Data Security Compliance with the NAIC Data Security Law

How Thales solutions help with NAIC Data Security Law Compliance

The NAIC Data Security Law

The National Association of Insurance Commissioners (NAIC) Data Security Law (Model Law) requires insurers and other entities licensed by state insurance departments to develop, implement, and maintain an information security program; investigate any cybersecurity events; and notify the state insurance commissioner of such events. The NAIC model law provides a blueprint for state-level laws regulating insurance companies. The main recommendations of the law include:

  • Develop a written information security program
  • Assign information security responsibility
  • Perform periodic risk assessments
  • Implement key cyber security safeguards
  • Prepare incident response plans and procedures
  • Regularly monitor and report on program status
  • Implement Service Provider oversight
  • Provide Board-level oversight
Americas

    The law applies to licensees of each state insurance bureau. This includes (with some exceptions) insurance industry companies, agencies, agents, public adjusters, and brokers.

    The National Association of Insurance Commissioners officially adopted the Data Security Law in the fourth quarter of 2017. As of May 2023, 22 states have enacted versions of the law: Alabama, Alaska, Connecticut, Delaware, Hawaii, Indiana, Iowa, Kentucky, Louisiana, Maine, Maryland, Michigan, Minnesota, Mississippi, New Hampshire, North Dakota, Ohio, South Carolina, Tennessee, Vermont, Virginia, and Wisconsin.

    The suggested penalties for non-compliance with the NAIC Data Security Law are up to $500 per violation (subject to a maximum of $10,000). If the insurer/producer violates the commissioner’s cease and desist order, suggested penalties are up to $10,000 per violation (subject to a maximum of $50,000). Individuals at those institutions can be fined up to $10,000 for each violation and may also be sentenced to up to five years in prison.

    How Thales Helps with NAIC Compliance

    Thales’ solutions can help insurance providers comply with NAIC Data Security Law by simplifying compliance and automating security, reducing the burden on security and compliance teams. We help address essential requirements for risk management in an organization’s NAIC-mandated Information Security Program.

    We provide comprehensive cyber security solutions in three key areas of cybersecurity: Application Security, Data Security, and Identity & Access Management.

    NAIC Compliance

    NAIC Compliance Solutions

      Application Security

      Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF), protection against Distributed Denial of Service (DDoS) and malicious BOT attacks, security for APIs, a secure Content Delivery Network (CDN), and Runtime Application Self-Protection (RASP).

      Data Security

      Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption tokenization and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment as well as identify anomalous behavior, and monitor activity to verify compliance, allowing organizations to prioritize where to spend their efforts.

      Identity & Access Management

      Provide seamless, secure and trusted access to applications and digital services for customers, employees and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies and Multi-Factor Authentication that help ensure that the right user is granted access to the right resource at the right time.

      Address Key Data Security Law Section 4 Requirements

        How Thales helps:

        • Reduce third party risk by maintaining on-premises control over encryption keys protecting data hosted by in the cloud.
        • Enforce separation of roles between cloud provider admins and your organization, restrict access to sensitive data.
        • Monitor and alert anomalies to detect and prevent unwanted activities from disrupting supply chain activities.
        • Enable relationship management with suppliers, partners or any third-party user; with clear delegation of access rights.
        • Minimize privileges by using relationship-based fine-grained authorization.

        How Thales helps:

        • Limit access to systems and data based on roles and context with policies.
        • Apply contextual security measures based on risk scoring.
        • Centralize access policies and enforcement to multiple hybrid environments in a single pane of glass.
        • Provide customers secure access to their information in company’s systems.

        How Thales helps:

        • Identify structured and unstructured sensitive data at risk across Hybrid IT.
        • Identify current state of compliance and documenting gaps.
        • Discover and classify potential risk for all public, private and shadow APIs.

        How Thales helps:

        • Encrypt data at rest on-premises, across clouds, and in big data or container environments.
        • Protect cryptographic keys in a FIPS 140-2 Level 3 environment.
        • Pseudonymize sensitive information in databases.
        • Protect data in motion with high-speed encryption.
        • Protect data in use by leveraging confidential computing.
        • Gain full sensitive data activity visibility, track who has access, audit what they are doing and document.
        • Security products designed for post-quantum upgrade to maintain crypto-agility.

        How Thales helps:

        • Protect apps from runtime exploitation, while integrating with tools in the CI/CD pipeline.
        • Detect and prevent cyber threats with web application firewall, ensuring seamless operations and peace of mind.
        • Safeguard critical network assets from DDoS attacks and Bad Bots while continuing to allow legitimate traffic.
        • Deploy data protection controls in hybrid and multi-cloud applications to protect DevSecOps.
        • Protect and automate access to secrets across DevOps tools. • Easily access data security solutions through online marketplaces.

        How Thales helps:

        • Enable multi-factor authentication (MFA) with the broadest range of hardware and software methods.
        • Build and deploy adaptive authentication policies based on the sensitivity of the data/application.
        • Protect against phishing and man-in-the-middle attacks.

        How Thales helps:

        • Detect and prevent cyber threats with web application firewall.
        • Monitor ICT network and protect from DDoS attacks and Bad Bots.
        • Monitor API activity, track usage, detect anomalies, and identify potential unauthorized access attempts.
        • Data activity monitoring for structured and unstructured data on Hybrid IT.
        • Produce audit trail and reports of all access events to all systems, stream logs to SIEM.

        How Thales helps:

        • Locate structured and unstructured regulated data across hybrid IT and prioritize remediation.
        • Remove keys from CipherTrust Manager can ensure secure deletion, digitally shredding all instances of the data.

        Other key data protection and security regulations

        PCI HSM

        Global

        MANDATE | ACTIVE NOW

        The PCI HSM specification defines a set of logical and physical security compliance standards for HSMs specifically for the payments industry. PCI HSM Compliance certification depends on meeting those standards.

        DORA

        Global

        REGULATION | ACTIVE NOW

        DORA aims to strengthen the IT security of financial entities to make sure the financial sector in Europe is resilient in the face of the growing volume and severity of cyber-attacks.

        Data Breach Notification Laws

        Global

        REGULATION | ACTIVE NOW

        Data breach notification requirements following loss of personal information have been enacted by nations around the globe. They vary by jurisdiction but almost universally include a “safe harbor” clause.

        GLBA

        Americas

        REGULATION | ACTIVE NOW

        The Gramm-Leach-Bliley Act (GLBA)--also known as the Financial Services Modernization Act of 1999--requires financial institutions to explain their information-sharing practices to their customers and to safeguard sensitive data.

        Contact a Compliance Specialist

        Contact Us