NYDFS to Delay Implementation of Cybersecurity Rules | Practical Law

NYDFS to Delay Implementation of Cybersecurity Rules | Practical Law

The New York State Department of Financial Services (NYDFS) is delaying the implementation of cybersecurity regulations for banks, insurers, and other financial services institutions subject to its jurisdiction.

NYDFS to Delay Implementation of Cybersecurity Rules

Practical Law Legal Update w-005-1596 (Approx. 5 pages)

NYDFS to Delay Implementation of Cybersecurity Rules

by Practical Law Finance
Published on 22 Dec 2016USA (National/Federal)
The New York State Department of Financial Services (NYDFS) is delaying the implementation of cybersecurity regulations for banks, insurers, and other financial services institutions subject to its jurisdiction.
The New York State Department of Financial Services (NYDFS) has delayed the anticipated January 1, 2017 deadline for New York State-regulated banks, insurers, and other financial services to comply with its comprehensive cybersecurity rule (see Legal Update, NYDFS Issues Proposed Cybersecurity Regulations for the Financial Industry). A revamped version of the cybersecurity rule was announced on December 28, 2016, and will become effective on March 1, 2017.
The revamped rule includes several revisions to the original proposed rule's definitions, including Risk Assessment, Third Party Service Provider(s), Person, and others. It also includes the following changes:
  • Cybersecurity Program (Section 500.02). Under the revised rules, a covered entity is free to design a custom tailored cybersecurity program that is appropriate to protect its information systems, nonpublic information, or business operations based on its risk assessment. In the prior version of the proposed rules, specific design parameters for a cybersecurity program outlined the required core functions. This revised section also requires increased transparency of the entity's cybesecurity program by providing the NYDFS Superintendent with the ability to access all documentation and information relevant to the entity's cybersecurity program.
  • Cybersecurity Policy (Section 5000.03). Under the revised rules, a covered entity is still required to implement and maintain a written document setting forth policies and procedures to protect its information systems and nonpublic information. However, instead of requiring annual review by the entity's board of directors and approval by a senior officer (as required under the original proposed rule), the new rule requires only that the policy be approved by one of either a senior officer, the Covered Entity's board of directors (or an appropriate committee of the board), or an equivalent governing body of the entity. Additionally, the annual review of the cybersecurity policy itself is replaced with a requirement that the policy reflect a covered entity's periodic risk assessment to "allow for revision of controls to respond to technological developments and evolving threats."
  • Risk Assessment (Section 500.09). Under the revised rules, covered entities are required to conduct a periodic risk assessment of its information systems. The risk assessment must be sufficient to "inform the design of the cybersecurity program" and must address any changes to the entity's information systems, nonpublic information, and business operations, and must account for technological developments and evolving risks, including those specific to entity. The risk assessment must be carried out in accordance with written policies and procedures that address :
    • evaluation and categorization of identified cybersecurity risks or threats facing the covered entity;
    • assessing the integrity and security of the entity's information system and nonpublic information; and
    • identify how risks will be addressed and mitigated based on the risk assessment.
  • Chief Information Security Officer (CISO) and Cybersecurity Personnel and Intelligence (Sections 500.04 and 500.10). Under the revised rules, the CISO is required to submit an annual report to the board of directors (or equivalent governing body), or to a senior officer of the entity if no board of directors (or equivalent governing body) exists, on the entity's cybersecurity program and material cybersecurity risks. Prior to the revision, the CISO report was required bi-annually. The revised rules also clarify that covered entities may utilize third party service providers to manage or oversee the performance of core cybersecurity functions.
  • Encryption of Nonpublic Information (Section 500.15). The revised rules no longer make encryption the default requirement for the transmission information over external networks. Alternative techniques are allowed based on the risk assessment.
  • Notices of Superintendent (Section 500.17). The revised rules retain the 72-hour time frame for providing notice to the superintendent that a cybersecurity event has occurred, but functionally delay reporting requirements by delaying the point at which the time begins to run. Instead of requiring reporting within 72 hours of the occurrence of an event, under the revised rules, the covered entity must only report a cybersecurity event within 72 hours of determining that the event:
    • requires notice be provided to any government body, self-regulatory agency, or other supervisory body; and
    • the cybersecurity event has a "reasonable likelihood of materially harming any material part of the normal operation(s) of the covered entity."
  • Confidentiality (Sections 500.18). The revised rules contain a new section covering confidentiality. This new section provides that a covered entity is subject to exemptions from disclosures under "Banking law, Insurance Law, Financial Services Law, Public Officers Law or any other applicable state or federal law." However, the superintendent retains broad access to all documentation and information "relevant" to the entity's cybersecurity program, as discussed in retained Section 500.02 . The purpose of this new inclusion appears to be to shield banks from having aspects of their cybersecurity programs available for discovery in civil litigation, but seems likely to have more broadly reaching implications for cybersecurity transparency.
  • Exemptions (Section 500.19). Under the revised rules, limited exemptions from penetration testing, audit trail, encryptions, CISO and incident response plan requirements are included for covered entities with:
    • fewer than 10 employees (including independent contractors);
    • less than $5,000,000 in gross annual revenue in each of the last three fiscal years;
    • less than $10,000,000 in year-end total assets.
The cybersecurity rule proposed by the NYDFS follows several high-profile hackings of US companies in 2014 and, once implemented, will be the first of its kind in the nation. Other financial regulators, including the federal banking regulators, have also announced that they are considering implementing more stringent cybersecurity rules (see Legal Update, Federal Bank Regulators Announce Plans to Propose New Cybersecurity Requirements).
For more information on the NYDFS proposal, see Article, NY Department of Financial Services Cybersecurity Regulations for Banks and for more information on data privacy and cybersecurity in the US, see Practice Note, US Privacy and Data Security Law: Overview.