Under the bill, a licensee must conduct a risk assessment and develop an
information security program based on the assessment. The risk assessment must
identify and assess reasonably foreseeable threats that could result in unauthorized
access to or transmission, disclosure, misuse, alteration, or destruction of nonpublic
information. The information security program must contain safeguards for the
protection of the licensee's information systems and nonpublic information and be

designed to mitigate threats, commensurate with the size and complexity of the
licensee, the nature and scope of the licensee's activities, and the sensitivity of the
nonpublic information. The bill requires the licensee to take specified risk mitigation
actions and to monitor, evaluate, and adjust the information security program as
appropriate.
The bill also requires that a licensee develop an incident response plan to
promptly respond to, and recover from, a cybersecurity event that compromises the
confidentiality, integrity, or availability of nonpublic information, the licensee's
information systems, or the continuing functionality of the licensee's business or
operations. Under the bill, “cybersecurity event” generally means an event resulting
in the unauthorized access to, or disruption or misuse of, an information system or
nonpublic information stored on an information system.
The bill further requires that a licensee exercise due diligence in selecting
third-party service providers and make reasonable efforts to require that a service
provider implement measures to protect and secure information systems and
nonpublic information and report the occurrence of any cybersecurity event.
Under the bill, the above requirements do not apply to a licensee who has less
than $10 million in year-end total assets, less than $5 million in gross annual
revenue, or fewer than 50 full-time employees. A licensee who is not exempt from
the requirements must annually certify to the commissioner that the licensee has
complied with them.
Additionally, if a licensee knows that a cybersecurity event has or may have
occurred, the bill requires that the licensee conduct a prompt investigation to assess
the nature and scope of the event and take related actions, including the performance
of reasonable measures to restore the security of affected information systems. If the
cybersecurity event involves an information system maintained by a third-party
service provider, the licensee must comply with the investigation requirements or
make reasonable efforts to confirm that the service provider has either complied with
the requirements or failed to cooperate with the investigation.
Under the bill, a licensee must notify the commissioner of a cybersecurity event
involving nonpublic information if either of the following conditions is met:
1. The licensee is domiciled in Wisconsin and the cybersecurity event has a
reasonable likelihood of materially harming a Wisconsin resident or a material part
of the licensee's normal operations.
2. The licensee reasonably believes that the cybersecurity event involves the
nonpublic information of at least 250 Wisconsin residents, and the cybersecurity
event either must be reported to a government entity under federal or state law or
has a reasonable likelihood of materially harming a Wisconsin resident or a material
part of the licensee's normal operations.
The notification must provide specified information about the cybersecurity
event, including details about the event and its discovery, a description of the
accessed nonpublic information, the number of affected Wisconsin residents, and the
licensee's efforts to address the circumstances that allowed the event to occur. The
licensee is required to update the commissioner on material changes to the
information and as additional information becomes available. If the cybersecurity

event involves a third-party service provider, the licensee must notify the
commissioner of the event unless the service provider does so. If the licensee is a
reinsurer, the licensee must notify the ceding issuer and the commissioner of the
licensee's state of domicile.
The bill also requires a licensee to make reasonable efforts to notify consumers
whose nonpublic information in the licensee's possession has been acquired by an
unauthorized person. The notice must be provided within a reasonable time, but no
later than 45 days after the licensee learns of the acquisition. Notification is not
required if the information's acquisition does not create a material risk of identity
theft or fraud or if the information was acquired in good faith by the licensee's
employee or agent and is used for a lawful purpose of the licensee. The insurer must
also notify a producer of record about the affected consumers, provide a copy of any
notice to the commissioner, and notify the consumer reporting agencies of events
requiring notification to at least 1,000 consumers.
The bill provides that failure to comply with any of the notification
requirements is not negligence or a breach of duty, but may be evidence of negligence
or breach of duty.
Under the bill, the commissioner has the power to examine and investigate the
affairs of a licensee to determine whether a violation of any of the above requirements
has occurred. A licensee must generally keep records relating to the requirements
for at least five years and produce them upon demand of the commissioner. Any
documents, materials, and other information from a licensee that are in the
possession or control of the commissioner are confidential and privileged.
The bill provisions do not apply to a licensee that is an employee, agent,
representative, or designee of a licensee and covered by that licensee's information
security program; a licensee affiliated with a depository institution that maintains
an information security program in compliance with the federal interagency
guidelines; or a licensee affiliated with a legal entity established pursuant to the
federal Farm Credit Act that maintains an information security program in
compliance with the federal Farm Credit Administration's guidance and regulations.
Additionally, except for the bill's requirement to notify the commissioner of a
cybersecurity event involving nonpublic information, the bill's provisions do not
apply to a licensee subject to the federal Department of Health and Human Services'
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule.
The people of the state of Wisconsin, represented in senate and assembly, do
enact as follows:
AB147-ASA1,1 1Section 1. 601.465 (3) (f) of the statutes is created to read:
AB147-ASA1,3,32 601.465 (3) (f) All information protected under s. 601.955, which is subject only
3to the confidentiality provisions in s. 601.955.
AB147-ASA1,2
1Section 2. Subchapter IX (title) of chapter 601 [precedes 601.95] of the
2statutes is created to read:
AB147-ASA1,4,33 Chapter 601
AB147-ASA1,4,44 Subchapter IX
AB147-ASA1,4,55 Insurance data security
AB147-ASA1,3 6Section 3. 601.95 of the statutes is created to read:
AB147-ASA1,4,7 7601.95 Definitions. In this subchapter:
AB147-ASA1,4,10 8(1) “Authorized individual” means an individual who is known to and screened
9by a licensee and whose access to the licensee's information system or nonpublic
10information is determined by the licensee to be necessary and appropriate.
AB147-ASA1,4,12 11(2) “Consumer” means an individual who is a resident of this state and whose
12nonpublic information is in the possession, custody, or control of a licensee.
AB147-ASA1,4,16 13(3) “Cybersecurity event” means an event resulting in the unauthorized access
14to, or disruption or misuse of, an information system or the nonpublic information
15stored on an information system, except that a “cybersecurity event” does not include
16any of the following:
AB147-ASA1,4,1917 (a) The unauthorized acquisition of encrypted nonpublic information if the
18encryption process or key is not also acquired, released, or used without
19authorization.
AB147-ASA1,4,2220 (b) The unauthorized acquisition of nonpublic information if the licensee
21determines that the nonpublic information has not been used or released and has
22been returned to the licensee or destroyed.
AB147-ASA1,4,24 23(4) “Encrypted” means the transformation of data into a form that results in
24a low probability of assigning meaning without the use of a protective process or key.
AB147-ASA1,5,3
1(5) “Information security program” means the administrative, technical, and
2physical safeguards that a licensee uses to access, collect, distribute, process, protect,
3store, use, transmit, dispose of, or otherwise handle nonpublic information.
AB147-ASA1,5,8 4(6) “Information system” means a discrete set of electronic information
5resources organized for the collection, processing, maintenance, use, sharing,
6dissemination, or disposition of nonpublic information, as well as any specialized
7system, including an industrial or process controls system, telephone switching and
8private branch exchange system, and environmental control system.
AB147-ASA1,5,13 9(7) “Licensee” means a person licensed, authorized, or registered, or a person
10required to be licensed, authorized, or registered, under chs. 600 to 655, other than
11a purchasing or risk retention group that is chartered and licensed in another state
12or a person acting as an assuming insurer that is domiciled in another state or
13jurisdiction.
AB147-ASA1,5,15 14(8) “Multifactor authentication” means authentication through verification of
15at least 2 of the following types of authentication factors:
AB147-ASA1,5,1616 (a) Knowledge factor, including a password.
AB147-ASA1,5,1717 (b) Possession factor, including a token or text message on a mobile phone.
AB147-ASA1,5,1818 (c) Inherence factor, including a biometric characteristic.
AB147-ASA1,5,21 19(9) “Nonpublic information” means electronic information in the possession,
20custody, or control of a licensee that is not publicly available information and is any
21of the following:
AB147-ASA1,5,2322 (a) Information concerning a consumer that can be used to identify the
23consumer, in combination with at least one of the following data elements:
AB147-ASA1,5,2424 1. Social security number.
AB147-ASA1,5,2525 2. Driver's license number or nondriver identification card number.
AB147-ASA1,6,1
13. Financial account number or credit or debit card number.
AB147-ASA1,6,32 4. Security code, access code, or password that permits access to a financial
3account.
AB147-ASA1,6,44 5. Biometric records.
AB147-ASA1,6,85 (b) Information or data, other than information or data regarding age or
6gender, in any form or medium created by or derived from a health care provider or
7a consumer that can be used to identify the consumer and that relates to any of the
8following:
AB147-ASA1,6,109 1. The physical, mental, or behavioral health or condition of the consumer or
10a member of the consumer's family.
AB147-ASA1,6,1111 2. The provision of health care to the consumer.
AB147-ASA1,6,1212 3. Payment for the provision of health care to the consumer.
AB147-ASA1,6,16 13(10) “Publicly available information” means information that a licensee has a
14reasonable basis to believe is lawfully made available to the general public from
15federal, state, or local government records, widely distributed media, or disclosures
16required by federal, state, or local law.
AB147-ASA1,6,20 17(11) “Third-party service provider” means a person other than a licensee who
18contracts with a licensee to maintain, process, or store nonpublic information or is
19otherwise permitted access to nonpublic information through its provision of
20services to the licensee.
AB147-ASA1,4 21Section 4. 601.951 of the statutes is created to read:
AB147-ASA1,7,2 22601.951 General provisions. (1) Exclusive state standards. This
23subchapter establishes the exclusive state standards applicable to licensees for data
24security, the investigation of a cybersecurity event, and notification of a

1cybersecurity event or unauthorized access to nonpublic information to the state
2government and consumers.
AB147-ASA1,7,7 3(2) Exceptions to applicability. (a) This subchapter does not apply to a person
4who is an employee, agent, representative, or designee of a licensee and who is also
5a licensee to the extent that the person is covered by the information security
6program of the other licensee and the other licensee has complied with this
7subchapter on behalf of the person.
AB147-ASA1,7,158 (b) A licensee affiliated with a depository institution that maintains an
9information security program in compliance with the interagency guidelines
10establishing information security standards as set forth pursuant to 15 USC 6801
11and 6805 shall be considered to meet the requirements of this subchapter, provided
12that the licensee produces, upon request of the commissioner, documentation
13satisfactory to the commissioner that independently validates the adoption by the
14affiliated depository institution of an information security program that satisfies the
15interagency guidelines.
AB147-ASA1,7,2416 (c) A licensee affiliated with a legal entity established pursuant to the federal
17farm credit act of 1971, 12 USC 2001, et seq., that maintains an information security
18program in compliance with the farm credit administration's guidance and
19regulations establishing policies and procedures to address data security and
20integrity shall be considered to meet the requirements of this subchapter, provided
21that the licensee produces, upon request of the commissioner, documentation
22satisfactory to the commissioner that independently validates the adoption by the
23affiliated legal entity of an information security program that satisfies the farm
24credit administration's guidance and regulations.
AB147-ASA1,8,4
1(d) This subchapter, except for s. 601.954 (1), does not apply to a licensee who
2is subject to and governed by 45 CFR Parts 160 and 164 and who maintains nonpublic
3information in the same manner as protected health information under 45 CFR
4Parts 160
and 164.
AB147-ASA1,8,65 (e) If a licensee ceases to qualify for an exception under par. (a) to (d), the
6licensee shall have 180 days to comply with this subchapter.
AB147-ASA1,8,10 7(3) Agreements between parties. Nothing in this subchapter shall prevent or
8abrogate an agreement between a licensee and another licensee, a 3rd-party service
9provider, or another party to fulfill any of the requirements under s. 601.953 or
10601.954.
AB147-ASA1,8,13 11(4) Private cause of action. This subchapter may not be construed to create
12or imply a private cause of action for violation of its provisions or to curtail a private
13cause of action that otherwise exists in the absence of this subchapter.
AB147-ASA1,8,15 14(5) Rules. The commissioner may promulgate rules that are necessary to carry
15out the provisions of this subchapter.
AB147-ASA1,5 16Section 5. 601.952 of the statutes is created to read:
AB147-ASA1,8,24 17601.952 Information security program. (1) Implementation of program.
18No later than one year after the effective date of this subsection .... [LRB inserts
19date], a licensee shall develop, implement, and maintain a comprehensive written
20information security program based on the licensee's risk assessment under sub. (2)
21and consistent with the conditions of sub. (3) (a). The program shall contain
22administrative, technical, and physical safeguards for the protection of the licensee's
23information systems and nonpublic information. The licensee shall design the
24program to do all of the following:
AB147-ASA1,9,2
1(a) Protect against threats and hazards to the security and integrity of the
2information systems and nonpublic information.
AB147-ASA1,9,53 (b) Protect against unauthorized access to and use of nonpublic information
4and minimize the likelihood of harm to a consumer from the unauthorized access or
5use.
AB147-ASA1,9,86 (c) Establish and periodically reevaluate a schedule for retention and disposal
7of nonpublic information and establish a mechanism for the destruction of nonpublic
8information that is no longer needed.
AB147-ASA1,9,10 9(2) Risk assessment. The licensee shall conduct a risk assessment under which
10the licensee shall do all of the following:
AB147-ASA1,9,1411 (a) Identify reasonably foreseeable internal and external threats that could
12result in unauthorized access to or transmission, disclosure, misuse, alteration, or
13destruction of nonpublic information, including nonpublic information that is
14accessible to or held by 3rd-party service providers of the licensee.
AB147-ASA1,9,1615 (b) Assess the likelihood and potential damage of the threats identified under
16par. (a), taking into consideration the sensitivity of the nonpublic information.
AB147-ASA1,9,1917 (c) Assess the sufficiency of policies, procedures, information systems, and
18other safeguards to manage the threats identified under par. (a) in each relevant
19area of the licensee's operations, including all of the following:
AB147-ASA1,9,2020 1. Employee training and management.
AB147-ASA1,9,2221 2. Information systems, including the classification, governance, processing,
22storage, transmission, and disposal of information.
AB147-ASA1,9,2423 3. Processes for detecting, preventing, and responding to attacks, intrusions,
24and other system failures.
AB147-ASA1,10,2
1(3) Risk management. Based on the risk assessment under sub. (2), the licensee
2shall do all of the following:
AB147-ASA1,10,63 (a) Design an information security program to mitigate the identified threats,
4commensurate with the size and complexity of the licensee, the nature and scope of
5the licensee's activities, including its use of 3rd-party service providers, and the
6sensitivity of the nonpublic information.
AB147-ASA1,10,77 (b) Implement the following security measures, as appropriate:
AB147-ASA1,10,88 1. Place access controls on information systems.
AB147-ASA1,10,129 2. Identify and manage the data, personnel, devices, systems, and facilities
10that enable the licensee to achieve its business purposes, taking into consideration
11the relative importance of the data, personnel, devices, systems, and facilities to the
12business objectives and risk strategy of the licensee.
AB147-ASA1,10,1413 3. Restrict physical access to nonpublic information to authorized individuals
14only.
AB147-ASA1,10,1715 4. Protect, by encryption or other means, nonpublic information being
16transmitted over an external network and nonpublic information stored on a
17portable computer or storage device or media.
AB147-ASA1,10,1918 5. Adopt secure development practices for applications that are developed
19in-house and utilized by the licensee.
AB147-ASA1,10,2120 6. Modify information systems in accordance with the licensee's information
21security program.
AB147-ASA1,10,2322 7. Utilize effective controls, which may include multifactor authentication
23procedures for employees accessing nonpublic information.
AB147-ASA1,10,2524 8. Implement regular testing and monitoring of systems and procedures to
25detect actual and attempted attacks on, or intrusions into, an information system.
AB147-ASA1,11,4
19. Include audit trails within the information security program that are
2designed to detect and respond to cybersecurity events and to reconstruct material
3financial transactions sufficient to support the normal operations and obligations of
4the licensee.
AB147-ASA1,11,75 10. Implement measures to protect against the destruction, loss, or damage of
6nonpublic information due to environmental hazards, natural and other disasters,
7and technological failures.
AB147-ASA1,11,98 11. Develop, implement, and maintain practices for the secure disposal of
9nonpublic information in all formats.
AB147-ASA1,11,1110 (c) Designate at least one employee, affiliate, or outside vendor as responsible
11for the information security program.
AB147-ASA1,11,1312 (d) Stay informed regarding emerging threats and vulnerabilities and
13implement safeguards to manage the threats and vulnerabilities.
AB147-ASA1,11,1514 (e) No less than annually, assess the effectiveness of security safeguards,
15including key controls, systems, and procedures.
AB147-ASA1,11,1716 (f) Include cybersecurity risks in the licensee's enterprise risk management
17process.
Loading...
Loading...