Tennessee 2025-2026 Regular Session

Tennessee Senate Bill SB1421 Latest Draft

Bill / Draft Version Filed 02/06/2025

                             
HOUSE BILL 1033 
 By Dixie 
 
SENATE BILL 1421 
By Akbari 
 
 
SB1421 
000603 
- 1 - 
 
AN ACT to amend Tennessee Code Annotated, Title 20; 
Title 29 and Title 47, Chapter 18, relative to data 
security. 
 
BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE OF TENNESSEE: 
 SECTION 1.  Tennessee Code Annotated, Title 47, Chapter 18, is amended by adding 
the following as a new part: 
 47-18-3501. 
 As used in this part: 
 (1)  "Business" means a limited liability company, limited liability 
partnership, corporation, sole proprietorship, association, or other group, 
however organized, and operating for profit or not for profit; 
 (2)  "Covered entity" means a business that accesses, receives, stores, 
maintains, communicates, or processes personal information, personal health 
information, or restricted information in or through one (1) or more systems, 
networks, or services located in or outside of this state; 
 (3)  "Data breach": 
 (A)  Means an intentional or unintentional act that has the potential 
to result in electronic information owned, licensed to, or otherwise 
protected by a covered entity being viewed, copied, modified, transmitted, 
or destroyed in a manner that is reasonably believed to cause or have the 
potential to cause material risk of fraud, identity theft, or other injuries or 
damage to person or property; and 
 (B)  Does not include:   
 
 
 	- 2 - 	000603 
 
 (i)  Disclosure of personal information, personal health 
information, or restricted information pursuant to a search warrant, 
subpoena, or other court order, or pursuant to a subpoena, order, 
or duty of a regulatory agency; and 
 (ii)  Good faith transmission of personal information, 
personal health information, or restricted information by the 
covered entity's employee or business associate, or an agent on 
behalf of the covered entity; provided, that the personal 
information, personal health information, or restricted information 
is not used for an unlawful purpose or subject to further 
unauthorized disclosure; 
 (4)  "Encrypted" means the use of an algorithmic process to transform 
data into a form for which there is a low probability of assigning meaning without 
the use of a confidential process or key; 
 (5)  "Individual" means a natural person; 
 (6)  "Personal health information" means information in the medical record 
or designated record set that can be used to identify an individual and that was 
created, used, or disclosed in the course of providing a healthcare service, 
including diagnosis or treatment, and for which the standards, implementation 
specifications, and requirements for protecting electronic protected health 
information are described in 45 CFR 164, subpart C; 
 (7)  "Personal information": 
 (A)  Means information relating to an individual who can be 
identified, directly or indirectly, in particular by reference to an identifier 
such as a name, an identification number, social security number, driver's   
 
 
 	- 3 - 	000603 
 
license number or state identification card number, passport number, 
account number or credit or debit card number, location data, biometric 
data, an online identifier, or one (1) or more factors specific to physical, 
physiological, genetic, mental, economic, cultural, or social identity of 
such individual; and 
 (B)  Does not include personal health information or restricted 
information; and 
 (8)  "Restricted information" means information that is sensitive about an 
individual, other than personal information or publicly available information, that 
alone or combined with other information can be used to distinguish or trace an 
individual's identity or can be linked to an individual if the information is not 
encrypted, redacted, or altered by any method or technology in a manner that 
renders the information unreadable, and the breach of which is likely to result in a 
material risk of identity theft or other fraud to a person or property. 
 47-18-3502. 
 (a)   
(1)  A covered entity seeking an affirmative defense under this part shall 
create, maintain, and comply with a written cybersecurity program that contains 
administrative, technical, operational, and physical safeguards for the protection 
of both personal information, personal health information, and restricted 
information at the time of the breach. 
 (2)  The program must be designed to: 
 (A)  Protect against a breach of security; 
 (B)  Protect the security and integrity of personal information, 
personal health information, and restricted information;   
 
 
 	- 4 - 	000603 
 
 (C)  Protect against any anticipated threat to the security or 
integrity of personal information, personal health information, and 
restricted information; 
 (D)  Continually evaluate and mitigate any reasonably anticipated 
internal or external threats or hazards that could lead to a data breach, 
including conducting annual privacy and security risk assessments; and 
 (E)  Communicate to any affected parties the extent of any risk 
posed and actions the affected parties may take to reduce any damages 
if a data breach is known to have occurred. 
 (3)  The covered entity must have a chief information officer or security 
officer assigned to coordinate the program and take measures to train employees 
on the necessary safety practices and regulations. 
 (b)  A covered entity satisfies subsection (a) if the written cybersecurity program 
contains written protocols that reasonably conform to an industry-recognized 
cybersecurity framework at the time of the breach, as described in ยง 47-18-3503. 
 (c)  A covered entity that satisfies this section is entitled to an affirmative defense 
to any cause of action in tort brought under the laws of this state or in the courts of this 
state, even if the covered entity's agent breached the covered entity's data, when it is 
alleged that the failure to implement reasonable information security controls resulted in 
a data breach of personal information, personal health information, or restricted 
information. 
 (d)  A covered entity may not claim an affirmative defense under this section if 
the covered entity had actual notice of a threat or hazard to the security or integrity of the 
personal information, personal health information, or restricted information and did not 
act to mitigate the threat or potential hazard within a reasonable time in accordance with   
 
 
 	- 5 - 	000603 
 
the industry-recognized cybersecurity framework timeframe to make proper notifications 
to inform affected parties a breach has occurred. 
 47-18-3503. 
 (a)  A covered entity's cybersecurity program reasonably conforms to an industry-
recognized cybersecurity framework for purposes of this part if, at the time of the breach: 
 (1)  The cybersecurity program reasonably conforms to the current 
version of one (1) or more of the following, subject to subsection (b): 
 (A)  The Framework for Improving Critical Infrastructure 
Cybersecurity developed by the national institute of standards and 
technology (NIST); 
 (B)  NIST Special Publication 800-171; 
 (C)  NIST Special Publications 800-53 and 800-53A; 
 (D)  The International Organization for Standardization and 
International Electrotechnical Commission's 27000 Family of Standards; 
 (E)  The Federal Risk and Authorization Management Program 
Security Assessment Framework; or 
 (F)  The Center for Internet Security's Critical Security Controls for 
Effective Cyber Defense; or 
 (2)  The covered entity is regulated by the state, the federal government, 
or both, or is otherwise subject to, and the cybersecurity program reasonably 
conforms to, the entirety of the current version of one (1) or more of the following 
at the time of the breach, subject to subsection (b): 
 (A)  The security requirements of the federal Health Insurance 
Portability and Accountability Act of 1996 (HIPAA), as set forth in 45 CFR 
part 164, subpart C;   
 
 
 	- 6 - 	000603 
 
 (B)  Title V of the Gramm-Leach-Bliley Act, Pub. L. No. 106-102, 
as amended; 
 (C)  The Federal Information Security Modernization Act of 2014, 
Pub. L. No. 113-283; 
 (D)  The Health Information Technology for Economic and Clinical 
Health (HITECH) Act, as set forth in 45 CFR part 164; or 
 (E)  Another applicable federal or state regulation; or 
 (3)  The cybersecurity framework reasonably complies with both the 
current version of the payment card industry data security standard and conforms 
to the current version of another applicable industry-recognized cybersecurity 
framework, subject to subsection (b). 
 (b)  If a new and final revision to a framework listed in subsection (a) is 
published, then a covered entity whose cybersecurity program reasonably conforms to 
such framework shall conform the elements of its cybersecurity program to the revised 
framework, or another applicable framework listed in subsection (a), within the timeframe 
provided, if any, in the relevant framework upon which the covered entity intends to rely 
to support its affirmative defense.  In all cases, the covered entity must come into 
compliance with the new and final revision, or another framework listed in subsection (a) 
within the earlier of one (1) year after the publication date of the new and final revision or 
its stated compliance date, if any. 
 47-18-3504. 
 This part does not create a private right or cause of action, including a class 
action, with respect to any act or practice regulated under this part. 
 SECTION 2.  This act takes effect July 1, 2025, the public welfare requiring it.