NY SHIELD Act: How to Implement a Data Security Program

NY SHIELD Act: How to Implement a Data Security Program

The Stop Hacks and Improve Electronic Data Security Act (SHIELD Act) requires all covered entities to implement a "Data Security Program."

Complying with the SHIELD Act's Data Security Program requirement could consume significant time and resources. Businesses must put in place administrative, technical, and physical safeguards across 13 different metrics to safeguard the data of New York residents.

We've prepared some practical advice to help you meet each of the SHIELD Act's Data Security Program requirements.


Who Needs to Implement a Data Security Program?

Which two exceptions, the SHIELD Act requires "any person or business that owns or licenses computerized data which includes private information of a resident of New York [state]" to implement the Act's Data Security Program.

This applies to companies across the entire world, regardless of whether they have any presence in New York or even the United States.

Reduced Obligations for Small Businesses

Small businesses are not exempt from the SHIELD Act, but they can implement a reduced Data Security Program if appropriate.

Under the SHIELD Act, a "small business" fulfills one or more of the following characteristics:

  1. It has fewer than 50 employees,
  2. It had gross revenue of less than $3 million per year in each of the last three fiscal years, or
  3. It has less than $5 million in year-end total assets, calculated "in accordance with generally accepted accounting principles"

A small business only needs to implement a Data Security Program that is "appropriate," considering:

  • The size and complexity of the business
  • The nature and scope of its activities
  • The sensitivity of the personal information it collects

Exemption for Compliant Regulated Entities

Certain entities that are compliant with other cybersecurity laws are exempt from the Data Security Program requirement of the SHIELD Act.

Your company will be exempt if it complies with one of the following regulations:

  • Title V of the Gramm-Leach-Bliley Act (15 USC 6801 to 6809, available here)
  • The "Privacy Rule" of the Health Insurance Portability and Accountability Act (HIPAA) (45 CFR parts 160 and 164, available here)
  • The NYDFS Cybersecurity Regulation (23 NYCRR 500, available here)
  • Any other federal or New York State cybersecurity law

Personal Information vs Private Information

Personal Information vs Private Information

The SHIELD Act distinguishes between "personal information" and "private information."

Personal Information

The SHIELD Act defines "personal information" as:

"any information concerning a natural person which, because of name, number, personal mark, or other identifier, can be used to identify such natural person."

This is a somewhat vague definition. It's important to note that, in addition to a name, number, and "personal mark," personal information includes "other identifier[s]." In certain contexts, identifiers might include an email address, username, or alias.

Private Information

The SHIELD Act's definition of "private information" is more complex. There are two types of private information, which we're calling "type I" and "type II" private information.

Type I Private Information

Type I private information comprises a data set that includes personal information plus one or more of the "data elements" listed below:

  1. Social security number
  2. Driver's license number or non-driver ID card number
  3. Account number, credit or debit card number, in combination with:

    • Any required security code, access code, password or other information that would permit access to an individual's financial account
  4. Biometric information, meaning data generated by electronic measurements of an individual's unique physical characteristics, such as:

    • Fingerprint
    • Voiceprint
    • Retina or iris image
    • Other unique physical representation or digital representation of biometric data which are used to authenticate or ascertain the individual's identity

There's one more condition. In order to be considered "private information," the data element or the combination of both the personal information and the data element must be:

  • Not encrypted, or
  • Encrypted, but with an encryption key that has been accessed or acquired

In other words, if the information is encrypted, and the encryption key is safe, it's not private information.

Type II Private Information

Type II private information is:

"a user name or email address in combination with a password or security question and answer that would permit access to an online account."

Components of a Data Security Program

Components of a Data Security Program

The SHIELD Act Data Security Program consists of three parts:

  • Reasonable administrative safeguards, like having a policy in place for sending out data breach notices
  • Reasonable technical safeguards
  • Reasonable physical safeguards

Throughout this section, we'll be referring to other cybersecurity and data protection laws that impose similar requirements to the SHIELD Act, namely:

  • EU General Data Protection Act (GDPR)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • California Consumer Privacy Act (CCPA)

Reasonable Administrative Safeguards

Reasonable Administrative Safeguards

Administrative safeguards include matters such as your risk assessments, policies, procedures, and staff training.

Here's the relevant section of the SHIELD Act, Section 899-BB.2.(b)(ii)(A):

NY State Senate Consolidated Laws: SHIELD Act - Examples of reasonable administrative safeguards

This is the most extensive section of the SHIELD Act Data Security Program.

Let's consider how you can meet each of these requirements.

Designating Employees to Coordinate the Program

You must designate one or more employees to coordinate the security program.

The SHIELD Act does not give any specific requirements around who would be an appropriate employee. However, a similar requirement exists under the GDPR, appointing a Data Protection Officer, and Section 164.530(a)(1) of HIPAA (available here).

Where appropriate, an employee responsible for coordinating your Data Security Program should:

  • Have expert knowledge of data security
  • Be allowed to act independently
  • Report to the highest level of management

Identifying Internal and External Risks

You must identify reasonably foreseeable "internal and external risks."

Consider risk assessment as a two-stage process:

  1. Identify potential security risks
  2. Determine how probable it is that the risks occur, and their potential magnitude

To identify potential risks, you must understand how data flows through your business.

  • Map the data you hold. Consider:

    • Your sources of information (customers, third parties, public sources)
    • Your storage locations (servers, terminals, laptops, mobile or USB devices)
  • Identify:

    • What data belongs to New York residents
    • What data is "personal information" and "private information"
    • Whether encrypted data could become "private information" if the encryption key is compromised
  • Answer these questions:

    • Who has access to private information? Can you restrict access to private information among your employees?
    • Are employees accessing private information outside of the office?

For each set of private information, consider:

  • Is it unlikely, possible, or probable that a data breach will occur?
  • Would the resulting harm be minimal, significant, or severe?
  • Based on the above, is the overall risk low, medium, or high?

For more information about data mapping and risk assessment, see our article Conducting a GDPR Data Audit.

Assessing Safeguards

You must assess the sufficiency of the safeguards you have put in place in place to control risks.

Administrative safeguards may include:

  • Policies such as a Data Breach Policy or Data Security Policy
  • A system of formal sanctions or warnings against staff who act carelessly or maliciously in respect of private information
  • Records and logs of system activity detailing when private information has been accessed, deleted, modified, or shared, and by whom
  • A process for conducting background checks on job applicants or contractors who could potentially access private information

Consider questions such as:

  • Are your policies and procedures made accessible to all relevant employees?
  • Do you have a process for regularly reviewing and updating your policies and procedures?
  • Are employees made aware of the potential sanctions for misusing private information?
  • Are access logs and records regularly reviewed by designated employees?

For more information about creating data safeguarding policies, see our article GDPR Data Protection Policy.

Training Employees

You must train and manage your employees in the practices and procedures of the security program.

It might be appropriate for you to either:

  • Create a security training program internally, or
  • Hire a suitably certified external provider to deliver a security training program

A security training program should make staff aware of topics such as:

  • The SHIELD Act and any other relevant laws and regulations
  • Your internal data security policies
  • Technical matters such as malware protection and password management
  • Dealing with requests to access private information

Where reasonably possible, you should extend your security training program to all employees, including temporary staff, management, and contractors.

Selecting Service Providers

You must select service providers that are capable of maintaining appropriate data security safeguards, and you must impose a contract that requires those safeguards.

You should conduct due diligence on any company with whom you share personal or private information. Consider whether the company is suitably certified, well-established, and legitimate.

Several other privacy laws, such as the GDPR and the CCPA, require a written contract between businesses and their service providers. The SHIELD Act does not specify what this contract should contain.

However, it should normally include at least:

  • A clear explanation of the purposes for which you have engaged the service provider
  • An agreement that any personal or private information that you share with the service provider will not be used for any purpose outside of the contract

For more information about service provider contracts, see our articles GDPR Data Processing Agreement and The Complete Guide to CCPA Service Providers.

Adjusting the Security Program

You must adjust your security program in light of changes to your business or new circumstances.

For example:

  • If you start holding more sensitive private information, you may need to introduce tougher security measures.
  • If you take on more employees, you may need to expand your security training program.
  • If you start using a new software application or a new service provider, you should make your employees aware of the implications of this change.
  • If you suffer a security incident, you may need to undertake a comprehensive review of your Data Security Program.

Reasonable Technical Safeguards

Reasonable Technical Safeguards

Technical safeguards relate to the technology you use to store, process, and safeguard data.

Here's the relevant section of the SHIELD Act, Section 899-BB.2.(b)(ii)(B):

NY State Senate Consolidated Laws: SHIELD Act - Examples of reasonable technical safeguards

Let's look at how you can meet each of these requirements.

Assessing Network and Software Risks

You must assess risks in the design of your networks and software.

Here are some questions you can ask about your network and software security design:

  • Does your IT department have centralized admin control over all endpoint terminals within your business?
  • Do you have a process for ensuring firewalls and other network security measures are functioning and correctly configured?
  • Are employees forbidden from accessing private information remotely via unsecured public networks?
  • Is all software kept patched and up-to-date?
  • Are all staff terminals and devices secured via anti-malware software, and is any such software effective and regularly updated?

Assessing Information Processing Risks

You must assess risks in the ways in which you process, transmit, and store personal information.

Here are some questions to consider:

  • How do employees transmit personal and private information within your business, and what are the risks involved? For example, via email, secure links, private messaging, etc.
  • How do you transmit information to, and receive information from, third parties and service providers?
  • Where and how do you store information?
  • Do your cloud storage providers offer an appropriate level of data security?
  • How do you ensure information is encrypted prior to transmission and storage?
  • Do you keep encryption keys separate from encrypted information?

Detecting, Preventing and Responding to Attacks

You must detect, prevent and respond to attacks or system failures.

Each part of your Data Security Program will help you achieve this. Here are some particularly important measures:

  • Install centrally-administered anti-malware software on all staff terminals.

    • Ensure that the software can detect and protect against all types of malware, including ransomware
    • Enable real-time protection
    • Set up automatic deep scans and update checks
  • Develop a comprehensive Data Breach Policy so that employees know:

    • How to identify a cyberattack
    • Who to report it to
    • How to help contain it

Testing and Monitoring Controls, Systems, and Procedures

You must regularly test and monitor the effectiveness of key controls, systems, and procedures.

Consider hiring a third-party company to run penetration testing on your systems. This will help identify vulnerabilities and backdoors that an attacker could exploit.

Reasonable Physical Safeguards

Reasonable Physical Safeguards

Physical safeguards are measures to protect hardware, equipment, and buildings from attacks and hazards.

Here's the relevant section of the SHIELD Act, Section 899-BB.2.(b)(ii)(C):

NY State Senate Consolidated Laws: SHIELD Act - Examples of reasonable physical safeguards

Let's look at how you can meet each of these requirements.

Assessing Information Storage and Disposal Risks

You must assess risks in how you store and dispose of information.

Consider how you store data. Your business is likely to use one of the following data storage solutions:

  • Public cloud (Amazon Web Services, Google Cloud,etc.):

    • Cheap to set up and maintain
    • Limited by your internet speed
    • Can be unsuitable for highly sensitive data
  • Onsite data center/private cloud:

    • Allows you to prohibit all third-party access to data
    • Does not require internet access
    • Expensive to install and maintain
  • Hybrid cloud:

    • Enables you to store less sensitive data in a cheaper storage environment
    • Offers some flexibility if you have unpredictable storage needs

Consider whether your chosen storage solution is appropriate given the nature, scope, and sensitivity of the data that you store.

Detecting, Preventing and Responding to Intrusions

You must ensure you can detect, prevent, and respond to intrusions.

You must also consider whether any information you store on site is physically accessible to an intruder. Consider measures such as:

  • Security passes
  • ID badges
  • CCTV
  • Security personnel

Ensure you regularly conduct audits of keys, security passes, and access permissions. Always retrieve keys and passes from employees and contractors who leave your company.

Set workstations to automatically log off if left unattended. Do not allow employees to alter this setting (or other important security settings).

Protecting Against Unauthorized Access

You must protect against unauthorized access to, or use of, private information, during or after the point at which it is:

  • Collected
  • Transported
  • Destroyed
  • Disposed of

Sensitive private information should be encrypted at all stages of collection, transportation, and deletion.

Consider using a Virtual Private Network (VPN) when transporting/transmitting data between locations.

Disposing of Private Information

You must dispose of private information within a reasonable amount of time after it is no longer needed for business purposes. You must do this by erasing electronic media so that the information cannot be read or reconstructed.

Consider creating a Data Retention Policy to formalize the periods over which you store different types of private information.

When it comes to data disposal, there are several measures that might be appropriate:

  • Data wiping software
  • Degaussing: Using magnetic fields to permanently erase data from physical media
  • Disassembly

Ensure your employees recognize the importance of not disposing of data in the trash (whether stored electronically or on paper). Many data breaches occur when someone finds sensitive information in a dumpster.

Summary of Your NY SHIELD Act Data Security Program

Your Data Security Program consists of three main elements:

  1. Reasonable administrative safeguards:

    • Assess internal and external risks
    • Designate employees to coordinate the program
    • Create data security policies and procedures
    • Train your employees in data security
  2. Reasonable technical safeguards:

    • Assess network and software risks
    • Test and monitor software and networks
  3. Reasonable physical safeguards:

    • Assess information storage and disposal risks
    • Transport, store and dispose of information in a secure way
Robert B.

Robert B.

Legal writer.

This article is not a substitute for professional legal advice. This article does not create an attorney-client relationship, nor is it a solicitation to offer legal advice.