Data is defined in the bill as including “sensitive information,” which is defined
as information that, if disclosed or accessed by unauthorized parties, could result in
harm, privacy violations, or negative consequences for individuals or entities.
“Sensitive information” includes “personally identifiable information,” meaning
information that is or can reasonably be linked to an identified person, identifiable
person, or device linked to a person, and “nonpublic or privately held information,”
meaning information that is not publicly available or accessible to the general public;
is restricted to a specific group of individuals or entities; is considered confidential
or proprietary; is protected by privacy regulations; and requires appropriate
safeguards to prevent unauthorized access, use, or disclosure. The requirements of
the bill apply to data controllers who use or facilitate the use of sensitive information.
Under the bill, a data owner must limit the access to, sharing of, and use of its
data to what is adequate, relevant, and reasonably necessary for the purposes for
which the data is collected or generated. A data owner must also establish and

ensure compliance with relevant regulatory requirements and with internal policies
related to the review of data sharing and data use requests; data handling best
practices; and the handling of data agreement breaches, security incidents, and
related disputes.
Under the bill, a data custodian must provide a secure environment for the
storage of a data owner's data that is designed and configured in a manner that
reflects best practices in data security on subjects including identity and access
management controls, role-based permissions, data encryption, cyber security
threat monitoring, and recovery capabilities in the event of a disaster. A data
custodian must also establish and ensure compliance with internal policies and
procedures related to data access control, data retention and data destruction,
auditing capabilities and the performance of audits, the periodic review of new and
changing business and regulatory requirements that may impact data solution
organization, and any other requirements established in a data agreement. A data
custodian must also establish and ensure compliance with internal policies and
procedures related to security incidents and auditing.
Under the bill, a data steward must establish and ensure compliance with
internal policies and procedures related to various data handling practices.
If a data owner enters into an agreement with a data custodian or a data
steward, the agreement must meet the requirements described in the bill. Such an
agreement must identify all relevant parties, data sets, permitted uses and
restrictions of data, confidentiality requirements, law governing the data, and law
governing the agreement. Such an agreement must also include statements
regarding the response to security incidents, the term of the agreement, the terms
for terminating the agreement, and the authorization for or prohibition of the
collection and analysis of metadata, or data that describes other data. Such an
agreement between a data owner and a data custodian must include statements
regarding auditing capabilities and requirements.
The people of the state of Wisconsin, represented in senate and assembly, do
enact as follows:
AB824,1 1Section 1. 100.75 of the statutes is created to read:
AB824,2,3 2100.75 Requirements and standards for the sharing of sensitive
3information between separate legal entities.
(1) Definitions. In this section:
AB824,2,64 (a) “Data” includes sensitive information, such as personally identifiable
5information and nonpublic or privately held information, and nonsensitive
6information, such as public information or deidentified personal information.
AB824,3,2
1(b) “Data agreement” means a written data contract entered into between data
2controllers. “Data agreement” includes any of the following:
AB824,3,43 1. Data sharing agreements establishing terms for a data custodian providing
4storage of data owned by a data owner.
AB824,3,65 2. Data use agreements establishing terms for a data steward using data owned
6by a data owner for a specific mutually agreed-upon purpose.
AB824,3,97 3. Data access agreements establishing terms for a data steward using data
8owned by a data owner and housed within a data custodian's data storage
9environment.
AB824,3,1410 (c) “Data controller” means any entity, public or private, that determines the
11purposes and means of processing data, and that is responsible for complying with
12applicable data protection laws and ensuring that data is handled in a lawful and
13responsible manner. “Data controller” includes data custodians, data owners, and
14data stewards.
AB824,3,1615 (d) “Data custodian” means any person that provides data storage on behalf of
16a data owner.
AB824,3,1817 (e) “Data owner” means any person that generates, collects, or uses data for its
18own purposes.
AB824,3,2019 (f) “Data steward” means any person that uses or facilitates the use of data on
20behalf of a data owner.
AB824,3,2421 (g) “Deidentified personal information” means information that cannot
22reasonably be linked to an identified person, identifiable person, or device linked to
23a person. “Deidentified personal information” includes aggregated information,
24generalized information, and randomized information.
AB824,4,4
1(h) “Enhanced data” means data that has been standardized, derived,
2aggregated, organized, corrected, verified, augmented, merged with other data, or
3otherwise prepared for further analysis or use. “Enhanced data” may be based on
4data from more than one data owner.
AB824,4,55 (i) “Metadata” means data that describes other data.
AB824,4,126 (j) “Nonpublic or privately held information” means information that is not
7publicly available or accessible to the general public; is restricted to a specific group
8of individuals or entities; is considered confidential or proprietary; is protected by
9privacy regulations; and requires appropriate safeguards to prevent unauthorized
10access, use, or disclosure. “Nonpublic or privately held information” includes
11intellectual property, financial information, confidential business agreements, and
12regulatory information.
AB824,4,1613 (k) “Nonsensitive information” means information that is not subject to legal
14protections due to its nature or potential impact on individuals' privacy, security, or
15other rights. “Nonsensitive information” includes public information and
16deidentified personal information.
AB824,4,2217 (L) “Personally identifiable information” means information that is or can
18reasonably be linked to an identified person, identifiable person, or device linked to
19a person. “Personally identifiable information” includes identifying attributes,
20contact information, personal characteristics, financial information, biometric data,
21health and medical information, online identifiers, and education and employment
22information.
AB824,5,323 (m) “Public information” means information that is lawfully made available
24through federal, state, or local government records, or information that is reasonably
25believed to be lawfully made available to the general public through widely

1distributed media by the consumer or by a person to whom the consumer has
2disclosed the information, unless the consumer has restricted the information to a
3specific audience.
AB824,5,104 (n) “Sensitive information” means any type of information that, if disclosed or
5accessed by unauthorized parties, could result in harm, privacy violations, or
6negative consequences for individuals or entities. “Sensitive information” includes
7information that requires special protection due to its nature and includes
8personally identifiable information and nonpublic or privately held information.
9“Sensitive information” includes nonsensitive information that is mingled with
10sensitive information.
AB824,5,12 11(2) Requirements for data controllers. (a) A data owner that generates,
12collects, or uses sensitive information shall do all of the following:
AB824,5,1513 1. Limit the access to, sharing of, and use of its data to what is adequate,
14relevant, and reasonably necessary for the purposes for which the data is collected
15or generated.
AB824,5,1816 2. Establish and ensure compliance with internal policies and procedures
17governing the review of data sharing and data use requests. Such policies and
18procedures shall include all of the following:
AB824,5,1919 a. A schedule indicating how often the data owner will review requests.
AB824,5,2020 b. Assessment criteria for the approval or rejection of requests.
AB824,5,2121 c. Documentation of the rationale for the rejection of a request.
AB824,5,2222 d. Notice of the rejection to the requesting entity.
AB824,5,2523 3. Establish and ensure compliance with internal policies and with any
24relevant regulatory requirements on the sharing of sensitive information with
25another legal entity.
AB824,6,2
14. Establish and ensure compliance with internal policies and procedures that
2reflect best practices of data handling on all of the following subjects:
AB824,6,43 a. Identity and access management controls, including limiting the access to
4any data subject to a data agreement.
AB824,6,55 b. Data retention and data destruction.
AB824,6,76 c. The periodic review of new and changing business and regulatory
7requirements that may impact data sharing.
AB824,6,108 5. Establish and ensure compliance with internal policies and procedures
9regarding the handling of data agreement breaches; security incidents, in
10compliance with s. 134.98; and related disputes.
AB824,6,1211 (b) A data custodian that provides storage for sensitive information shall do all
12of the following:
AB824,6,1513 1. Provide a secure environment for the storage of a data owner's data. The
14environment shall be designed and configured in a manner that reflects best
15practices of data security on subjects including all of the following:
AB824,6,1716 a. Identity and access management controls, including limiting the access to
17any data subject to a data agreement.
AB824,6,1918 b. Role-based permissions, including limiting the access to data subject to a
19data agreement to only authorized users.
AB824,6,2020 c. Data encryption at rest and in transit.
AB824,6,2121 d. Cyber security monitoring and threat detection.
AB824,6,2322 e. Recovery capabilities in the event of a disaster, such as fail-over, backup, and
23restore capabilities.
AB824,6,2524 2. Establish and ensure compliance with internal policies and procedures that
25reflect best practices on all of the following subjects:
AB824,7,1
1a. Data access control.
AB824,7,22 b. Data retention and data destruction.
AB824,7,33 c. Auditing capabilities and the performance of audits.
AB824,7,54 d. The periodic review of new and changing business and regulatory
5requirements that may impact data solution organization.
AB824,7,66 e. Any other requirements established in a data agreement.
AB824,7,87 3. Establish and ensure compliance with internal policies and procedures
8related to security incidents that include all of the following:
AB824,7,109 a. A description of the severity levels by which security incidents are classified
10with descriptions and relevant examples for each severity classification.
AB824,7,1311 b. The number of hours after a security incident is detected when a data
12custodian must notify the data owner and data steward of the incident and the timing
13of subsequent updates, based on the nature or severity of the incident.
AB824,7,1614 c. A policy and process to designate a specific member of the data custodian's
15team to provide security incident communications to the data owner and data
16steward.
AB824,7,2217 d. A policy to inform the data owner and data steward of the time the incident
18occurred, if known; the time the incident was detected; the nature of the incident,
19including which data sets were known to have been impacted; the severity of the
20incident; the remediation steps that have been or will be taken; the estimated
21timeline to resolve the incident; and a way for the data owner or data steward to
22contact the data custodian to seek further information about the incident.
AB824,8,223 e. A policy to provide a follow-up notification after the resolution of an incident
24that includes the time the incident was resolved, the nature of the resolution, any
25changes to the data custodian's systems or protocols to prevent subsequent incidents,

1and any recommended changes to the data owner's or data steward's systems
2protocols to prevent subsequent incidents.
AB824,8,53 f. A record retention policy that requires the data custodian to maintain records
4detailing its response to security incidents for a reasonable time after the resolution
5of the security incident.
AB824,8,86 4. Establish and ensure compliance with internal policies and procedures
7related to auditing capabilities that require the data custodian to perform an audit
8of its systems at the request of the data owner.
AB824,8,109 (c) A data steward that uses or facilitates the use of sensitive information shall
10do all of the following:
AB824,8,1211 1. Establish and ensure compliance with internal policies and procedures that
12reflect best practices of data handling on subjects including all of the following:
AB824,8,1413 a. Standards, policies, procedures, and requirements for requesting, accessing,
14interpreting, and using data.
AB824,8,1615 b. Identity and access management controls, including limiting the access to
16any data subject to a data agreement.
AB824,8,1817 c. Verification of data outputs to meet quality, accuracy, and reliability
18specifications.
AB824,8,1919 d. Establishment of data element definitions and lineage.
AB824,8,2120 e. Establishment and maintenance of auditing policies, procedures, and
21reporting.
AB824,8,2222 f. Policies and procedures regarding data retention and destruction.
AB824,8,2423 g. Interpretation of new and changing business and regulatory requirements
24that may impact data solution organization.
AB824,8,2525 h. Any other requirements established in a data agreement.
AB824,9,3
12. Establish and ensure compliance with policies and procedures regarding the
2handling of data agreement breaches, security incidents, in compliance with s.
3134.98, and related disputes.
AB824,9,7 4(3) Agreements between data controllers. Data agreements are required
5when sensitive information controlled by one data controller is to be shared with,
6accessed by, or used by another data controller. A data agreement shall contain all
7of the following provisions:
AB824,9,88 (a) Identification of the parties to the agreement.
AB824,9,99 (b) Identification of the data subject to the agreement.
AB824,9,1310 (c) Identification of the permitted uses and restrictions of the data subject to
11the agreement, including whether the data owner permits the data controller to
12share with another entity any enhanced data that was based on the data owner's
13original data.
AB824,9,1514 (d) Identification of any confidentiality requirements for the data subject to the
15agreement.
AB824,9,2116 (e) Identification of the law governing the data subject to the agreement, such
17as the federal Family Educational Rights and Privacy Act, the federal Health
18Insurance Portability and Accountability Act, the federal Health Information
19Technology for Economic and Clinical Health Act, the federal Criminal Justice
20Information Services Security Policy, or the federal Children's Online Privacy
21Protection Rule.
AB824,9,2322 (f) Identification of the governing law and venue that shall govern the validity,
23construction, enforcement, and interpretation of the agreement.
AB824,9,2524 (g) Provisions governing the response to security incidents, in compliance with
25s. 134.98, including all of the following:
AB824,10,3
11. The name and contact information of one or more individuals who are
2authorized to provide and receive security incident communications pertaining to
3the data subject to the agreement.
AB824,10,54 2. An attestation from a data custodian that it has established and agrees to
5comply with security incident policies and procedures under sub. (2) (b) 3.
AB824,10,96 (h) Definition of the term of the data agreement. A data agreement under this
7section shall remain in effect until a mutually agreed upon termination date or until
8all data subject to the agreement is destroyed or returned to the data owner,
9whichever occurs first.
AB824,10,1110 (i) Provisions regarding the right to terminate the agreement, including all of
11the following:
AB824,10,1212 1. Conditions under which the agreement may be terminated.
AB824,10,1313 2. The method of notification required before termination is effective.
AB824,10,1414 3. The advance notice period required before termination is effective.
AB824,10,1615 4. Any special circumstances under which immediate termination of the
16agreement may be pursued.
AB824,10,1817 (j) Provisions regarding authorization for or prohibition of the collection and
18analysis of metadata.
AB824,10,2519 (k) In a data sharing agreement between a data owner and a data custodian,
20provisions regarding auditing capabilities and the performance of audits. A data
21custodian shall attest that it has enabled appropriate capabilities to support
22compliance with the regulatory statutes identified in the agreement and shall agree,
23at the request of the data owner, to perform an audit of the data owner's data under
24its custodianship. Such an audit shall have a mutually agreed upon scope and shall
25be performed within a mutually agreed upon time frame.
Loading...
Loading...