Tennessee 2025-2026 Regular Session

Tennessee House Bill HB1033 Compare Versions

OldNewDifferences
11
2-SENATE BILL 1421
3- By Akbari
2+<BillNo> <Sponsor>
43
54 HOUSE BILL 1033
65 By Dixie
76
87
98 HB1033
109 000603
1110 - 1 -
1211
1312 AN ACT to amend Tennessee Code Annotated, Title 20;
1413 Title 29 and Title 47, Chapter 18, relative to data
1514 security.
1615
1716 BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE OF TENNESSEE:
1817 SECTION 1. Tennessee Code Annotated, Title 47, Chapter 18, is amended by adding
1918 the following as a new part:
2019 47-18-3501.
2120 As used in this part:
2221 (1) "Business" means a limited liability company, limited liability
2322 partnership, corporation, sole proprietorship, association, or other group,
2423 however organized, and operating for profit or not for profit;
2524 (2) "Covered entity" means a business that accesses, receives, stores,
2625 maintains, communicates, or processes personal information, personal health
2726 information, or restricted information in or through one (1) or more systems,
2827 networks, or services located in or outside of this state;
2928 (3) "Data breach":
3029 (A) Means an intentional or unintentional act that has the potential
3130 to result in electronic information owned, licensed to, or otherwise
3231 protected by a covered entity being viewed, copied, modified, transmitted,
3332 or destroyed in a manner that is reasonably believed to cause or have the
3433 potential to cause material risk of fraud, identity theft, or other injuries or
3534 damage to person or property; and
3635 (B) Does not include:
3736
3837
3938 - 2 - 000603
4039
4140 (i) Disclosure of personal information, personal health
4241 information, or restricted information pursuant to a search warrant,
4342 subpoena, or other court order, or pursuant to a subpoena, order,
4443 or duty of a regulatory agency; and
4544 (ii) Good faith transmission of personal information,
4645 personal health information, or restricted information by the
4746 covered entity's employee or business associate, or an agent on
4847 behalf of the covered entity; provided, that the personal
4948 information, personal health information, or restricted information
5049 is not used for an unlawful purpose or subject to further
5150 unauthorized disclosure;
5251 (4) "Encrypted" means the use of an algorithmic process to transform
5352 data into a form for which there is a low probability of assigning meaning without
5453 the use of a confidential process or key;
5554 (5) "Individual" means a natural person;
5655 (6) "Personal health information" means information in the medical record
5756 or designated record set that can be used to identify an individual and that was
5857 created, used, or disclosed in the course of providing a healthcare service,
5958 including diagnosis or treatment, and for which the standards, implementation
6059 specifications, and requirements for protecting electronic protected health
6160 information are described in 45 CFR 164, subpart C;
6261 (7) "Personal information":
6362 (A) Means information relating to an individual who can be
6463 identified, directly or indirectly, in particular by reference to an identifier
6564 such as a name, an identification number, social security number, driver's
6665
6766
6867 - 3 - 000603
6968
7069 license number or state identification card number, passport number,
7170 account number or credit or debit card number, location data, biometric
7271 data, an online identifier, or one (1) or more factors specific to physical,
7372 physiological, genetic, mental, economic, cultural, or social identity of
7473 such individual; and
7574 (B) Does not include personal health information or restricted
7675 information; and
7776 (8) "Restricted information" means information that is sensitive about an
7877 individual, other than personal information or publicly available information, that
7978 alone or combined with other information can be used to distinguish or trace an
8079 individual's identity or can be linked to an individual if the information is not
8180 encrypted, redacted, or altered by any method or technology in a manner that
8281 renders the information unreadable, and the breach of which is likely to result in a
8382 material risk of identity theft or other fraud to a person or property.
8483 47-18-3502.
8584 (a)
8685 (1) A covered entity seeking an affirmative defense under this part shall
8786 create, maintain, and comply with a written cybersecurity program that contains
8887 administrative, technical, operational, and physical safeguards for the protection
8988 of both personal information, personal health information, and restricted
9089 information at the time of the breach.
9190 (2) The program must be designed to:
9291 (A) Protect against a breach of security;
9392 (B) Protect the security and integrity of personal information,
9493 personal health information, and restricted information;
9594
9695
9796 - 4 - 000603
9897
9998 (C) Protect against any anticipated threat to the security or
10099 integrity of personal information, personal health information, and
101100 restricted information;
102101 (D) Continually evaluate and mitigate any reasonably anticipated
103102 internal or external threats or hazards that could lead to a data breach,
104103 including conducting annual privacy and security risk assessments; and
105104 (E) Communicate to any affected parties the extent of any risk
106105 posed and actions the affected parties may take to reduce any damages
107106 if a data breach is known to have occurred.
108107 (3) The covered entity must have a chief information officer or security
109108 officer assigned to coordinate the program and take measures to train employees
110109 on the necessary safety practices and regulations.
111110 (b) A covered entity satisfies subsection (a) if the written cybersecurity program
112111 contains written protocols that reasonably conform to an industry-recognized
113112 cybersecurity framework at the time of the breach, as described in ยง 47-18-3503.
114113 (c) A covered entity that satisfies this section is entitled to an affirmative defense
115114 to any cause of action in tort brought under the laws of this state or in the courts of this
116115 state, even if the covered entity's agent breached the covered entity's data, when it is
117116 alleged that the failure to implement reasonable information security controls resulted in
118117 a data breach of personal information, personal health information, or restricted
119118 information.
120119 (d) A covered entity may not claim an affirmative defense under this section if
121120 the covered entity had actual notice of a threat or hazard to the security or integrity of the
122121 personal information, personal health information, or restricted information and did not
123122 act to mitigate the threat or potential hazard within a reasonable time in accordance with
124123
125124
126125 - 5 - 000603
127126
128127 the industry-recognized cybersecurity framework timeframe to make proper notifications
129128 to inform affected parties a breach has occurred.
130129 47-18-3503.
131130 (a) A covered entity's cybersecurity program reasonably conforms to an industry-
132131 recognized cybersecurity framework for purposes of this part if, at the time of the breach:
133132 (1) The cybersecurity program reasonably conforms to the current
134133 version of one (1) or more of the following, subject to subsection (b):
135134 (A) The Framework for Improving Critical Infrastructure
136135 Cybersecurity developed by the national institute of standards and
137136 technology (NIST);
138137 (B) NIST Special Publication 800-171;
139138 (C) NIST Special Publications 800-53 and 800-53A;
140139 (D) The International Organization for Standardization and
141140 International Electrotechnical Commission's 27000 Family of Standards;
142141 (E) The Federal Risk and Authorization Management Program
143142 Security Assessment Framework; or
144143 (F) The Center for Internet Security's Critical Security Controls for
145144 Effective Cyber Defense; or
146145 (2) The covered entity is regulated by the state, the federal government,
147146 or both, or is otherwise subject to, and the cybersecurity program reasonably
148147 conforms to, the entirety of the current version of one (1) or more of the following
149148 at the time of the breach, subject to subsection (b):
150149 (A) The security requirements of the federal Health Insurance
151150 Portability and Accountability Act of 1996 (HIPAA), as set forth in 45 CFR
152151 part 164, subpart C;
153152
154153
155154 - 6 - 000603
156155
157156 (B) Title V of the Gramm-Leach-Bliley Act, Pub. L. No. 106-102,
158157 as amended;
159158 (C) The Federal Information Security Modernization Act of 2014,
160159 Pub. L. No. 113-283;
161160 (D) The Health Information Technology for Economic and Clinical
162161 Health (HITECH) Act, as set forth in 45 CFR part 164; or
163162 (E) Another applicable federal or state regulation; or
164163 (3) The cybersecurity framework reasonably complies with both the
165164 current version of the payment card industry data security standard and conforms
166165 to the current version of another applicable industry-recognized cybersecurity
167166 framework, subject to subsection (b).
168167 (b) If a new and final revision to a framework listed in subsection (a) is
169168 published, then a covered entity whose cybersecurity program reasonably conforms to
170169 such framework shall conform the elements of its cybersecurity program to the revised
171170 framework, or another applicable framework listed in subsection (a), within the timeframe
172171 provided, if any, in the relevant framework upon which the covered entity intends to rely
173172 to support its affirmative defense. In all cases, the covered entity must come into
174173 compliance with the new and final revision, or another framework listed in subsection (a)
175174 within the earlier of one (1) year after the publication date of the new and final revision or
176175 its stated compliance date, if any.
177176 47-18-3504.
178177 This part does not create a private right or cause of action, including a class
179178 action, with respect to any act or practice regulated under this part.
180179 SECTION 2. This act takes effect July 1, 2025, the public welfare requiring it.