisions to other covered entities shall not be thereby affected. 
SECTION 7.  This act shall become effective November 1, 2023. 
 
59-1-5928 MJ 01/04/23